Computer security.
Overview
Works: | 123 works in 123 publications in 123 languages |
---|
Titles
E-policy :how to develop computer, E-policy, and Internet guidelines to protect your company and its assets /
by:
(Language materials, printed)
Security transformation :digital defense strategies to protect your company's reputation and market share /
by:
(Language materials, printed)
Digital defense :what you should know about protecting your company's assets /
by:
(Language materials, printed)
Security+ guide to network security fundamentals :by cisco learning institute /
by:
(Language materials, printed)
Check Point NG VPN-1/firewall-1 :advanced configuration and troubleshooting /
by:
(Language materials, printed)
Current security management & ethical issues of information technology /
by:
(Language materials, printed)
Inside Java 2 platform security :architecture, API design, and implementation /
by:
(Language materials, printed)
Building secure softwarehow to avoid security problems the right way /
by:
(Language materials, printed)
Cryptography for Internet and database applications :developing secret and public key techniques with Java /
by:
(Language materials, printed)
Trojans, worms, and spyware :a computer security professional's guide to malicious code /
by:
(Language materials, printed)
Complexity theory and cryptology :an introduction to cryptocomplexity /
by:
(Language materials, printed)
The shellcoder's handbook :discovering and exploiting security holes /
by:
(Language materials, printed)
Secure computer and network systems :modeling, analysis and design /
by:
(Language materials, printed)
Securing the cloud :cloud computer security techniques and tactics /
by:
(Language materials, printed)
Anonymous security systems and applications :requirements and solutions /
by:
(Language materials, printed)
Social media security :leveraging social networking while mitigating risk /
by:
(Language materials, printed)
The basics of digital privacy :simple tools to protect your personal information and your identity online /
by:
(Language materials, printed)
The basics of IT audit :purposes, processes, and practical information /
by:
(Language materials, printed)
Insider threatprotecting the enterprise from sabotage, spying, and theft /
by:
(Electronic resources)
Techniques and applications of digital watermarking and content protection
by:
(Electronic resources)
Cryptography for Internet and database applicationsdeveloping secret and public key techniques with Java /
by:
(Electronic resources)
The secure online businesse-commerce, IT functionality & business continuity /
by:
(Electronic resources)
The secure online businesse-commerce, IT functionality & business continuity /
by:
(Electronic resources)
Techniques and applications of digital watermarking and content protection
by:
(Electronic resources)
Safeguarding critical e-documents :implementing a program for securing confidential information assets /
by:
(Language materials, printed)
Cryptographic and information security :approaches for images and videos /
by:
(Language materials, printed)
Hunting cyber criminals :a hacker's guide to online intelligence gathering tools and techniques /
by:
(Language materials, printed)
Reinforcement learning for cyber-physical systems with cybersecurity case studies /
by:
(Language materials, printed)
A beginner's guide to Internet of things security :attacks, applications, authentication, and fundamentals /
by:
(Language materials, printed)
Modern cybersecurity practices :exploring and implementing agile cybersecurity frameworks and strategies for your organization /
by:
(Language materials, printed)
Computational data and social networks :9th international conference, CSoNet 2020, Dallas, TX, USA, December 11-13, 2020 : proceedings /
by:
(Language materials, printed)
Python for cybersecurity :using Python for cyber offense and defense /
by:
(Language materials, printed)
Snowflake access control :mastering the features for data privacy and regulatory compliance /
by:
(Language materials, printed)
Tor browser :learn how to claim your privacy in the internet world and hide your Ip, hide your ip address and ensure internet priva /
by:
(Language materials, printed)
Show more
Fewer
Subjects