Risultati della ricerca - "Computer security."

  1. 221

    Safeguarding critical e-documents implementing a program for securing confidential information assets / di Smallwood, Robert F., 1959-

    Pubblicazione 2012
    Soggetti: “...Computer security....”
    An electronic book accessible through the World Wide Web; click to view
    Elettronico eBook
  2. 222

    The basics of IT audit : purposes, processes, and practical information / di Gantz, Stephen D.

    Pubblicazione 2014
    Soggetti: “...Computer security....”
    An electronic book accessible through the World Wide Web; click to view
    Elettronico eBook
  3. 223
  4. 224

    Network security, firewalls, and VPNs / di Stewart, James Michael

    Pubblicazione 2014
    Soggetti: “...Firewalls (Computer security) 1209...”
    Libro
  5. 225

    Information security applications : 7th International Workshop, WISA 2006 Jeju Island, Korea, August 28-30, 2006 revised selected papers /

    Pubblicazione 2006
    Soggetti: “...Computer security international cooperation congresses....”
    Libro
  6. 226

    Internet security and firewalls di Preetham, V. V.

    Pubblicazione 2002
    Soggetti: “...Firewalls (Computer security)...”
    An electronic book accessible through the World Wide Web; click to view
    Elettronico eBook
  7. 227

    Network interdiction and stochastic integer programming

    Pubblicazione 2003
    Soggetti: “...Computer security....”
    An electronic book accessible through the World Wide Web; click to view
    Elettronico eBook
  8. 228

    Intrusion prevention and active response deploying network and host IPS / di Rash, Michael

    Pubblicazione 2005
    Soggetti: “...Computer security....”
    An electronic book accessible through the World Wide Web; click to view
    Elettronico eBook
  9. 229

    Intelligent watermarking techniques

    Pubblicazione 2004
    Soggetti: “...Computer security....”
    An electronic book accessible through the World Wide Web; click to view
    Elettronico eBook
  10. 230

    Host integrity monitoring using Osiris and Samhain / di Wotring, Brian

    Pubblicazione 2005
    Soggetti: “...Computer security....”
    An electronic book accessible through the World Wide Web; click to view
    Elettronico eBook
  11. 231

    Insider threat protecting the enterprise from sabotage, spying, and theft / di Cole, Eric

    Pubblicazione 2006
    Soggetti: “...Computer security....”
    An electronic book accessible through the World Wide Web; click to view
    Elettronico eBook
  12. 232

    Writing security tools and exploits di Foster, James C.

    Pubblicazione 2006
    Soggetti: “...Computer security Handbooks, manuals, etc....”
    An electronic book accessible through the World Wide Web; click to view
    Elettronico eBook
  13. 233

    Applied public key infrastructure 4th International Workshop : IWAP 2005 /

    Pubblicazione 2005
    Soggetti: “...Public key infrastructure (Computer security) Congresses....”
    An electronic book accessible through the World Wide Web; click to view
    Elettronico Atti del Convegno eBook
  14. 234

    Developer's guide to web application security di Cross, Michael

    Pubblicazione 2007
    Soggetti: “...Computer security....”
    An electronic book accessible through the World Wide Web; click to view
    Elettronico eBook
  15. 235

    Security data visualization graphical techniques for network analysis / di Conti, Greg

    Pubblicazione 2007
    Soggetti: “...Computer security....”
    An electronic book accessible through the World Wide Web; click to view
    Elettronico eBook
  16. 236

    Secure computer and network systems modeling, analysis and design / di Ye, Nong

    Pubblicazione 2008
    Soggetti: “...Computer security....”
    An electronic book accessible through the World Wide Web; click to view
    Elettronico eBook
  17. 237

    Distributed systems security issues, processes, and solutions /

    Pubblicazione 2009
    Soggetti: “...Computer security....”
    An electronic book accessible through the World Wide Web; click to view
    Elettronico eBook
  18. 238

    Professional ASP.NET 3.5 security, membership, and role management with C# and VB di Haidar, Bilal

    Pubblicazione 2008
    Soggetti: “...Computer security....”
    An electronic book accessible through the World Wide Web; click to view
    Elettronico eBook
  19. 239

    Securing information and communications systems principles, technologies, and applications /

    Pubblicazione 2008
    Soggetti: “...Computer security....”
    An electronic book accessible through the World Wide Web; click to view
    Elettronico eBook
  20. 240

    Modelling cyber security approaches, methodology, strategies /

    Pubblicazione 2009
    Soggetti: “...Computer security Congresses....”
    An electronic book accessible through the World Wide Web; click to view
    Elettronico Atti del Convegno eBook