Resultados de búsqueda - "Computer Security"
Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Computer security 330
- Security measures 188
- Computer networks 150
- Data protection 42
- Access control 32
- Computers 26
- Internet 24
- Computer crimes 22
- Computer hackers 22
- Firewalls (Computer security) 21
- Prevention 21
- Information technology 16
- Penetration testing (Computer security) 16
- Examinations 15
- Cryptography 13
- Data encryption (Computer science) 13
- Certification 12
- Management 12
- Electronic data processing personnel 11
- Cyberterrorism 9
- Operating systems (Computers) 9
- Privacy, Right of 9
- Computer software 7
- Testing 7
- Business enterprises 6
- Cloud computing 6
- Database security 6
- Government policy 6
- Law and legislation 6
- Mobile computing 6
-
361
Protecting your library's digital sources the essential guide to planning and preservation /
Publicado 2004Materias: “…Computer security.…”
An electronic book accessible through the World Wide Web; click to view
Electrónico eBook -
362
Encase computer forensics the official ENCE : Encase certified examiner study guide /
Publicado 2012Materias: “…Computer security Examinations Study guides.…”
An electronic book accessible through the World Wide Web; click to view
Electrónico eBook -
363
Critical infrastructure protection in homeland security : defending a networked nation /
Publicado 2015Materias: “…Computer security United States Planning.…”
An electronic book accessible through the World Wide Web; click to view
Electrónico eBook -
364
Crime Science An Interdisciplinary Journal /
Open Access
Electrónico Revista -
365
Information privacy fundamentals for librarians and information professionals /
Publicado 2015Materias: “…Computer security Law and legislation United States.…”
An electronic book accessible through the World Wide Web; click to view
Electrónico eBook -
366
Security in distributed and networking systems
Publicado 2007Materias: “…Distributed operating systems (Computers) Security measures.…”
An electronic book accessible through the World Wide Web; click to view
Electrónico eBook -
367
The disaster recovery handbook a step-by-step plan to ensure business continuity and protect vital operations, facilities, and assets /
Publicado 2004Materias: “…Computer security Handbooks, manuals, etc.…”
An electronic book accessible through the World Wide Web; click to view
Electrónico eBook -
368
Information assurance handbook : effective computer security and risk management strategies /
Publicado 2015Materias: “…Computer security Handbooks, manuals, etc. 1031…”
Libro -
369
iOS hacker's handbook
Publicado 2012Materias: “…Operating systems (Computers) Security measures.…”
An electronic book accessible through the World Wide Web; click to view
Electrónico eBook -
370
Android forensics investigation, analysis, and mobile security for Google Android /
Publicado 2011Materias: “…Mobile computing Security measures.…”
An electronic book accessible through the World Wide Web; click to view
Electrónico eBook -
371
-
372
Security of Networks and Services in an All-Connected World 11th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2017, Zurich, Swi...
Publicado 2017Materias: “…Computer security.…”
Enlace del recurso
Electrónico eBook -
373
Symbiotic Interaction 5th International Workshop, Symbiotic 2016, Padua, Italy, September 29–30, 2016, Revised Selected Papers /
Publicado 2017Materias: “…Computer security.…”
Enlace del recurso
Electrónico eBook -
374
Access Contested : Security, Identity, and Resistance in Asian Cyberspace /
Publicado 2012Materias: “…Computer security Asia.…”
Full text available:
Electrónico eBook -
375
Law, Privacy and Surveillance in Canada in the Post-Snowden Era /
Publicado 2015Materias: “…Computer security. bicssc…”
Full text available:
Electrónico eBook -
376
Access Denied : The Practice and Policy of Global Internet Filtering /
Publicado 2008Materias: “…COMPUTERS Security General. bisacsh…”
Full text available:
Electrónico eBook