Search Results - hacker (computer security)
Suggested Topics within your search.
Suggested Topics within your search.
- Computer security 33
- Security measures 23
- Computer hackers 21
- Computer networks 18
- Computer crimes 7
- Prevention 6
- Penetration testing (Computer security) 4
- Internet 3
- Python (Computer program language) 3
- Testing 3
- Application software 2
- Cyberspace 2
- Cyberterrorism 2
- Examinations 2
- Hackers 2
- Hacking 2
- Information technology 2
- Moral and ethical aspects 2
- Operating systems (Computers) 2
- Social engineering 2
- Web sites 2
- Access control 1
- Android (Electronic resource) 1
- Biological laboratories 1
- Business enterprises 1
- COMPUTERS / Cryptography 1
- COMPUTERS / Internet / Security 1
- COMPUTERS / Networking / Security 1
- COVID-19 Pandemic, 2020- 1
- Certification 1
-
41
Cybersecurity in the COVID-19 Pandemic /
Published 2021Taylor & Francis
OCLC metadata license agreement
Electronic eBook -
42
Computer forensics an essential guide for accountants, lawyers, and managers /
Published 2007Table of Contents: “…-- Output -- Conclusion -- Preservation and collection of digital evidence -- Introduction -- Rules of evidence -- Preservation -- Collection -- Conclusion -- Analysis of digital evidence -- Introduction -- Forensic analysis -- Conclusion -- Reporting and rendering the opinion -- Introduction -- Preparing the report -- Presentation -- The trial process -- Conclusion -- Computer attacks -- Hackers and phreakz oh my -- The hacker: unauthorized use and trespassing -- Wireless hacking -- Malware -- Attacks from the inside -- Conclusion -- Computers as tools for evil -- Introduction -- Computers and crime -- Identity theft -- Concealment -- Auction fraud and retail cons -- Counterfeiting and forgery -- Prostitution -- Securities fraud -- Conclusion -- Computer tools and the forensic examination -- Introduction -- Assuming control of the case -- Understand the case -- Evaluate the evidence -- Examining the ?…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
43
-
44
-
45
Security-aware Mobile Application Development Lifecycle (sMADLC)
Published 2023Get full text
Article -
46
Crisis and escalation in cyberspace /
Published 2012An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
47
Management of animal care and use programs in research, teaching, and testing /
Published 2017Click here to view.
Electronic eBook