Resultats de la cerca - "Computer security."
Matèries dins de la cerca
Matèries dins de la cerca
- Computer security 330
- Security measures 188
- Computer networks 150
- Data protection 42
- Access control 32
- Computers 26
- Internet 24
- Computer crimes 22
- Computer hackers 22
- Firewalls (Computer security) 21
- Prevention 21
- Information technology 16
- Penetration testing (Computer security) 16
- Examinations 15
- Cryptography 13
- Data encryption (Computer science) 13
- Certification 12
- Management 12
- Electronic data processing personnel 11
- Cyberterrorism 9
- Operating systems (Computers) 9
- Privacy, Right of 9
- Computer software 7
- Testing 7
- Business enterprises 6
- Cloud computing 6
- Database security 6
- Government policy 6
- Law and legislation 6
- Mobile computing 6
-
301
Lessons from the identity trail anonymity, privacy and identity in a networked society /
Publicat 2009Matèries: “…Computer security Law and legislation.…”
An electronic book accessible through the World Wide Web; click to view
Electrònic eBook -
302
Oracle Identity and Access Manager 11g for administrators administer Oracle Identity and Access Management: installation, configuration, and day-to-day tasks /
Publicat 2011Matèries: “…Computer security.…”
An electronic book accessible through the World Wide Web; click to view
Electrònic eBook -
303
SQL injection attacks and defense
Publicat 2012Matèries: “…Computer security.…”
An electronic book accessible through the World Wide Web; click to view
Electrònic eBook -
304
Relation based access control /
Publicat 2010Matèries: “…Computer security.…”
An electronic book accessible through the World Wide Web; click to view
Electrònic eBook -
305
Network attacks & exploitation : a framework /
Publicat 2015Matèries: “…Computer security.…”
An electronic book accessible through the World Wide Web; click to view
Electrònic eBook -
306
Managing risk and information security : protect to enable /
Publicat 2016Matèries: “…Computer security 342…”
Llibre -
307
Information security a manager's guide to thwarting data thieves and hackers /
Publicat 2008Matèries: “…Computer security.…”
An electronic book accessible through the World Wide Web; click to view
Electrònic eBook -
308
Access contested : security, identity, and resistance in Asian cyberspace /
Publicat 2012Matèries: “…Computer Security.…”
Llibre -
309
Hack proofing ColdFusion
Publicat 2002Matèries: “…Computer security.…”
An electronic book accessible through the World Wide Web; click to view
Electrònic eBook -
310
CISSP Certified Information Systems Security Professional study guide /
Publicat 2005Matèries: “…Computer security Examinations Study guides.…”
An electronic book accessible through the World Wide Web; click to view
Electrònic eBook -
311
CISSP Certified Information systems Security Professional ; study guide /
Publicat 2008Matèries: “…Computer security Examinations Study guides.…”
An electronic book accessible through the World Wide Web; click to view
Electrònic eBook -
312
CISSP Certified Information Systems Security Professional study guide /
Publicat 2012Matèries: “…Computer security Examinations Study guides.…”
An electronic book accessible through the World Wide Web; click to view
Electrònic eBook -
313
Metasploit penetration testing cookbook over 70 recipes to master the most widely used penetration testing framework /
Publicat 2012Matèries: “…Penetration testing (Computer security)…”
An electronic book accessible through the World Wide Web; click to view
Electrònic eBook -
314
Social media security : leveraging social networking while mitigating risk /
Publicat 2013Matèries: “…Computer security.…”
An electronic book accessible through the World Wide Web; click to view
Electrònic eBook -
315
Information warfare /
Publicat 2016Matèries: “…Computer security Management.…”
An electronic book accessible through the World Wide Web; click to view
Electrònic eBook -
316
Building the Infrastructure for Cloud Security A Solutions view /
Publicat 2014Matèries: “…Computer security.…”
Obtenir text complet
Electrònic eBook -
317
Norway information security.
Publicat 2006Matèries: “…Computer security Norway.…”
Click to View
Electrònic eBook -
318
Resource optimization and security for cloud services /
Publicat 2014Matèries: “…Cloud computing Security measures.…”
An electronic book accessible through the World Wide Web; click to view
Electrònic eBook -
319
Stealing the network how to own an identity /
Publicat 2005Matèries: “…Computer security Fiction.…”
An electronic book accessible through the World Wide Web; click to view
Electrònic eBook -
320
Software and systems safety specification and verification /
Publicat 2011Matèries: “…Computer security Congresses.…”
An electronic book accessible through the World Wide Web; click to view
Electrònic Actes de congresos eBook