Search Results - computer security
Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 731
- Computer security 650
- Computer networks 564
- National security 200
- Prevention 166
- History 160
- Foreign relations 116
- Data protection 113
- Politics and government 110
- Internet 108
- Government policy 100
- Access control 98
- Security, International 94
- POLITICAL SCIENCE 92
- Computer crimes 86
- Computers 86
- Political aspects 86
- Management 83
- Terrorism 78
- Information technology 74
- Social aspects 72
- Computer science 68
- Military policy 68
- Data encryption (Computer science) 58
- Examinations 56
- Operating systems (Computers) 56
- Law and legislation 54
- Economic aspects 52
- Certification 50
- Cyberterrorism 50
-
21
Computer forensics with FTK : enhance your computer forensics knowledge through illustrations, tips, tricks, and practical real-world scenarios /
Published 2014Subjects: “…Computer networks Security measures.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
22
Introduction to network security : theory and practice /
Published 2015Subjects: “…Computer networks Security measures.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
23
Introduction to network security : theory and practice /
Published 2015Subjects: “…Computer networks Security measures.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
24
Guide to computer network security /
Published 2017Subjects: “…Computer networks--Security measures 871…”
Book -
25
Guide to computer network security /
Published 2017Subjects: “…Computer networks--Security measures 871…”
Book -
26
Security 2020 reduce security risks this decade /
Published 2011Subjects: “…Computer security.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
27
Security 2020 reduce security risks this decade /
Published 2011Subjects: “…Computer security.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
28
Security
Published 2002An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
29
Security
Published 2002An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
30
Computer and information security handbook
Published 2009Subjects: “…Computer networks Security measures.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
31
Computer and information security handbook
Published 2009Subjects: “…Computer networks Security measures.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
32
The essential guide to home computer security
Published 2011Subjects: “…Computer networks Security measures.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
33
The essential guide to home computer security
Published 2011Subjects: “…Computer networks Security measures.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
34
Java security
Published 2002Subjects: “…Computer security.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
35
Java security
Published 2002Subjects: “…Computer security.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
36
Securing the cloud cloud computer security techniques and tactics /
Published 2011Table of Contents: “…Introduction to cloud computing and security -- Cloud computing architecture -- Security concerns, risk issues, and legal aspects -- Securing the cloud, architecture -- Securing the cloud, data security -- Securing the cloud, key strategies and best practices -- Security criteria, building an internal cloud -- Security criteria, selecting an external cloud provider -- Evaluating cloud security, an information security framework -- Operating a cloud.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
37
Securing the cloud cloud computer security techniques and tactics /
Published 2011Table of Contents: “…Introduction to cloud computing and security -- Cloud computing architecture -- Security concerns, risk issues, and legal aspects -- Securing the cloud, architecture -- Securing the cloud, data security -- Securing the cloud, key strategies and best practices -- Security criteria, building an internal cloud -- Security criteria, selecting an external cloud provider -- Evaluating cloud security, an information security framework -- Operating a cloud.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
38
Computer Forensics jumpstart
Published 2011Subjects: “…Computer security.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
39
Computer Forensics jumpstart
Published 2011Subjects: “…Computer security.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
40
Computer forensics for dummies
Published 2008Subjects: “…Computer security.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook