Sökresultat - "Computer security."
Rekommenderade teman
Rekommenderade teman
- Computer security 330
- Security measures 188
- Computer networks 150
- Data protection 42
- Access control 32
- Computers 26
- Internet 24
- Computer crimes 22
- Computer hackers 22
- Firewalls (Computer security) 21
- Prevention 21
- Information technology 16
- Penetration testing (Computer security) 16
- Examinations 15
- Cryptography 13
- Data encryption (Computer science) 13
- Certification 12
- Management 12
- Electronic data processing personnel 11
- Cyberterrorism 9
- Operating systems (Computers) 9
- Privacy, Right of 9
- Computer software 7
- Testing 7
- Business enterprises 6
- Cloud computing 6
- Database security 6
- Government policy 6
- Law and legislation 6
- Mobile computing 6
-
61
Special issue on internet security
Publicerad 2002Ämnen: “…Computer security.…”
An electronic book accessible through the World Wide Web; click to view
Elektronisk E-bok -
62
Google Hacking for Penetration Testers
Publicerad 2005Ämnen: “…Computer security.…”
An electronic book accessible through the World Wide Web; click to view
Elektronisk E-bok -
63
Aggressive network self-defense
Publicerad 2005Ämnen: “…Computer security.…”
An electronic book accessible through the World Wide Web; click to view
Elektronisk E-bok -
64
Mission-critical network planning
Publicerad 2003Ämnen: “…Computer security.…”
An electronic book accessible through the World Wide Web; click to view
Elektronisk E-bok -
65
A practical guide to managing information security
Publicerad 2004Ämnen: “…Computer security Management.…”
An electronic book accessible through the World Wide Web; click to view
Elektronisk E-bok -
66
Multilevel security and DB2 row-level security revealed
Publicerad 2005Ämnen: “…Computer security.…”
An electronic book accessible through the World Wide Web; click to view
Elektronisk E-bok -
67
zSeries crypto guide update
Publicerad 2003Ämnen: “…Computer security.…”
An electronic book accessible through the World Wide Web; click to view
Elektronisk E-bok -
68
IBM eserver zSeries 990 (z990) cryptography implementation
Publicerad 2004Ämnen: “…Computer security.…”
An electronic book accessible through the World Wide Web; click to view
Elektronisk E-bok -
69
Combating spyware in the enterprise
Publicerad 2006Ämnen: “…Computer security.…”
An electronic book accessible through the World Wide Web; click to view
Elektronisk E-bok -
70
Part-themed issue on internet security
Publicerad 2006Ämnen: “…Computer security.…”
An electronic book accessible through the World Wide Web; click to view
Elektronisk E-bok -
71
Risk management for computer security Protecting your network and information assets /
Publicerad 2005Ämnen: “…Computer security.…”
An electronic book accessible through the World Wide Web; click to view
Elektronisk E-bok -
72
Zen and the art of information security
Publicerad 2007Ämnen: “…Computer security.…”
An electronic book accessible through the World Wide Web; click to view
Elektronisk E-bok -
73
Algorithms, architectures and information systems security
Publicerad 2009Ämnen: “…Computer security Congresses.…”
An electronic book accessible through the World Wide Web; click to view
Elektronisk Konferenspublikation E-bok -
74
The web application hacker's handbook finding and exploiting security flaws /
Publicerad 2011Ämnen: “…Computer security.…”
An electronic book accessible through the World Wide Web; click to view
Elektronisk E-bok -
75
Information security management principles
Publicerad 2013Ämnen: “…Computer security Management.…”
An electronic book accessible through the World Wide Web; click to view
Elektronisk E-bok -
76
OAuth 2.0 identity and access management patterns /
Publicerad 2013Ämnen: “…Computer security.…”
An electronic book accessible through the World Wide Web; click to view
Elektronisk E-bok -
77
The art of memory forensics : detecting malware and threats in Windows, Linux, and Mac Memory /
Publicerad 2014Ämnen: “…Computer security.…”
An electronic book accessible through the World Wide Web; click to view
Elektronisk E-bok -
78
Chinese cybersecurity and defense /
Publicerad 2014Ämnen: “…Computer security.…”
An electronic book accessible through the World Wide Web; click to view
Elektronisk E-bok -
79
-
80
Hack proofing XML
Publicerad 2002Ämnen: “…Computer security.…”
An electronic book accessible through the World Wide Web; click to view
Elektronisk E-bok