Search Results - "Computer security"
Suggested Topics within your search.
Suggested Topics within your search.
- Computer security 650
- Security measures 373
- Computer networks 295
- Data protection 79
- Access control 64
- Computers 54
- Internet 46
- Computer crimes 44
- Computer hackers 42
- Firewalls (Computer security) 42
- Prevention 42
- Information technology 32
- Penetration testing (Computer security) 32
- Data encryption (Computer science) 30
- Examinations 30
- Cryptography 26
- Management 25
- Certification 24
- Electronic data processing personnel 22
- Cyberterrorism 18
- Operating systems (Computers) 18
- Privacy, Right of 16
- Computer software 14
- Testing 14
- Business enterprises 12
- Cloud computing 12
- Computer science 12
- Data processing 12
- Database security 12
- Government policy 12
-
421
Techno security's guide to e-discovery and digital forensics
Published 2007Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
422
Trust and security in collaborative computing
Published 2008Subjects: “…Computer security.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
423
Identity, security and democracy the wider social and ethical implications of automated systems for human identification /
Published 2009Subjects: “…Computer security Congresses.…”
An electronic book accessible through the World Wide Web; click to view
Electronic Conference Proceeding eBook -
424
Fuzzing for software security testing and quality assurance
Published 2008Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
425
-
426
Social engineering the art of human hacking /
Published 2011Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
427
Web commerce security design and development /
Published 2011Subjects: “…Computer security.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
428
The tangled Web a guide to securing modern Web applications /
Published 2012Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
429
Safeguarding critical e-documents implementing a program for securing confidential information assets /
Published 2012Subjects: “…Computer security.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
430
The basics of IT audit : purposes, processes, and practical information /
Published 2014Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
431
Kali Linux CTF Blueprints : build, test, and customize your own Capture the Flag challenges across multiple platforms designed to be attacked with Kali Linux /
Published 2014Subjects: “…Computer security.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
432
Fuzzing for software security testing and quality assurance
Published 2008Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
433
-
434
Social engineering the art of human hacking /
Published 2011Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
435
Web commerce security design and development /
Published 2011Subjects: “…Computer security.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
436
The tangled Web a guide to securing modern Web applications /
Published 2012Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
437
Safeguarding critical e-documents implementing a program for securing confidential information assets /
Published 2012Subjects: “…Computer security.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
438
The basics of IT audit : purposes, processes, and practical information /
Published 2014Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
439
Kali Linux CTF Blueprints : build, test, and customize your own Capture the Flag challenges across multiple platforms designed to be attacked with Kali Linux /
Published 2014Subjects: “…Computer security.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
440
Network security, firewalls, and VPNs /
Published 2014Subjects: “…Firewalls (Computer security) 1209…”
Book