Ngā hua rapu - "Computer security."
Ngā kaupapa kua whakahuatia i roto i tō rapu.
Ngā kaupapa kua whakahuatia i roto i tō rapu.
- Computer security 660
- Security measures 375
- Computer networks 300
- Data protection 84
- Access control 64
- Computers 52
- Internet 47
- Computer crimes 44
- Computer hackers 43
- Firewalls (Computer security) 42
- Prevention 42
- Information technology 32
- Penetration testing (Computer security) 32
- Examinations 30
- Cryptography 26
- Data encryption (Computer science) 26
- Management 25
- Certification 24
- Electronic data processing personnel 22
- Cyberterrorism 18
- Operating systems (Computers) 18
- Privacy, Right of 17
- Computer software 14
- Testing 14
- Business enterprises 12
- Cloud computing 12
- Database security 12
- Government policy 12
- Law and legislation 12
- Reliability 12
-
21
-
22
-
23
Computer security : Principles and practice /
I whakaputaina 2008Ngā marau: “…Computer security.…”
Pukapuka -
24
Computers at risk safe computing in the information age /
I whakaputaina 1991Ngā marau: “…Computer security.…”
An electronic book accessible through the World Wide Web; click to view
Tāhiko īPukapuka -
25
Demystifying Intelligent Multimode Security Systems : An Edge-To-Cloud Cybersecurity Solutions Guide /
I whakaputaina 2023Ngā marau: “…Computer security.…”
Click to View
Tāhiko īPukapuka -
26
Hack proofing Linux: a guide to open source security the only way to stop a hacker is to think like one /
I whakaputaina 2001Ngā marau: “…Computer security.…”
An electronic book accessible through the World Wide Web; click to view
Tāhiko īPukapuka -
27
Linux security
I whakaputaina 2002Ngā marau: “…Computer security.…”
An electronic book accessible through the World Wide Web; click to view
Tāhiko īPukapuka -
28
Cyber spying tracking your family's (sometimes) secret online lives /
I whakaputaina 2005Ngā marau: “…Computer security.…”
An electronic book accessible through the World Wide Web; click to view
Tāhiko īPukapuka -
29
Contemporary cryptography
I whakaputaina 2005Ngā marau: “…Computer security.…”
An electronic book accessible through the World Wide Web; click to view
Tāhiko īPukapuka -
30
Basics of contemporary cryptography for IT practitioners
I whakaputaina 2005Ngā marau: “…Computer security.…”
An electronic book accessible through the World Wide Web; click to view
Tāhiko īPukapuka -
31
Firewall design and analysis
I whakaputaina 2011Ngā marau: “…Firewalls (Computer security)…”
An electronic book accessible through the World Wide Web; click to view
Tāhiko īPukapuka -
32
Firewall design and analysis
I whakaputaina 2011Ngā marau: “…Firewalls (Computer security)…”
An electronic book accessible through the World Wide Web; click to view
Tāhiko īPukapuka -
33
Hacking the hacker /
I whakaputaina 2017Ngā marau: “…Computer security.…”
An electronic book accessible through the World Wide Web; click to view
Tāhiko īPukapuka -
34
Hack proofing Linux: a guide to open source security the only way to stop a hacker is to think like one /
I whakaputaina 2001Ngā marau: “…Computer security.…”
An electronic book accessible through the World Wide Web; click to view
Tāhiko īPukapuka -
35
Linux security
I whakaputaina 2002Ngā marau: “…Computer security.…”
An electronic book accessible through the World Wide Web; click to view
Tāhiko īPukapuka -
36
Cyber spying tracking your family's (sometimes) secret online lives /
I whakaputaina 2005Ngā marau: “…Computer security.…”
An electronic book accessible through the World Wide Web; click to view
Tāhiko īPukapuka -
37
Contemporary cryptography
I whakaputaina 2005Ngā marau: “…Computer security.…”
An electronic book accessible through the World Wide Web; click to view
Tāhiko īPukapuka -
38
Basics of contemporary cryptography for IT practitioners
I whakaputaina 2005Ngā marau: “…Computer security.…”
An electronic book accessible through the World Wide Web; click to view
Tāhiko īPukapuka -
39
Hacking the hacker /
I whakaputaina 2017Ngā marau: “…Computer security.…”
An electronic book accessible through the World Wide Web; click to view
Tāhiko īPukapuka -
40
Stealing the network how to own a continent /
I whakaputaina 2004Ngā marau: “…Computer security.…”
An electronic book accessible through the World Wide Web; click to view
Tāhiko īPukapuka