Resultados da busca - "Computer security."
Sugestões de Tópicos dentro de sua busca.
Sugestões de Tópicos dentro de sua busca.
- Computer security 330
- Security measures 188
- Computer networks 150
- Data protection 42
- Access control 32
- Computers 26
- Internet 24
- Computer crimes 22
- Computer hackers 22
- Firewalls (Computer security) 21
- Prevention 21
- Information technology 16
- Penetration testing (Computer security) 16
- Examinations 15
- Cryptography 13
- Data encryption (Computer science) 13
- Certification 12
- Management 12
- Electronic data processing personnel 11
- Cyberterrorism 9
- Operating systems (Computers) 9
- Privacy, Right of 9
- Computer software 7
- Testing 7
- Business enterprises 6
- Cloud computing 6
- Database security 6
- Government policy 6
- Law and legislation 6
- Mobile computing 6
-
121
BackTrack 5 cookbook over 80 recipes to execute many of the best known and little known penetration testing aspects of BackTrack 5 /
Publicado em 2012Assuntos: “…Penetration testing (Computer security)…”
An electronic book accessible through the World Wide Web; click to view
Recurso Eletrônico livro eletrônico -
122
Enterprise security a data-centric approach to securing the enterprise : a guide to applying data-centric security concepts for securing enterprise data to enable an agile enterpri...
Publicado em 2013Assuntos: “…Computer security.…”
An electronic book accessible through the World Wide Web; click to view
Recurso Eletrônico livro eletrônico -
123
Instant Java password and authentication security /
Publicado em 2013Assuntos: “…Computer security.…”
An electronic book accessible through the World Wide Web; click to view
Recurso Eletrônico livro eletrônico -
124
Proceedings of the 7th International Conference on Information Warfare and Security : Center for Information Assurance and Cybersecurity, University of Washington, Seattle, USA, 22...
Publicado em 2012Assuntos: “…Computer security Congresses.…”
An electronic book accessible through the World Wide Web; click to view
Recurso Eletrônico Anais de Congresso livro eletrônico -
125
Threat modeling : designing for security /
Publicado em 2014Assuntos: “…Computer security.…”
An electronic book accessible through the World Wide Web; click to view
Recurso Eletrônico livro eletrônico -
126
Cloud management and security /
Publicado em 2014Assuntos: “…Computer security.…”
An electronic book accessible through the World Wide Web; click to view
Recurso Eletrônico livro eletrônico -
127
Black hat Python : Python programming for hackers and pentesters /
Publicado em 2015Assuntos: “…Computer security.…”
An electronic book accessible through the World Wide Web; click to view
Recurso Eletrônico livro eletrônico -
128
Security in distributed, grid, mobile, and pervasive computing /
Publicado em 2007Assuntos: “…Computer security.…”
Click to View
Recurso Eletrônico livro eletrônico -
129
Computer and information security handbook
Publicado em 2009Assuntos: “…Computer security.…”
An electronic book accessible through the World Wide Web; click to view
Recurso Eletrônico livro eletrônico -
130
Violent Python a cookbook for hackers, forensic analysts, penetration testers and security engineers /
Publicado em 2013Assuntos: “…Computer security.…”
An electronic book accessible through the World Wide Web; click to view
Recurso Eletrônico livro eletrônico -
131
Linux server security : hack and defend /
Publicado em 2016Assuntos: “…Computer security.…”
An electronic book accessible through the World Wide Web; click to view
Recurso Eletrônico livro eletrônico -
132
Security and privacy in the digital era.
Publicado em 2016Assuntos: “…Computer security.…”
An electronic book accessible through the World Wide Web; click to view
Recurso Eletrônico livro eletrônico -
133
Cybersecurity today and tomorrow pay now or pay later /
Publicado em 2002Assuntos: “…Computer security.…”
An electronic book accessible through the World Wide Web; click to view
Recurso Eletrônico livro eletrônico -
134
-
135
Fighting computer crime : a new framework for protecting information /
Publicado em 1998Assuntos: “…Computer security.…”
Table of Contents
Contributor biographical information
Publisher description
Livro -
136
Hack proofing Sun Solaris 8
Publicado em 2001Assuntos: “…Computer security.…”
An electronic book accessible through the World Wide Web; click to view
Recurso Eletrônico livro eletrônico -
137
Check Point NG next generation security administration /
Publicado em 2002Assuntos: “…Computer security.…”
An electronic book accessible through the World Wide Web; click to view
Recurso Eletrônico livro eletrônico -
138
Best damn firewall book period
Publicado em 2003Assuntos: “…Firewalls (Computer security)…”
An electronic book accessible through the World Wide Web; click to view
Recurso Eletrônico livro eletrônico -
139
WarDriving drive, detect, defend: a guide to wireless security /
Publicado em 2004Assuntos: “…Computer security.…”
An electronic book accessible through the World Wide Web; click to view
Recurso Eletrônico livro eletrônico -
140
Configuring NetScreen Firewalls
Publicado em 2005Assuntos: “…Firewalls (Computer security)…”
An electronic book accessible through the World Wide Web; click to view
Recurso Eletrônico livro eletrônico