Risultati della ricerca - "Computer Security."
Soggetti all'interno della tua ricerca.
Soggetti all'interno della tua ricerca.
- Computer security 660
- Security measures 375
- Computer networks 300
- Data protection 84
- Access control 64
- Computers 52
- Internet 47
- Computer crimes 44
- Computer hackers 43
- Firewalls (Computer security) 42
- Prevention 42
- Information technology 32
- Penetration testing (Computer security) 32
- Examinations 30
- Cryptography 26
- Data encryption (Computer science) 26
- Management 25
- Certification 24
- Electronic data processing personnel 22
- Cyberterrorism 18
- Operating systems (Computers) 18
- Privacy, Right of 17
- Computer software 14
- Testing 14
- Business enterprises 12
- Cloud computing 12
- Database security 12
- Government policy 12
- Law and legislation 12
- Reliability 12
-
21
-
22
-
23
Computer security : Principles and practice /
Pubblicazione 2008Soggetti: “...Computer security....”
Libro -
24
Computers at risk safe computing in the information age /
Pubblicazione 1991Soggetti: “...Computer security....”
An electronic book accessible through the World Wide Web; click to view
Elettronico eBook -
25
Demystifying Intelligent Multimode Security Systems : An Edge-To-Cloud Cybersecurity Solutions Guide /
Pubblicazione 2023Soggetti: “...Computer security....”
Click to View
Elettronico eBook -
26
Hack proofing Linux: a guide to open source security the only way to stop a hacker is to think like one /
Pubblicazione 2001Soggetti: “...Computer security....”
An electronic book accessible through the World Wide Web; click to view
Elettronico eBook -
27
Linux security
Pubblicazione 2002Soggetti: “...Computer security....”
An electronic book accessible through the World Wide Web; click to view
Elettronico eBook -
28
Cyber spying tracking your family's (sometimes) secret online lives /
Pubblicazione 2005Soggetti: “...Computer security....”
An electronic book accessible through the World Wide Web; click to view
Elettronico eBook -
29
Contemporary cryptography
Pubblicazione 2005Soggetti: “...Computer security....”
An electronic book accessible through the World Wide Web; click to view
Elettronico eBook -
30
Basics of contemporary cryptography for IT practitioners
Pubblicazione 2005Soggetti: “...Computer security....”
An electronic book accessible through the World Wide Web; click to view
Elettronico eBook -
31
Firewall design and analysis
Pubblicazione 2011Soggetti: “...Firewalls (Computer security)...”
An electronic book accessible through the World Wide Web; click to view
Elettronico eBook -
32
Firewall design and analysis
Pubblicazione 2011Soggetti: “...Firewalls (Computer security)...”
An electronic book accessible through the World Wide Web; click to view
Elettronico eBook -
33
Hacking the hacker /
Pubblicazione 2017Soggetti: “...Computer security....”
An electronic book accessible through the World Wide Web; click to view
Elettronico eBook -
34
Hack proofing Linux: a guide to open source security the only way to stop a hacker is to think like one /
Pubblicazione 2001Soggetti: “...Computer security....”
An electronic book accessible through the World Wide Web; click to view
Elettronico eBook -
35
Linux security
Pubblicazione 2002Soggetti: “...Computer security....”
An electronic book accessible through the World Wide Web; click to view
Elettronico eBook -
36
Cyber spying tracking your family's (sometimes) secret online lives /
Pubblicazione 2005Soggetti: “...Computer security....”
An electronic book accessible through the World Wide Web; click to view
Elettronico eBook -
37
Contemporary cryptography
Pubblicazione 2005Soggetti: “...Computer security....”
An electronic book accessible through the World Wide Web; click to view
Elettronico eBook -
38
Basics of contemporary cryptography for IT practitioners
Pubblicazione 2005Soggetti: “...Computer security....”
An electronic book accessible through the World Wide Web; click to view
Elettronico eBook -
39
Hacking the hacker /
Pubblicazione 2017Soggetti: “...Computer security....”
An electronic book accessible through the World Wide Web; click to view
Elettronico eBook -
40
Stealing the network how to own a continent /
Pubblicazione 2004Soggetti: “...Computer security....”
An electronic book accessible through the World Wide Web; click to view
Elettronico eBook