Search Results - computer security

  1. 21
  2. 22

    Introduction to network security : theory and practice / by Wang, Jie, 1961-, Kissel, Zachary A.

    Published 2015
    Subjects: “…Computer networks Security measures.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  3. 23

    Introduction to network security : theory and practice / by Wang, Jie, 1961-, Kissel, Zachary A.

    Published 2015
    Subjects: “…Computer networks Security measures.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  4. 24

    Guide to computer network security / by Kizza, Joseph Migga

    Published 2017
    Subjects: “…Computer networks--Security measures 871…”
    Book
  5. 25

    Guide to computer network security / by Kizza, Joseph Migga

    Published 2017
    Subjects: “…Computer networks--Security measures 871…”
    Book
  6. 26

    Security 2020 reduce security risks this decade / by Howard, Doug

    Published 2011
    Subjects: “…Computer security.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  7. 27

    Security 2020 reduce security risks this decade / by Howard, Doug

    Published 2011
    Subjects: “…Computer security.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  8. 28

    Security

    Published 2002
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  9. 29

    Security

    Published 2002
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  10. 30

    Computer and information security handbook

    Published 2009
    Subjects: “…Computer networks Security measures.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  11. 31

    Computer and information security handbook

    Published 2009
    Subjects: “…Computer networks Security measures.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  12. 32

    The essential guide to home computer security by Rowlingson, Robert R.

    Published 2011
    Subjects: “…Computer networks Security measures.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  13. 33

    The essential guide to home computer security by Rowlingson, Robert R.

    Published 2011
    Subjects: “…Computer networks Security measures.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  14. 34

    Java security by Sethi, Harpreet

    Published 2002
    Subjects: “…Computer security.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  15. 35

    Java security by Sethi, Harpreet

    Published 2002
    Subjects: “…Computer security.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  16. 36

    Securing the cloud cloud computer security techniques and tactics / by Winkler, J. R. (Joachim R.)

    Published 2011
    Table of Contents: “…Introduction to cloud computing and security -- Cloud computing architecture -- Security concerns, risk issues, and legal aspects -- Securing the cloud, architecture -- Securing the cloud, data security -- Securing the cloud, key strategies and best practices -- Security criteria, building an internal cloud -- Security criteria, selecting an external cloud provider -- Evaluating cloud security, an information security framework -- Operating a cloud.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  17. 37

    Securing the cloud cloud computer security techniques and tactics / by Winkler, J. R. (Joachim R.)

    Published 2011
    Table of Contents: “…Introduction to cloud computing and security -- Cloud computing architecture -- Security concerns, risk issues, and legal aspects -- Securing the cloud, architecture -- Securing the cloud, data security -- Securing the cloud, key strategies and best practices -- Security criteria, building an internal cloud -- Security criteria, selecting an external cloud provider -- Evaluating cloud security, an information security framework -- Operating a cloud.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  18. 38

    Computer Forensics jumpstart

    Published 2011
    Subjects: “…Computer security.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  19. 39

    Computer Forensics jumpstart

    Published 2011
    Subjects: “…Computer security.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  20. 40

    Computer forensics for dummies by Volonino, Linda

    Published 2008
    Subjects: “…Computer security.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook