Хайлтын үр дүнгүүд - "Computer security."
Таны хайлт доторх Санал болгосон сэдвүүд.
Таны хайлт доторх Санал болгосон сэдвүүд.
- Computer security 330
- Security measures 188
- Computer networks 150
- Data protection 42
- Access control 32
- Computers 26
- Internet 24
- Computer crimes 22
- Computer hackers 22
- Firewalls (Computer security) 21
- Prevention 21
- Information technology 16
- Penetration testing (Computer security) 16
- Examinations 15
- Cryptography 13
- Data encryption (Computer science) 13
- Certification 12
- Management 12
- Electronic data processing personnel 11
- Cyberterrorism 9
- Operating systems (Computers) 9
- Privacy, Right of 9
- Computer software 7
- Testing 7
- Business enterprises 6
- Cloud computing 6
- Database security 6
- Government policy 6
- Law and legislation 6
- Mobile computing 6
-
241
Hashing in computer science fifty years of slicing and dicing /
Хэвлэсэн 2010Нөхцлүүд: “…Computer security.…”
An electronic book accessible through the World Wide Web; click to view
Цахим Цахим ном -
242
Logics and languages for reliability and security
Хэвлэсэн 2010Нөхцлүүд: “…Computer security.…”
An electronic book accessible through the World Wide Web; click to view
Цахим Цахим ном -
243
Advances in artificial intelligence for privacy protection and security
Хэвлэсэн 2010Нөхцлүүд: “…Computer security.…”
An electronic book accessible through the World Wide Web; click to view
Цахим Цахим ном -
244
Microsoft Forefront UAG 2010 administrator's handbook take full command of Microsoft Forefront Unified Access Gateway to secure your business applications and provide dynamic remot...
Хэвлэсэн 2011Нөхцлүүд: “…Computer security.…”
An electronic book accessible through the World Wide Web; click to view
Цахим Цахим ном -
245
A cyberworm that knows no boundaries
Хэвлэсэн 2011Нөхцлүүд: “…Computer security United States.…”
An electronic book accessible through the World Wide Web; click to view
Цахим Цахим ном -
246
Practical malware analysis the hands-on guide to dissecting malicious software /
Хэвлэсэн 2012Нөхцлүүд: “…Computer security.…”
An electronic book accessible through the World Wide Web; click to view
Цахим Цахим ном -
247
Getting started with Citrix XenApp 6.5 design and implement Citrix farms based on XenApp 6.5 /
Хэвлэсэн 2012Нөхцлүүд: “…Computer security.…”
An electronic book accessible through the World Wide Web; click to view
Цахим Цахим ном -
248
Safety of computer architectures
Хэвлэсэн 2010Нөхцлүүд: “…Computer security.…”
An electronic book accessible through the World Wide Web; click to view
Цахим Цахим ном -
249
Investigative computer forensics the practical guide for lawyers, accountants, investigators, and business executives /
Хэвлэсэн 2013Нөхцлүүд: “…Computer security.…”
An electronic book accessible through the World Wide Web; click to view
Цахим Цахим ном -
250
Learning Metasploit exploitation and development
Хэвлэсэн 2013Нөхцлүүд: “…Penetration testing (Computer security)…”
An electronic book accessible through the World Wide Web; click to view
Цахим Цахим ном -
251
Penetration testing with the Bash shell : make the most of the Bash shell and Kali Linux's command-line-based security assessment tools /
Хэвлэсэн 2014Нөхцлүүд: “…Penetration testing (Computer security) Examinations.…”
An electronic book accessible through the World Wide Web; click to view
Цахим Цахим ном -
252
Building virtual pentesting labs for advanced penetration testing : build intricate virtual architecture to practice any penetration testing technique virtually /
Хэвлэсэн 2014Нөхцлүүд: “…Computer security Testing.…”
An electronic book accessible through the World Wide Web; click to view
Цахим Цахим ном -
253
Understanding bitcoin : cryptography, engineering and economics. /
Хэвлэсэн 2015Нөхцлүүд: “…Computer security.…”
An electronic book accessible through the World Wide Web; click to view
Цахим Цахим ном -
254
Perspectives on privacy : increasing regulation in the USA, Canada, Australia and European countries /
Хэвлэсэн 2014Нөхцлүүд: “…Computer security Law and legislation.…”
An electronic book accessible through the World Wide Web; click to view
Цахим Цахим ном -
255
Unauthorized access : the crisis in online privacy and security /
Хэвлэсэн 2017Нөхцлүүд: “…Computer security.…”
Click to View
Цахим Цахим ном -
256
Essential computer security everyone's guide to e-mail, internet, and wireless security /
Хэвлэсэн 2006Нөхцлүүд: “…Computer security.…”
An electronic book accessible through the World Wide Web; click to view
Цахим Цахим ном -
257
Advanced penetration testing for highly-secured environments the ultimate security guide : learn to perform professional penetration testing for highly-secured environments with th...
Хэвлэсэн 2012Нөхцлүүд: “…Computer security Testing Handbooks, manuals, etc.…”
An electronic book accessible through the World Wide Web; click to view
Цахим Цахим ном -
258
Security and control in information systems a guide for business and accounting /
Хэвлэсэн 2000Нөхцлүүд: “…Computer security.…”
An electronic book accessible through the World Wide Web; click to view
Цахим Цахим ном -
259
How to cheat at designing security for a Windows Server 2003 network
Хэвлэсэн 2006Нөхцлүүд: “…Computer security.…”
An electronic book accessible through the World Wide Web; click to view
Цахим Цахим ном -
260
Implementing PKI Services on z/OS
Хэвлэсэн 2004Нөхцлүүд: “…Public key infrastructure (Computer security)…”
An electronic book accessible through the World Wide Web; click to view
Цахим Цахим ном