Search Results - "Computer security"

  1. 341

    Configuring Symantec Antivirus, Corporate Edition

    Published 2003
    Subjects:
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  2. 342

    Hacking the art of exploitation / by Erickson, Jon, 1977-

    Published 2003
    Subjects: “…Computer security.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  3. 343
  4. 344

    Defense and detection strategies against Internet worms by Nazario, Jose

    Published 2004
    Subjects: “…Computer security.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  5. 345

    User's guide to cryptography and standards by Dent, Alexander W.

    Published 2005
    Subjects: “…Computer security.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  6. 346

    Dictionary of information security by Slade, Robert

    Published 2006
    Subjects: “…Computer security Dictionaries.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  7. 347

    Multimedia security technologies for digital rights management

    Published 2006
    Subjects: “…Computer security.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  8. 348
  9. 349

    Stealing the network how to own a shadow / by Long, Johnny

    Published 2007
    Subjects:
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  10. 350

    Security issues of IT outsourcing

    Published 2006
    Subjects: “…Computer security.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  11. 351
  12. 352
  13. 353

    Toward a safer and more secure cyberspace

    Published 2007
    Subjects:
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  14. 354

    Hacking the art of exploitation / by Erickson, Jon, 1977-

    Published 2008
    Subjects: “…Computer security.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  15. 355

    Boolean functions in cryptology and information security

    Published 2008
    Subjects:
    An electronic book accessible through the World Wide Web; click to view
    Electronic Conference Proceeding eBook
  16. 356
  17. 357
  18. 358

    Oracle 11g anti-hacker's cookbook by Neagu, Adrian

    Published 2012
    Subjects:
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  19. 359

    Hacking for dummies by Beaver, Kevin

    Published 2013
    Subjects: “…Computer security.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  20. 360