Search Results - "Computer security"

  1. 241

    Technology and privacy the new landscape /

    Published 1997
    Subjects: “…Computer security.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  2. 242

    Snort 2.0 intrusion detection by Beale, Jay

    Published 2003
    Subjects:
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  3. 243

    Information getting, protecting and using data.

    Published 2003
    Subjects:
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  4. 244
  5. 245

    Invasion of privacy! big brother and the company hackers / by Weber, Michael

    Published 2004
    Subjects: “…Computer security.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  6. 246
  7. 247
  8. 248

    Cyber adversary characterization auditing the hacker mind /

    Published 2004
    Subjects: “…Computer security.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  9. 249

    Java security by Sethi, Harpreet

    Published 2002
    Subjects: “…Computer security.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  10. 250

    Microsoft Windows 2000 security by Gupta, Rashi, 1977-

    Published 2003
    Subjects:
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  11. 251
  12. 252
  13. 253

    Privacy protection and computer forensics by Caloyannides, Michael A.

    Published 2004
    Subjects: “…Computer security.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  14. 254
  15. 255

    Bluetooth security by Gehrmann, Christian

    Published 2004
    Subjects:
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  16. 256

    Perfect passwords selection, protection, authentication / by Burnett, Mark

    Published 2006
    Subjects: “…Computer security.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  17. 257

    Network security evaluation using the NSA IEM / by Fuller, Ed

    Published 2005
    Subjects:
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  18. 258
  19. 259
  20. 260

    Reversing secrets of reverse engineering / by Eilam, Eldad

    Published 2005
    Subjects:
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook