Результаты поиска - "Computer security."
Предлагаемые темы внутри своего поиска.
Предлагаемые темы внутри своего поиска.
- Computer security 330
- Security measures 188
- Computer networks 150
- Data protection 42
- Access control 32
- Computers 26
- Internet 24
- Computer crimes 22
- Computer hackers 22
- Firewalls (Computer security) 21
- Prevention 21
- Information technology 16
- Penetration testing (Computer security) 16
- Examinations 15
- Cryptography 13
- Data encryption (Computer science) 13
- Certification 12
- Management 12
- Electronic data processing personnel 11
- Cyberterrorism 9
- Operating systems (Computers) 9
- Privacy, Right of 9
- Computer software 7
- Testing 7
- Business enterprises 6
- Cloud computing 6
- Database security 6
- Government policy 6
- Law and legislation 6
- Mobile computing 6
-
41
A process for developing a common vocabulary in the information security area
Опубликовано 2007Предметы: “...Computer security....”
An electronic book accessible through the World Wide Web; click to view
Электронный ресурс Материалы конференции eКнига -
42
Computer forensics for dummies
Опубликовано 2008Предметы: “...Computer security....”
An electronic book accessible through the World Wide Web; click to view
Электронный ресурс eКнига -
43
Comptia Security+ 2008 in depth
Опубликовано 2009Предметы: “...Computer security....”
An electronic book accessible through the World Wide Web; click to view
Электронный ресурс eКнига -
44
The official CHFI exam 312-49 study guide for computer hacking forensics investigators.
Опубликовано 2007Предметы: “...Computer security....”
An electronic book accessible through the World Wide Web; click to view
Электронный ресурс eКнига -
45
Information security policy, processes, and practices /
Опубликовано 2008Предметы: “...Computer security....”
An electronic book accessible through the World Wide Web; click to view
Электронный ресурс eКнига -
46
Dear hacker letters to the editor of 2600 /
Опубликовано 2010Предметы: “...Computer security....”
An electronic book accessible through the World Wide Web; click to view
Электронный ресурс eКнига -
47
Assessing information security strategies, tactics, logic and framework /
Опубликовано 2010Предметы: “...Computer security....”
An electronic book accessible through the World Wide Web; click to view
Электронный ресурс eКнига -
48
Microsoft Forefront Identity Manager 2010 R2 handbook
Опубликовано 2012Предметы: “...Computer security....”
An electronic book accessible through the World Wide Web; click to view
Электронный ресурс eКнига -
49
Microsoft SQL Server 2012 security cookbook
Опубликовано 2012Предметы: “...Computer security....”
An electronic book accessible through the World Wide Web; click to view
Электронный ресурс eКнига -
50
Risk factors in computer-crime victimization
Опубликовано 2010Предметы: “...Computer security....”
An electronic book accessible through the World Wide Web; click to view
Электронный ресурс eКнига -
51
Spring Security 3.1 secure your web applications from hackers with the step-by-step guide /
Опубликовано 2012Предметы: “...Computer security....”
An electronic book accessible through the World Wide Web; click to view
Электронный ресурс eКнига -
52
Secure multi-party computation
Опубликовано 2013Предметы: “...Computer security Management....”
An electronic book accessible through the World Wide Web; click to view
Электронный ресурс eКнига -
53
Getting started with FortiGate /
Опубликовано 2013Предметы: “...Computer security....”
An electronic book accessible through the World Wide Web; click to view
Электронный ресурс eКнига -
54
Proceedings of the 11th European Conference on Information Warfare and Security : The Institute Ecole Superieure en Informatique Electronique et Automatique, Laval, France, 5-6 Jul...
Опубликовано 2012Предметы: “...Computer security....”
An electronic book accessible through the World Wide Web; click to view
Электронный ресурс Материалы конференции eКнига -
55
Detection and intelligent systems for homeland security. /
Опубликовано 2014Предметы: “...Computer security....”
An electronic book accessible through the World Wide Web; click to view
Электронный ресурс eКнига -
56
Penetration testing with backbox : an introductory guide to performing crucial penetration testing operations using backbox /
Опубликовано 2014Предметы: “...Penetration testing (Computer security)...”
An electronic book accessible through the World Wide Web; click to view
Электронный ресурс eКнига -
57
Configuring ISA server 2000 building firewalls for windows 2000 /
Опубликовано 2001Предметы: “...Computer security....”
An electronic book accessible through the World Wide Web; click to view
Электронный ресурс eКнига -
58
Dr. Tom Shinder's configuring ISA Server 2004
Опубликовано 2005Предметы: “...Computer security....”
An electronic book accessible through the World Wide Web; click to view
Электронный ресурс eКнига -
59
Check Point NG VPN-1/Firewall-1 advanced configuration and troubleshooting /
Опубликовано 2003Предметы: “...Firewalls (Computer security)...”
An electronic book accessible through the World Wide Web; click to view
Электронный ресурс eКнига -
60
Hack proofing your Web applications the only way to stop a hacker is to think like one /
Опубликовано 2001Предметы: “...Computer security....”
An electronic book accessible through the World Wide Web; click to view
Электронный ресурс eКнига