Limit Search Results
Author
Language
Subject
Switch to list view
Switch to thumbnail view
2615 Results Found Subscribe to search results
000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000MAIN
Print
1. 
Cover image for Computer security
2. 
Cover image for Computer security
4. 
Cover image for Computer security
6. 
Cover image for Computer security
7. 
Cover image for Computer security
8. 
Cover image for Computer security
9. 
Cover image for Computer security
11. 
Cover image for Computer Security Fundamentals
12. 
Cover image for Corporate computer security.
15. 
Cover image for Computer Network Security
17. 
Cover image for Computer security handbook
18. 
Cover image for Computer security handbook
19. 
Cover image for Computer-security technology
20. 
Cover image for Computer data security
30. 
Cover image for Computer security and cryptography
34. 
Cover image for Computer security and information integrity
36. 
Cover image for Computer security : principles and practice
37. 
Cover image for Computer security and penetration testing
38. 
Cover image for Security mechanisms for computer networks
42. 
Cover image for Computer and information security handbook
43. 
Cover image for Security basics for computer architects
44. 
Cover image for Computer security : protecting digital resources
45. 
Cover image for Collaborative computer security and trust management
47. 
Cover image for Simple computer security : disinfect your PC
50. 
Cover image for Corporate computer and network security
53. 
Cover image for Computer audit, control and security
56. 
Cover image for Tutorial : computer and network security
58. 
Cover image for Security of computer based information systems
65. 
Cover image for Computer Security : A Hands-on Approach
78. 
Cover image for Computer security assurance using the common criteria
80. 
Cover image for Principles of computer security : security and beyond
83. 
Cover image for Modern methods for computer security and privacy
84. 
Cover image for Security, accuracy, and privacy in computer systems
85. 
Cover image for Computer Security - ESORICS 2007 12th European Symposium On Research In Computer Security, Dresden, Germany, September 24-26, 2007: Proceedings
86. 
Cover image for Computer Network Security Fourth International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2007, St. Petersburg, Russia, September 13-15, 2007. Proceedings.
89. 
Cover image for Computer and Cyber Security : Principles, Algorithm, Applications, and Perspectives
90. 
Cover image for Machine Learning for Computer and Cyber Security : Principles, Algorithms, and Practices
95. 
Cover image for Analyzing computer security : a threat/vulnerability/countermeasure approach
98. 
Cover image for Securing the cloud : cloud computer security techniques and tactics
99. 
Cover image for The Stuxnet Computer Worm and industrial control system security
102. 
Cover image for Principles of computer security : CompTIA security+ and beyond
104. 
Cover image for Principles of computer security: CompTIA security+ and beyond
110. 
Cover image for Visualization for computer security : 5th International Workshop, VizSec 2008, Cambridge, MA, USA, September 15, 2008, Proceedings
112. 
Cover image for Computer Safety, Reliability, and Security 26th International Conference, SAFECOMP 2007, Nuremberg, Germany, September 18-21, 2007: Proceedings
113. 
Cover image for Advances in Information and Computer Security Second International Workshop on Security, IWSEC 2007, Nara, Japan, October 29-31, 2007: Proceedings
114. 
Cover image for Computer system security : basic concepts and solved exercises
115. 
Cover image for Advances in computer science--ASIAN 2007 computer and network security : 12th Asian Computing Science Conference, Doha, Qatar, December 9-11, 2007 : proceedings
118. 
Cover image for Advances in information and computer security : first International Workshop on Security, IWSEC 2006, Kyoto, Japan, October 23-24, 2006 : proceedings
119. 
Cover image for Network control and engineering for QoS, security and mobility, V :  IFIP 19th World Computer Congress, TC-6, 5th IFIP International Conference on Network Control and Engineering for QoS, Security and Mobility, August 20-25, 2006, Santiago, Chile
123. 
Cover image for Defeating the hacker : a non-technical guide to computer security
125. 
Cover image for Real digital forensics :  computer security and incident response
126. 
Cover image for Computer security : 20 things every employee should know
128. 
Cover image for Certification and security in e-services : from e-government to e-business : IFIP 17th World Computer Congress, TC11 stream on security in e-services, August 26-29, 2002, Montr�eal, Qu�ebec, Canada
133. 
Cover image for Security for computer networks : an introduction to data security in teleprocessing and electronic funds transfer
135. 
Cover image for Auditing computer security : a manual with case studies
139. 
Cover image for Security for computer networks : an introduction to data security in teleprocessing and electronic funds transfer
149. 
Cover image for Role-based access control
151. 
Cover image for Trust and security in collaborative computing
155. 
Cover image for Implementing security for ATM networks
156. 
Cover image for Security in wireless LANs and MANs
159. 
Cover image for Bluetooth security
160. 
Cover image for Developing secure distributed systems with CORBA
162. 
Cover image for Non-repudiation in electronic commerce
165. 
Cover image for Protecting intellectual property in space
166. 
Cover image for Security and protection in information system
176. 
Cover image for CYBER INFLUENCE AND COGNITIVE THREATS
177. 
Cover image for Digital Image Watermarking : Theoretical and Computational Advances
178. 
Cover image for Security in IoT-Enabled Space
179. 
Cover image for Advances of DNA computing in cryptography
184. 
Cover image for CompTIA security+ guide to network security fundamentals
185. 
Cover image for Security and Privacy in Cyber-Physical Systems : Foundations, Principles, and Applications
187. 
Cover image for CYBERSECURITY ESSENTIALS
189. 
Cover image for Advanced Persistent Security : A Cyberwarfare Approach to Implementing Adaptive Enterprise Protection, Detection, and Reaction Strategies
194. 
Cover image for Discovering Computers 2017 : Tools, Apps, Devices, and the Impact of Technology
207. 
Cover image for Secure development for mobile apps : how to design and code secure mobile applications with PHP and javascript
209. 
Cover image for Computing security & cryptography handbook
210. 
Cover image for Biometric technology : authentication, biocryptography, and cloud-based architecture
211. 
Cover image for Applications of cryptography and network security
212. 
Cover image for Ethical hacking and penetration testing guide
213. 
Cover image for Legal issues in information security
214. 
Cover image for Industrial network security :  securing critical infrastructure networks for smart grid, SCADA, and other industrial control systems
215. 
Cover image for Information hiding in speech signals for secure communication
216. 
Cover image for CHFI computer hacking forensic investigator : exam guide
217. 
Cover image for CHFI computer hacking forensic investigator certification  exam guide
235. 
Cover image for Introduction to modern cryptography
236. 
Cover image for Web security : a WhiteHat perspective
237. 
Cover image for Case studies in secure computing : achievements and trends
238. 
Cover image for Information security : principles and new concepts
240. 
Cover image for Hardware security : design, threats, and safeguards
243. 
Cover image for Information security analytics : finding security insights, patterns, and anomalies in big data
244. 
Cover image for Computational network science : an algorithmic approach
245. 
Cover image for Cyberwarfare : information operations in a connected world
246. 
Cover image for Managing risk in information systems
247. 
Cover image for Security policies and implementation issues
261. 
Cover image for Cybersecurity : managing systems, conducting testing, and investigating intrusions
265. 
Cover image for Security management of next generation telecommunications networks and services
266. 
Cover image for Digital communication : communication, multimedia, security
268. 
Cover image for Hands-on information security lab manual
269. 
Cover image for Image encryption : a communication perspective
274. 
Cover image for Emerging trends in ICT security
275. 
Cover image for Managing information security
276. 
Cover image for Business continuity and disaster recovery planning for IT professionals
278. 
Cover image for Social media security : leveraging social networking while mitigating risk
279. 
Cover image for Identity and access management : business performanve through connected intelligence
283. 
Cover image for Hacking with Kali : practical penetration testing techniques
285. 
Cover image for Fundamentals of information systems security
287. 
Cover image for Security strategies in windows platforms and applications
288. 
Cover image for Hacker techniques, tools, and incident handling
289. 
Cover image for Learning nessus for penetration testing : master how to perfom IT infrastructure security vulnerability assessments using nessus with tips and insights from real-world challenges faced during vulnerability assessment
290. 
Cover image for Conducting network penetration and espionage in a global environment
Go to:Search Results
|
Top of Page
|
Search Facets