Результаты поиска - "Computer security."

  1. 41

    A process for developing a common vocabulary in the information security area

    Опубликовано 2007
    Предметы: “...Computer security....”
    An electronic book accessible through the World Wide Web; click to view
    Электронный ресурс Материалы конференции eКнига
  2. 42

    Computer forensics for dummies по Volonino, Linda

    Опубликовано 2008
    Предметы: “...Computer security....”
    An electronic book accessible through the World Wide Web; click to view
    Электронный ресурс eКнига
  3. 43

    Comptia Security+ 2008 in depth по Ciampa, Mark D.

    Опубликовано 2009
    Предметы: “...Computer security....”
    An electronic book accessible through the World Wide Web; click to view
    Электронный ресурс eКнига
  4. 44

    The official CHFI exam 312-49 study guide for computer hacking forensics investigators.

    Опубликовано 2007
    Предметы: “...Computer security....”
    An electronic book accessible through the World Wide Web; click to view
    Электронный ресурс eКнига
  5. 45

    Information security policy, processes, and practices /

    Опубликовано 2008
    Предметы: “...Computer security....”
    An electronic book accessible through the World Wide Web; click to view
    Электронный ресурс eКнига
  6. 46

    Dear hacker letters to the editor of 2600 / по Goldstein, Emmanuel J.

    Опубликовано 2010
    Предметы: “...Computer security....”
    An electronic book accessible through the World Wide Web; click to view
    Электронный ресурс eКнига
  7. 47

    Assessing information security strategies, tactics, logic and framework / по Vladimirov, Andrew A.

    Опубликовано 2010
    Предметы: “...Computer security....”
    An electronic book accessible through the World Wide Web; click to view
    Электронный ресурс eКнига
  8. 48

    Microsoft Forefront Identity Manager 2010 R2 handbook по Nordström, Kent

    Опубликовано 2012
    Предметы: “...Computer security....”
    An electronic book accessible through the World Wide Web; click to view
    Электронный ресурс eКнига
  9. 49

    Microsoft SQL Server 2012 security cookbook по Bruchez, Rudi

    Опубликовано 2012
    Предметы: “...Computer security....”
    An electronic book accessible through the World Wide Web; click to view
    Электронный ресурс eКнига
  10. 50

    Risk factors in computer-crime victimization по Choi, Kyung-shick, 1973-

    Опубликовано 2010
    Предметы: “...Computer security....”
    An electronic book accessible through the World Wide Web; click to view
    Электронный ресурс eКнига
  11. 51

    Spring Security 3.1 secure your web applications from hackers with the step-by-step guide / по Winch, Robert

    Опубликовано 2012
    Предметы: “...Computer security....”
    An electronic book accessible through the World Wide Web; click to view
    Электронный ресурс eКнига
  12. 52

    Secure multi-party computation

    Опубликовано 2013
    Предметы: “...Computer security Management....”
    An electronic book accessible through the World Wide Web; click to view
    Электронный ресурс eКнига
  13. 53

    Getting started with FortiGate / по Fabbri, Rosato

    Опубликовано 2013
    Предметы: “...Computer security....”
    An electronic book accessible through the World Wide Web; click to view
    Электронный ресурс eКнига
  14. 54

    Proceedings of the 11th European Conference on Information Warfare and Security : The Institute Ecole Superieure en Informatique Electronique et Automatique, Laval, France, 5-6 Jul...

    Опубликовано 2012
    Предметы: “...Computer security....”
    An electronic book accessible through the World Wide Web; click to view
    Электронный ресурс Материалы конференции eКнига
  15. 55

    Detection and intelligent systems for homeland security. /

    Опубликовано 2014
    Предметы: “...Computer security....”
    An electronic book accessible through the World Wide Web; click to view
    Электронный ресурс eКнига
  16. 56

    Penetration testing with backbox : an introductory guide to performing crucial penetration testing operations using backbox / по Uygur, Stefan Umit

    Опубликовано 2014
    Предметы: “...Penetration testing (Computer security)...”
    An electronic book accessible through the World Wide Web; click to view
    Электронный ресурс eКнига
  17. 57

    Configuring ISA server 2000 building firewalls for windows 2000 / по Shinder, Thomas W.

    Опубликовано 2001
    Предметы: “...Computer security....”
    An electronic book accessible through the World Wide Web; click to view
    Электронный ресурс eКнига
  18. 58

    Dr. Tom Shinder's configuring ISA Server 2004 по Shinder, Thomas W., Shinder, Debra Littlejohn

    Опубликовано 2005
    Предметы: “...Computer security....”
    An electronic book accessible through the World Wide Web; click to view
    Электронный ресурс eКнига
  19. 59

    Check Point NG VPN-1/Firewall-1 advanced configuration and troubleshooting /

    Опубликовано 2003
    Предметы: “...Firewalls (Computer security)...”
    An electronic book accessible through the World Wide Web; click to view
    Электронный ресурс eКнига
  20. 60

    Hack proofing your Web applications the only way to stop a hacker is to think like one /

    Опубликовано 2001
    Предметы: “...Computer security....”
    An electronic book accessible through the World Wide Web; click to view
    Электронный ресурс eКнига