Ngā hua rapu - "Computer security."

  1. 21

    Introduction to computer security / Bishop, Matt

    I whakaputaina 2006
    Ngā marau: “…Computer security.…”
    Pukapuka
  2. 22

    Computer security / Gollmann, Dieter

    I whakaputaina 2006
    Ngā marau: “…Computer security.…”
    Pukapuka
  3. 23

    Computer security : Principles and practice / Stallings, William

    I whakaputaina 2008
    Ngā marau: “…Computer security.…”
    Pukapuka
  4. 24

    Computers at risk safe computing in the information age /

    I whakaputaina 1991
    Ngā marau: “…Computer security.…”
    An electronic book accessible through the World Wide Web; click to view
    Tāhiko īPukapuka
  5. 25

    Demystifying Intelligent Multimode Security Systems : An Edge-To-Cloud Cybersecurity Solutions Guide / Booth, Jody

    I whakaputaina 2023
    Ngā marau: “…Computer security.…”
    Click to View
    Tāhiko īPukapuka
  6. 26

    Hack proofing Linux: a guide to open source security the only way to stop a hacker is to think like one / Stanger, James

    I whakaputaina 2001
    Ngā marau: “…Computer security.…”
    An electronic book accessible through the World Wide Web; click to view
    Tāhiko īPukapuka
  7. 27

    Linux security Siddiqui, Shadab

    I whakaputaina 2002
    Ngā marau: “…Computer security.…”
    An electronic book accessible through the World Wide Web; click to view
    Tāhiko īPukapuka
  8. 28

    Cyber spying tracking your family's (sometimes) secret online lives / Fair, Ted

    I whakaputaina 2005
    Ngā marau: “…Computer security.…”
    An electronic book accessible through the World Wide Web; click to view
    Tāhiko īPukapuka
  9. 29

    Contemporary cryptography Oppliger, Rolf

    I whakaputaina 2005
    Ngā marau: “…Computer security.…”
    An electronic book accessible through the World Wide Web; click to view
    Tāhiko īPukapuka
  10. 30

    Basics of contemporary cryptography for IT practitioners Ryabko, Boris

    I whakaputaina 2005
    Ngā marau: “…Computer security.…”
    An electronic book accessible through the World Wide Web; click to view
    Tāhiko īPukapuka
  11. 31

    Firewall design and analysis Liu, Alex X.

    I whakaputaina 2011
    Ngā marau: “…Firewalls (Computer security)…”
    An electronic book accessible through the World Wide Web; click to view
    Tāhiko īPukapuka
  12. 32

    Firewall design and analysis Liu, Alex X.

    I whakaputaina 2011
    Ngā marau: “…Firewalls (Computer security)…”
    An electronic book accessible through the World Wide Web; click to view
    Tāhiko īPukapuka
  13. 33

    Hacking the hacker / Grimes, Roger A.

    I whakaputaina 2017
    Ngā marau: “…Computer security.…”
    An electronic book accessible through the World Wide Web; click to view
    Tāhiko īPukapuka
  14. 34

    Hack proofing Linux: a guide to open source security the only way to stop a hacker is to think like one / Stanger, James

    I whakaputaina 2001
    Ngā marau: “…Computer security.…”
    An electronic book accessible through the World Wide Web; click to view
    Tāhiko īPukapuka
  15. 35

    Linux security Siddiqui, Shadab

    I whakaputaina 2002
    Ngā marau: “…Computer security.…”
    An electronic book accessible through the World Wide Web; click to view
    Tāhiko īPukapuka
  16. 36

    Cyber spying tracking your family's (sometimes) secret online lives / Fair, Ted

    I whakaputaina 2005
    Ngā marau: “…Computer security.…”
    An electronic book accessible through the World Wide Web; click to view
    Tāhiko īPukapuka
  17. 37

    Contemporary cryptography Oppliger, Rolf

    I whakaputaina 2005
    Ngā marau: “…Computer security.…”
    An electronic book accessible through the World Wide Web; click to view
    Tāhiko īPukapuka
  18. 38

    Basics of contemporary cryptography for IT practitioners Ryabko, Boris

    I whakaputaina 2005
    Ngā marau: “…Computer security.…”
    An electronic book accessible through the World Wide Web; click to view
    Tāhiko īPukapuka
  19. 39

    Hacking the hacker / Grimes, Roger A.

    I whakaputaina 2017
    Ngā marau: “…Computer security.…”
    An electronic book accessible through the World Wide Web; click to view
    Tāhiko īPukapuka
  20. 40

    Stealing the network how to own a continent /

    I whakaputaina 2004
    Ngā marau: “…Computer security.…”
    An electronic book accessible through the World Wide Web; click to view
    Tāhiko īPukapuka