Risultati della ricerca - "Computer security."
Soggetti all'interno della tua ricerca.
Soggetti all'interno della tua ricerca.
- Computer security 330
- Security measures 188
- Computer networks 150
- Data protection 42
- Access control 32
- Computers 26
- Internet 24
- Computer crimes 22
- Computer hackers 22
- Firewalls (Computer security) 21
- Prevention 21
- Information technology 16
- Penetration testing (Computer security) 16
- Examinations 15
- Cryptography 13
- Data encryption (Computer science) 13
- Certification 12
- Management 12
- Electronic data processing personnel 11
- Cyberterrorism 9
- Operating systems (Computers) 9
- Privacy, Right of 9
- Computer software 7
- Testing 7
- Business enterprises 6
- Cloud computing 6
- Database security 6
- Government policy 6
- Law and legislation 6
- Mobile computing 6
-
221
Safeguarding critical e-documents implementing a program for securing confidential information assets /
Pubblicazione 2012Soggetti: “...Computer security....”
An electronic book accessible through the World Wide Web; click to view
Elettronico eBook -
222
The basics of IT audit : purposes, processes, and practical information /
Pubblicazione 2014Soggetti: “...Computer security....”
An electronic book accessible through the World Wide Web; click to view
Elettronico eBook -
223
Kali Linux CTF Blueprints : build, test, and customize your own Capture the Flag challenges across multiple platforms designed to be attacked with Kali Linux /
Pubblicazione 2014Soggetti: “...Computer security....”
An electronic book accessible through the World Wide Web; click to view
Elettronico eBook -
224
Network security, firewalls, and VPNs /
Pubblicazione 2014Soggetti: “...Firewalls (Computer security) 1209...”
Libro -
225
Information security applications : 7th International Workshop, WISA 2006 Jeju Island, Korea, August 28-30, 2006 revised selected papers /
Pubblicazione 2006Soggetti: “...Computer security international cooperation congresses....”
Libro -
226
Internet security and firewalls
Pubblicazione 2002Soggetti: “...Firewalls (Computer security)...”
An electronic book accessible through the World Wide Web; click to view
Elettronico eBook -
227
Network interdiction and stochastic integer programming
Pubblicazione 2003Soggetti: “...Computer security....”
An electronic book accessible through the World Wide Web; click to view
Elettronico eBook -
228
Intrusion prevention and active response deploying network and host IPS /
Pubblicazione 2005Soggetti: “...Computer security....”
An electronic book accessible through the World Wide Web; click to view
Elettronico eBook -
229
Intelligent watermarking techniques
Pubblicazione 2004Soggetti: “...Computer security....”
An electronic book accessible through the World Wide Web; click to view
Elettronico eBook -
230
Host integrity monitoring using Osiris and Samhain /
Pubblicazione 2005Soggetti: “...Computer security....”
An electronic book accessible through the World Wide Web; click to view
Elettronico eBook -
231
Insider threat protecting the enterprise from sabotage, spying, and theft /
Pubblicazione 2006Soggetti: “...Computer security....”
An electronic book accessible through the World Wide Web; click to view
Elettronico eBook -
232
Writing security tools and exploits
Pubblicazione 2006Soggetti: “...Computer security Handbooks, manuals, etc....”
An electronic book accessible through the World Wide Web; click to view
Elettronico eBook -
233
Applied public key infrastructure 4th International Workshop : IWAP 2005 /
Pubblicazione 2005Soggetti: “...Public key infrastructure (Computer security) Congresses....”
An electronic book accessible through the World Wide Web; click to view
Elettronico Atti del Convegno eBook -
234
Developer's guide to web application security
Pubblicazione 2007Soggetti: “...Computer security....”
An electronic book accessible through the World Wide Web; click to view
Elettronico eBook -
235
Security data visualization graphical techniques for network analysis /
Pubblicazione 2007Soggetti: “...Computer security....”
An electronic book accessible through the World Wide Web; click to view
Elettronico eBook -
236
Secure computer and network systems modeling, analysis and design /
Pubblicazione 2008Soggetti: “...Computer security....”
An electronic book accessible through the World Wide Web; click to view
Elettronico eBook -
237
Distributed systems security issues, processes, and solutions /
Pubblicazione 2009Soggetti: “...Computer security....”
An electronic book accessible through the World Wide Web; click to view
Elettronico eBook -
238
Professional ASP.NET 3.5 security, membership, and role management with C# and VB
Pubblicazione 2008Soggetti: “...Computer security....”
An electronic book accessible through the World Wide Web; click to view
Elettronico eBook -
239
Securing information and communications systems principles, technologies, and applications /
Pubblicazione 2008Soggetti: “...Computer security....”
An electronic book accessible through the World Wide Web; click to view
Elettronico eBook -
240
Modelling cyber security approaches, methodology, strategies /
Pubblicazione 2009Soggetti: “...Computer security Congresses....”
An electronic book accessible through the World Wide Web; click to view
Elettronico Atti del Convegno eBook