Limit Search Results
Author
Language
Format
Subject
Switch to list view
Switch to thumbnail view
235 Results Found Subscribe to search results
0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000MAIN
Print
1. 
Cover image for Security in IoT-Enabled Space
2. 
Cover image for Network Forensics
5. 
Cover image for Web security : a WhiteHat perspective
6. 
Cover image for Computational network science : an algorithmic approach
7. 
Cover image for Secure Messaging on the Internet
9. 
Cover image for Windows forensic analysis toolkit : advanced analysis techniques for Windows 8
11. 
Cover image for Trust, privacy, and security in digital business : 10th International conference, TrustBus 2013, Prague, Czech Republic, August 28-29, 2013 : proceedings
19. 
Cover image for Staying safe online in simple steps
23. 
Cover image for Secure Java : for web application development
25. 
Cover image for Digital forensics for network, internet, and cloud computing : a forensic evidence guide for moving targets and data
26. 
Cover image for Web intelligence and security : advances in data and text mining techniques for detecting and preventing terrorist activities on the web
35. 
Cover image for Distributed systems security : issues, processes and solutions
38. 
Cover image for Disappearing cryptography : information hiding : steganography and watermarking
39. 
Cover image for Your neighbor's secret life online : protecting families from Internet conmen, scammers and predators
40. 
Cover image for Securing the information infrastructure
41. 
Cover image for ICT futures : delivering pervasive, real-time and secure services
42. 
Cover image for The web application hacker's handbook : discovering and exploiting security flaws
43. 
Cover image for Securing VoIP networks : threats, vulnerabilities, and countermeasures
46. 
Cover image for Crimeware : understanding new attacks and defenses
47. 
Cover image for Trust and new technologies : marketing and management on the Internet and mobile media
48. 
Cover image for Wireless internet security : architecture and protocols
49. 
Cover image for Internet security : hacking, counterhacking, and society
52. 
Cover image for Practical internet security
55. 
Cover image for Hackers challenge 3 : 20 brand-new forensic scenarios & solutions
56. 
Cover image for How personal and internet security works
57. 
Cover image for Understanding Voice over IP security
58. 
Cover image for (SCTS) Symantec Certified Technical Specialist small business security study guide
62. 
Cover image for Windows forensics : the field guide for corporate computer investigations
63. 
Cover image for Professional pen testing for Web applications
64. 
Cover image for (SCTS) Symantec Certified Technical Specialist : small business security study guide
67. 
Cover image for Security management, integrity, and internal control in information systems : IFIP TC-11 WG 11.1 & WG 11.5 Joint Working Conference
70. 
Cover image for The executive guide to information security : threats, challenges, and solutions
73. 
Cover image for Web based energy information and control systems : ase studies and applications
74. 
Cover image for Synchronizing e-security
78. 
Cover image for Principles and practice of information security : protecting computers from hackers and lawyers
82. 
Cover image for Security + guide to network security fundamentals
88. 
Cover image for Financial cryptography : 6th International Conference, FC 2002 Southampton, Bermuda, March 11-14, 2002 : revised papers
93. 
Cover image for Network security : a beginner's guide
97. 
Cover image for Practical Unix and internet security
102. 
Cover image for Hacking exposed J2EE & Java : developing secure applications with Java technology
105. 
116. 
Cover image for Security planning and disaster recovery
117. 
Cover image for Internet and intranet security
129. 
133. 
Cover image for Non-repudiation in electronic commerce
144. 
Cover image for The complete guide to internet security
145. 
Cover image for Electronic commerce relationships : trust by design
146. 
154. 
Cover image for The complete guide to Internet security
165. 
Cover image for Designing network security
178. 
183. 
Cover image for Intranet security : stories from the trenches
185. 
Cover image for Intranet firewalls : planning & implementing your network security system
186. 
Cover image for Digital cash : commerce on the net
190. 
Cover image for Digital crime : policing the cybernation
193. 
Cover image for Internet security for business
195. 
Cover image for Internet commerce
198. 
Cover image for Internet firewalls and network security
201. 
Cover image for Firewalls and Internet security : repelling the wily hacker
227. 
Cover image for RIoT Control : Understanding and Managing Risks and the Internet of Things
229. 
Cover image for Secure Connected Objects
231. 
Cover image for Internet of Things Security : Challenges, Advances, and Analytics
232. 
Cover image for Big Data, Surveillance and Crisis Management
234. 
Cover image for A Beginner’s Guide to Internet of Things Security : Attacks, Applications, Authentication, and Fundamentals
235. 
Cover image for Child Protection and Safeguarding Technologies : Appropriate or Excessive 'Solutions' to Social Problems?
Go to:Search Results
|
Top of Page
|
Search Facets