Risultati della ricerca - "Computer security."
Soggetti all'interno della tua ricerca.
Soggetti all'interno della tua ricerca.
- Computer security 330
- Security measures 188
- Computer networks 150
- Data protection 42
- Access control 32
- Computers 26
- Internet 24
- Computer crimes 22
- Computer hackers 22
- Firewalls (Computer security) 21
- Prevention 21
- Information technology 16
- Penetration testing (Computer security) 16
- Examinations 15
- Cryptography 13
- Data encryption (Computer science) 13
- Certification 12
- Management 12
- Electronic data processing personnel 11
- Cyberterrorism 9
- Operating systems (Computers) 9
- Privacy, Right of 9
- Computer software 7
- Testing 7
- Business enterprises 6
- Cloud computing 6
- Database security 6
- Government policy 6
- Law and legislation 6
- Mobile computing 6
-
261
Innocent code a security wake-up call for Web programmers /
Pubblicazione 2004Soggetti: “...Computer security....”
An electronic book accessible through the World Wide Web; click to view
Elettronico eBook -
262
Information security for management
Pubblicazione 2010Soggetti: “...Computer security Management....”
An electronic book accessible through the World Wide Web; click to view
Elettronico eBook -
263
A comparison between smart cards and trusted platform modules in business scenarios
Pubblicazione 2008Soggetti: “...Computer security....”
An electronic book accessible through the World Wide Web; click to view
Elettronico eBook -
264
Computer Forensics jumpstart
Pubblicazione 2011Soggetti: “...Computer security....”
An electronic book accessible through the World Wide Web; click to view
Elettronico eBook -
265
Web application defender's cookbook battling hackers and protecting users /
Pubblicazione 2013Soggetti: “...Computer security....”
An electronic book accessible through the World Wide Web; click to view
Elettronico eBook -
266
Proceedings of the First International Workshop on Coding and Cryptology, Wuyi Mountain, Fujian, China 11-15 June 2007
Pubblicazione 2008Soggetti: “...Computer security Congresses....”
An electronic book accessible through the World Wide Web; click to view
Elettronico Atti del Convegno eBook -
267
Best practices in computer network defense : incident detection and response /
Pubblicazione 2014Soggetti: “...Computer security....”
An electronic book accessible through the World Wide Web; click to view
Elettronico eBook -
268
Security intelligence : a practitioner's guide to solving enterprise security challenges /
Pubblicazione 2015Soggetti: “...Computer security....”
An electronic book accessible through the World Wide Web; click to view
Elettronico eBook -
269
Software systems safety /
Pubblicazione 2014Soggetti: “...Computer security Congresses....”
An electronic book accessible through the World Wide Web; click to view
Elettronico eBook -
270
Terrorist use of cyberspace and cyber terrorism : new challenges and reponses /
Pubblicazione 2015Soggetti: “...Computer security Congresses....”
An electronic book accessible through the World Wide Web; click to view
Elettronico eBook -
271
Digital fortress /
Pubblicazione 2004Soggetti: “...Computer security Fiction. 131440...”
Contributor biographical information
Publisher description
Sample text
Libro -
272
Cyber security engineering : a practical approach for systems and software assurance /
Pubblicazione 2016Soggetti: “...Computer security 342...”
Libro -
273
Information security practices : emerging threats and perspectives /
Pubblicazione 2016Soggetti: “...Computer security 342...”
Libro -
274
Securing HP NonStop servers in an open systems world TCP/IP, OSS & SQL /
Pubblicazione 2006Soggetti: “...Computer security....”
An electronic book accessible through the World Wide Web; click to view
Elettronico eBook -
275
Cryptography and network security : principles and practice /
Pubblicazione 2006Soggetti: “...Computer security....”
Libro -
276
Analysis, design, and implementation of secure and interoperable distributed health information systems
Pubblicazione 2002Soggetti: “...Computer security....”
An electronic book accessible through the World Wide Web; click to view
Elettronico eBook -
277
The book of PF a no-nonsense guide to the OpenBSD firewall /
Pubblicazione 2008Soggetti: “...Firewalls (Computer security)...”
An electronic book accessible through the World Wide Web; click to view
Elettronico eBook -
278
Protecting games a security handbook for game developers and publishers /
Pubblicazione 2008Soggetti: “...Computer security Computer programs....”
An electronic book accessible through the World Wide Web; click to view
Elettronico eBook -
279
Introduction to identity-based encryption
Pubblicazione 2008Soggetti: “...Public key infrastructure (Computer security)...”
An electronic book accessible through the World Wide Web; click to view
Elettronico eBook -
280
Identity management concepts, technologies, and systems /
Pubblicazione 2011Soggetti: “...Computer security....”
An electronic book accessible through the World Wide Web; click to view
Elettronico eBook