Search Results - "Computer security"

  1. 61

    Stealing the network how to own a continent /

    Published 2004
    Subjects: “…Computer security.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  2. 62

    Cloud security a comprehensive guide to secure cloud computing / by Krutz, Ronald L.

    Published 2010
    Subjects: “…Cloud computing Security measures.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  3. 63

    Cloud security a comprehensive guide to secure cloud computing / by Krutz, Ronald L.

    Published 2010
    Subjects: “…Cloud computing Security measures.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  4. 64

    Information assurance for the entrerprise : a roadmap to information security / by Schou, Corey

    Published 2007
    Subjects: “…Computer security.…”
    Book
  5. 65

    Information assurance for the enterprise : a roadmap to information security / by Schou, Corey

    Published 2007
    Subjects: “…Computer security.…”
    Book
  6. 66

    Data privacy in the information age by Klosek, Jacqueline, 1972-

    Published 2000
    Subjects: “…Computer security.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  7. 67

    SSCP study guide and & DVD training system / by Jacobs, Josh

    Published 2003
    Subjects: “…Computer security.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  8. 68

    Information getting, protecting and using data.

    Published 2003
    Subjects:
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  9. 69

    Homeland security techniques and technologies by Mena, Jesus

    Published 2004
    Subjects:
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  10. 70

    Programmer's ultimate security deskref by Foster, James

    Published 2004
    Subjects:
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  11. 71
  12. 72

    Black hat physical device security exploiting hardware and software / by Miller, Drew

    Published 2005
    Subjects: “…Computer security.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  13. 73
  14. 74
  15. 75
  16. 76
  17. 77

    Putting the latest z/OS security features to work

    Published 2002
    Subjects:
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  18. 78
  19. 79
  20. 80

    A process for developing a common vocabulary in the information security area

    Published 2007
    Subjects: “…Computer security.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic Conference Proceeding eBook