Limit Search Results
Author
Language
Format
Subject
Switch to list view
Switch to thumbnail view
96 Results Found Subscribe to search results
000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000MAIN
Print
3. 
Cover image for Collaborative computer security and trust management
4. 
Cover image for Simple computer security : disinfect your PC
5. 
Cover image for Introduction to computer and network security : navigating shades of gray
6. 
Cover image for Analyzing computer security : a threat/vulnerability/countermeasure approach
8. 
Cover image for Privacy protection and computer forensics
9. 
Cover image for Security and Privacy in Cyber-Physical Systems : Foundations, Principles, and Applications
10. 
Cover image for Privacy and Security Policies in Big Data
11. 
Cover image for Security policies and implementation issues
12. 
Cover image for Analyzing security, trust, and crime in the digital world
13. 
Cover image for Responsive security  : be ready to be secure
14. 
Cover image for Information security policy development for compliance : ISO/IEC 27001, NIST SP 800-53, HIPAA standard, PCI DSS V2.0, and AUP V5.0
15. 
Cover image for Data hiding : exposing concealed data in multimedia, operating systems, mobile devices and network protocols
16. 
Cover image for Pragmatic security metrics : applying metametrics to information security
17. 
Cover image for A survey of data leakage detection and prevention solutions
18. 
Cover image for Cyber security standards, practices and industrial applications : systems and methodologies
19. 
Cover image for Information assurance and security ethics in complex systems : interdisciplinary perspectives
20. 
Cover image for Auditing cloud computing : a security and privacy guide
21. 
Cover image for Information security evaluation : a holistic approach
22. 
Cover image for Information technology risk management in enterprise environments : a review of industry practices and a practical guide to risk management teams
25. 
Cover image for Mobile device security : a comprehensive guide to securing your information in a moving world
26. 
Cover image for Data protection : governance, risk management, and compliance
27. 
Cover image for Multimedia forensics and security
28. 
Cover image for Hacking exposed 6 : network security secrets and solutions
29. 
Cover image for Information security management metrics : a definitive guide to effective security monitoring and measurement
30. 
Cover image for Techniques and applications for advanced information privacy and security : emerging organizational, ethical, and human issues
31. 
Cover image for CISO soft skills : securing organizations impaired by employee politics, apathy, and intolerant perspectives
32. 
Cover image for Multimedia content encryption : techniques and applications
33. 
Cover image for Information assurance architecture
34. 
Cover image for Mastering system center data protection manager 2007
35. 
Cover image for Privacy-preserving data mining : models and algorithms
36. 
Cover image for Netcat power tools
37. 
Cover image for Computational intelligence in information assurance and security
38. 
Cover image for Information assurance for the enterprise : a roadmap to information security
39. 
Cover image for Advances in enterprise information technology security
40. 
Cover image for Information security : design, implementation, measurement and compliance
41. 
Cover image for Cybersecurity for SCADA systems
42. 
Cover image for Privacy protection for e-services
43. 
Cover image for The Ciso handbook : a practical guide to securing your company
44. 
Cover image for Securing SCADA systems
46. 
Cover image for The security risk assessment handbook : a complete guide for performing security risk assessments
47. 
Cover image for Hacking exposed cisco networks : cisco security secrets and solutions
48. 
Cover image for Information technology security & risk management
49. 
Cover image for Information assurance : security in the information environment
51. 
Cover image for A practical guide to security assessments
53. 
Cover image for Assessing and managing security risk in IT systems : a structured methodology
54. 
Cover image for The business case for network security : advocacy, governance, and ROI
56. 
Cover image for Implementing database security and auditing : a guide for DBAs, information security administrators and auditors
57. 
Cover image for Information security policies and procedures :  a practitioner's reference
58. 
Cover image for Information security fundamentals
60. 
Cover image for Malicious cryptography : exposing cryptovirology
61. 
Cover image for Software forensics : collecting evidence from the scene of a digital crime
62. 
Cover image for The shellcoder's handbook : discovering and exploiting security holes
63. 
Cover image for Information security intelligence : cryptographic principles and applications
64. 
Cover image for Digital defence  what you should know about protecting your company's assets
66. 
Cover image for Surviving security : how to integrate people, process, and technology
67. 
Cover image for Hacking exposed : network security secrets & solutions
68. 
Cover image for Security in computing
70. 
Cover image for Network security for dummies
71. 
Cover image for Computer and intrusion forensics
72. 
Cover image for Information security policies, procedures, and standards : guidelines for effective information security management
74. 
Cover image for Information assurance : managing organizational IT security risks
77. 
Cover image for Anti-hacker tool kit
85. 
Cover image for Computer forensics and privacy
88. 
Cover image for Security in computing
89. 
Cover image for Protecting business information : a manager's guide
90. 
Cover image for The computer privacy handbook
91. 
Cover image for Protection and security on the information superhighway
92. 
Cover image for Security in computing
93. 
Cover image for Cryptography and data security
94. 
Cover image for Information security fundamentals
95. 
Cover image for The Complete book of data anonymization : from planning to implementation
96. 
Cover image for Information Security Governance : Framework and Toolset for CISOs and Decision Makers
Go to:Search Results
|
Top of Page
|
Search Facets