Limit Search Results
Author
Language
Subject
Switch to list view
Switch to thumbnail view
2615 Results Found Subscribe to search results
000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000MAIN
Print
1. 
Cover image for Computer security
2. 
Cover image for Computer security
4. 
Cover image for Computer security
6. 
Cover image for Computer security
8. 
Cover image for Computer security
9. 
Cover image for Computer security
11. 
Cover image for Computer Security Fundamentals
12. 
Cover image for Corporate computer security.
15. 
Cover image for Computer Network Security
16. 
Cover image for Computer security handbook
18. 
Cover image for Computer security handbook
20. 
Cover image for Computer data security
24. 
Cover image for Journal of computer security
30. 
Cover image for Computer security and cryptography
37. 
Cover image for Computer security and penetration testing
38. 
Cover image for Security mechanisms for computer networks
42. 
Cover image for Computer and information security handbook
43. 
Cover image for Security basics for computer architects
45. 
Cover image for Collaborative computer security and trust management
50. 
Cover image for Corporate computer and network security
51. 
Cover image for Computer system and network security
53. 
Cover image for Computer audit, control and security
56. 
Cover image for Tutorial : computer and network security
58. 
Cover image for Security of computer based information systems
65. 
Cover image for Computer Security : A Hands-on Approach
71. 
Cover image for Computer security in the age of information
76. 
Cover image for Security of e-systems and computer networks
78. 
Cover image for Computer security assurance using the common criteria
80. 
Cover image for Principles of computer security : security and beyond
84. 
Cover image for Security, accuracy, and privacy in computer systems
86. 
Cover image for Computer Network Security Fourth International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2007, St. Petersburg, Russia, September 13-15, 2007. Proceedings.
89. 
Cover image for Computer and Cyber Security : Principles, Algorithm, Applications, and Perspectives
90. 
Cover image for Machine Learning for Computer and Cyber Security : Principles, Algorithms, and Practices
91. 
Cover image for Introduction to computer and network security : navigating shades of gray
92. 
Cover image for Computer security literacy : staying safe in a digital world
95. 
Cover image for Analyzing computer security : a threat/vulnerability/countermeasure approach
98. 
Cover image for Securing the cloud : cloud computer security techniques and tactics
99. 
Cover image for The Stuxnet Computer Worm and industrial control system security
102. 
Cover image for Principles of computer security : CompTIA security+ and beyond
104. 
Cover image for Principles of computer security: CompTIA security+ and beyond
110. 
Cover image for Visualization for computer security : 5th International Workshop, VizSec 2008, Cambridge, MA, USA, September 15, 2008, Proceedings
113. 
Cover image for Advances in Information and Computer Security Second International Workshop on Security, IWSEC 2007, Nara, Japan, October 29-31, 2007: Proceedings
115. 
Cover image for Advances in computer science--ASIAN 2007 computer and network security : 12th Asian Computing Science Conference, Doha, Qatar, December 9-11, 2007 : proceedings
118. 
Cover image for Advances in information and computer security : first International Workshop on Security, IWSEC 2006, Kyoto, Japan, October 23-24, 2006 : proceedings
119. 
Cover image for Network control and engineering for QoS, security and mobility, V :  IFIP 19th World Computer Congress, TC-6, 5th IFIP International Conference on Network Control and Engineering for QoS, Security and Mobility, August 20-25, 2006, Santiago, Chile
123. 
Cover image for Defeating the hacker : a non-technical guide to computer security
124. 
Cover image for Risk management for computer security : Protecting your network and information assets
125. 
Cover image for Real digital forensics :  computer security and incident response
126. 
Cover image for Computer security : 20 things every employee should know
127. 
Cover image for Computer security : 20 things every employee should know
128. 
Cover image for Certification and security in e-services : from e-government to e-business : IFIP 17th World Computer Congress, TC11 stream on security in e-services, August 26-29, 2002, Montr�eal, Qu�ebec, Canada
133. 
Cover image for Security for computer networks : an introduction to data security in teleprocessing and electronic funds transfer
136. 
Cover image for Data & computer security : dictionary of standards, concepts and terms
139. 
Cover image for Security for computer networks : an introduction to data security in teleprocessing and electronic funds transfer
143. 
Cover image for Security, Privacy and Reliability in Computer Communications and Networks
148. 
Cover image for Implementing electronic card payment systems
149. 
Cover image for Role-based access control
150. 
Cover image for Firewall design and analysis /cAlex X. Liu
151. 
Cover image for Trust and security in collaborative computing
152. 
Cover image for Securing information and communications systems : principles, technologies, and applications
155. 
Cover image for Implementing security for ATM networks
159. 
Cover image for Bluetooth security
160. 
Cover image for Developing secure distributed systems with CORBA
162. 
Cover image for Non-repudiation in electronic commerce
166. 
Cover image for Security and protection in information system
175. 
Cover image for Cybersecurity Analytics
176. 
Cover image for CYBER INFLUENCE AND COGNITIVE THREATS
177. 
Cover image for Digital Image Watermarking : Theoretical and Computational Advances
178. 
Cover image for Security in IoT-Enabled Space
179. 
Cover image for Advances of DNA computing in cryptography
180. 
Cover image for AWS Certified Cloud Practitioner Study Guide : CLF-C01 Exam
181. 
Cover image for CRYPTOLOGY : Classical and Modern
184. 
Cover image for CompTIA security+ guide to network security fundamentals
187. 
Cover image for CYBERSECURITY ESSENTIALS
188. 
Cover image for Digital Forensics and Investigations : People, Processes, and Technologies to Defend the Enterprise
189. 
Cover image for Advanced Persistent Security : A Cyberwarfare Approach to Implementing Adaptive Enterprise Protection, Detection, and Reaction Strategies
190. 
Cover image for Advanced Penetration Testing : Hacking the World's Most Secure Networks
192. 
Cover image for Network Forensics
194. 
Cover image for Discovering Computers 2017 : Tools, Apps, Devices, and the Impact of Technology
209. 
Cover image for Computing security & cryptography handbook
210. 
Cover image for Biometric technology : authentication, biocryptography, and cloud-based architecture
211. 
Cover image for Applications of cryptography and network security
212. 
Cover image for Ethical hacking and penetration testing guide
213. 
Cover image for Legal issues in information security
214. 
Cover image for Industrial network security :  securing critical infrastructure networks for smart grid, SCADA, and other industrial control systems
215. 
Cover image for Information hiding in speech signals for secure communication
216. 
Cover image for CHFI computer hacking forensic investigator : exam guide
217. 
Cover image for CHFI computer hacking forensic investigator certification  exam guide
235. 
Cover image for Introduction to modern cryptography
236. 
Cover image for Web security : a WhiteHat perspective
243. 
Cover image for Information security analytics : finding security insights, patterns, and anomalies in big data
244. 
Cover image for Computational network science : an algorithmic approach
245. 
Cover image for Cyberwarfare : information operations in a connected world
261. 
Cover image for Cybersecurity : managing systems, conducting testing, and investigating intrusions
265. 
Cover image for Security management of next generation telecommunications networks and services
266. 
Cover image for Digital communication : communication, multimedia, security
268. 
Cover image for Hands-on information security lab manual
275. 
Cover image for Managing information security
276. 
Cover image for Business continuity and disaster recovery planning for IT professionals
278. 
Cover image for Social media security : leveraging social networking while mitigating risk
279. 
Cover image for Identity and access management : business performanve through connected intelligence
283. 
Cover image for Hacking with Kali : practical penetration testing techniques
284. 
Cover image for System forensics, investigation and response
285. 
Cover image for Fundamentals of information systems security
286. 
Cover image for Network security firewalls, and VPNs
287. 
Cover image for Security strategies in windows platforms and applications
290. 
Cover image for Conducting network penetration and espionage in a global environment
Go to:Search Results
|
Top of Page
|
Search Facets