Limit Search Results
Author
Language
Format
Subject
Switch to list view
Switch to thumbnail view
1277 Results Found Subscribe to search results
000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000MAIN
Print
1. 
Cover image for Computer security
2. 
Cover image for Computer security
4. 
Cover image for Computer security
6. 
Cover image for Computer security
7. 
Cover image for Computer security
8. 
Cover image for Computer security
9. 
Cover image for Computer security
11. 
Cover image for Computer Security Fundamentals
12. 
Cover image for Corporate computer security.
15. 
Cover image for Computer Network Security
17. 
Cover image for Computer security handbook
18. 
Cover image for Computer security handbook
19. 
Cover image for Computer-security technology
20. 
Cover image for Computer data security
29. 
Cover image for Computer security and cryptography
33. 
Cover image for Computer security and information integrity
35. 
Cover image for Computer security : principles and practice
36. 
Cover image for Computer security and penetration testing
37. 
Cover image for Security mechanisms for computer networks
41. 
Cover image for Computer and information security handbook
42. 
Cover image for Security basics for computer architects
43. 
Cover image for Computer security : protecting digital resources
44. 
Cover image for Collaborative computer security and trust management
46. 
Cover image for Simple computer security : disinfect your PC
49. 
Cover image for Corporate computer and network security
52. 
Cover image for Computer audit, control and security
54. 
Cover image for Tutorial : computer and network security
56. 
Cover image for Security of computer based information systems
63. 
Cover image for Computer Security : A Hands-on Approach
70. 
Cover image for Computer security assurance using the common criteria
71. 
Cover image for Principles of computer security : security and beyond
74. 
Cover image for Modern methods for computer security and privacy
75. 
Cover image for Security, accuracy, and privacy in computer systems
78. 
Cover image for Computer and Cyber Security : Principles, Algorithm, Applications, and Perspectives
79. 
Cover image for Machine Learning for Computer and Cyber Security : Principles, Algorithms, and Practices
83. 
Cover image for Analyzing computer security : a threat/vulnerability/countermeasure approach
84. 
Cover image for Securing the cloud : cloud computer security techniques and tactics
85. 
Cover image for The Stuxnet Computer Worm and industrial control system security
86. 
Cover image for Principles of computer security : CompTIA security+ and beyond
87. 
Cover image for Visualization for computer security : 5th International Workshop, VizSec 2008, Cambridge, MA, USA, September 15, 2008, Proceedings
89. 
Cover image for Computer system security : basic concepts and solved exercises
92. 
Cover image for Advances in information and computer security : first International Workshop on Security, IWSEC 2006, Kyoto, Japan, October 23-24, 2006 : proceedings
93. 
Cover image for Network control and engineering for QoS, security and mobility, V :  IFIP 19th World Computer Congress, TC-6, 5th IFIP International Conference on Network Control and Engineering for QoS, Security and Mobility, August 20-25, 2006, Santiago, Chile
95. 
Cover image for Defeating the hacker : a non-technical guide to computer security
97. 
Cover image for Real digital forensics :  computer security and incident response
98. 
Cover image for Computer security : 20 things every employee should know
100. 
Cover image for Certification and security in e-services : from e-government to e-business : IFIP 17th World Computer Congress, TC11 stream on security in e-services, August 26-29, 2002, Montr�eal, Qu�ebec, Canada
102. 
Cover image for Security for computer networks : an introduction to data security in teleprocessing and electronic funds transfer
104. 
Cover image for Auditing computer security : a manual with case studies
106. 
Cover image for Security for computer networks : an introduction to data security in teleprocessing and electronic funds transfer
116. 
Cover image for Role-based access control
118. 
Cover image for Trust and security in collaborative computing
122. 
Cover image for Implementing security for ATM networks
123. 
Cover image for Security in wireless LANs and MANs
126. 
Cover image for Bluetooth security
127. 
Cover image for Developing secure distributed systems with CORBA
129. 
Cover image for Non-repudiation in electronic commerce
132. 
Cover image for Protecting intellectual property in space
133. 
Cover image for Security and protection in information system
137. 
Cover image for CYBER INFLUENCE AND COGNITIVE THREATS
138. 
Cover image for Digital Image Watermarking : Theoretical and Computational Advances
139. 
Cover image for Security in IoT-Enabled Space
140. 
Cover image for Advances of DNA computing in cryptography
144. 
Cover image for CompTIA security+ guide to network security fundamentals
145. 
Cover image for Security and Privacy in Cyber-Physical Systems : Foundations, Principles, and Applications
146. 
Cover image for CYBERSECURITY ESSENTIALS
148. 
Cover image for Advanced Persistent Security : A Cyberwarfare Approach to Implementing Adaptive Enterprise Protection, Detection, and Reaction Strategies
152. 
Cover image for Discovering Computers 2017 : Tools, Apps, Devices, and the Impact of Technology
154. 
Cover image for Secure development for mobile apps : how to design and code secure mobile applications with PHP and javascript
156. 
Cover image for Computing security & cryptography handbook
157. 
Cover image for Biometric technology : authentication, biocryptography, and cloud-based architecture
158. 
Cover image for Applications of cryptography and network security
159. 
Cover image for Ethical hacking and penetration testing guide
160. 
Cover image for Legal issues in information security
161. 
Cover image for Industrial network security :  securing critical infrastructure networks for smart grid, SCADA, and other industrial control systems
162. 
Cover image for Information hiding in speech signals for secure communication
163. 
Cover image for CHFI computer hacking forensic investigator : exam guide
167. 
Cover image for Introduction to modern cryptography
168. 
Cover image for Web security : a WhiteHat perspective
169. 
Cover image for Case studies in secure computing : achievements and trends
170. 
Cover image for Information security : principles and new concepts
172. 
Cover image for Hardware security : design, threats, and safeguards
175. 
Cover image for Information security analytics : finding security insights, patterns, and anomalies in big data
176. 
Cover image for Computational network science : an algorithmic approach
177. 
Cover image for Cyberwarfare : information operations in a connected world
178. 
Cover image for Managing risk in information systems
179. 
Cover image for Security policies and implementation issues
181. 
Cover image for Cybersecurity : managing systems, conducting testing, and investigating intrusions
183. 
Cover image for Security management of next generation telecommunications networks and services
184. 
Cover image for Digital communication : communication, multimedia, security
185. 
Cover image for Hands-on information security lab manual
186. 
Cover image for Image encryption : a communication perspective
188. 
Cover image for Emerging trends in ICT security
189. 
Cover image for Managing information security
190. 
Cover image for Business continuity and disaster recovery planning for IT professionals
192. 
Cover image for Social media security : leveraging social networking while mitigating risk
193. 
Cover image for Identity and access management : business performanve through connected intelligence
197. 
Cover image for Hacking with Kali : practical penetration testing techniques
199. 
Cover image for Fundamentals of information systems security
201. 
Cover image for Security strategies in windows platforms and applications
202. 
Cover image for Hacker techniques, tools, and incident handling
203. 
Cover image for Learning nessus for penetration testing : master how to perfom IT infrastructure security vulnerability assessments using nessus with tips and insights from real-world challenges faced during vulnerability assessment
204. 
Cover image for Conducting network penetration and espionage in a global environment
205. 
Cover image for Security management : a critical thinking approach
207. 
Cover image for Cryptography and network security : principles and practice
210. 
Cover image for Principles of incident response and disaster recovery
211. 
Cover image for Applied network security monitoring : collection, detection, and analysis
213. 
Cover image for Access control, authentication, and public key infrastructure
215. 
Cover image for Core software security : security at the source
216. 
Cover image for The science and technology of counterterrorism : measuring physical and electronic security risk
217. 
Cover image for The basics of information security : understanding the fundamentals of InfoSec in theory and practice
219. 
Cover image for Analyzing security, trust, and crime in the digital world
222. 
Cover image for Organizational, legal, and technological dimensions of information system administration
223. 
Cover image for Security, privacy, trust, and resource management in mobile and wireless communications
225. 
Cover image for A cryptography primer : secrets and promises
226. 
Cover image for What every engineer should know about cyber security and digital forensics
227. 
Cover image for The Intrusion detection networks : a key to collaborative security
228. 
Cover image for Responsive security  : be ready to be secure
229. 
Cover image for The art of memory forensics : detecting malware and threats in Windows, Linux, and Mac memory
230. 
Cover image for CompTIA security+ review guide : exam sy0-401
231. 
Cover image for Collaboration with cloud computing : security, social media, and unified communications
232. 
Cover image for Windows forensic analysis toolkit : advanced analysis techniques for Windows 8
234. 
Cover image for Engineering safe and secure software systems
236. 
Cover image for Digital forensics for handheld devices
237. 
Cover image for UTM security with Fortinet : Mastering FortiOS
239. 
Cover image for Risk propagation assessment for network security : application to airport communication network design
240. 
Cover image for Information security
243. 
Cover image for Intelligent systems for security informatics
244. 
Cover image for Computer forensics : infoSec Pro guide
245. 
Cover image for Malware, rootkits & botnets : a beginner's guide
247. 
Cover image for Information security for managers
248. 
Cover image for Security risks in social media technologies : safe practices in public service applications
250. 
Cover image for Introduction to computer networks and cybersecurity
252. 
Cover image for Trust, privacy, and security in digital business : 10th International conference, TrustBus 2013, Prague, Czech Republic, August 28-29, 2013 : proceedings
254. 
Cover image for Digital forensics explained
256. 
Cover image for Hacking for dummies
257. 
Cover image for Cryptography in C and C++
258. 
Cover image for The basics of web hacking : tools and techniques to attack the Web
259. 
Cover image for Cyber warfare : techniques, tactics and tools for security practitioners
260. 
Cover image for Eleventh hour CISSP : study guide
263. 
Cover image for Arguments that count : physics, computing, and missile defense, 1949-2012
264. 
Cover image for Web penetration testing with kali linux : a practical guide to implementing penetration testing strategies on websites, web applications, and standard web protocol with kali linux
265. 
Cover image for Sailing safe in cyberspace : protect your identity and data
266. 
Cover image for Android security : attacks and defenses
267. 
Cover image for Information security policy development for compliance : ISO/IEC 27001, NIST SP 800-53, HIPAA standard, PCI DSS V2.0, and AUP V5.0
268. 
Cover image for Cyberspace and cybersecurity
269. 
Cover image for Network anomaly detection : a machine learning perspective
270. 
Cover image for Business data communications : infrastructure, networking and security
271. 
Cover image for Web application defender's cookbook : battling hackers and protecting users
276. 
Cover image for FISMA and the risk management framework : the new practice of federal cyber security
277. 
Cover image for Data hiding : exposing concealed data in multimedia, operating systems, mobile devices and network protocols
278. 
Cover image for Multimedia information hiding technologies and methodologies for controlling data
280. 
Cover image for Management of information security
281. 
Cover image for Information security risk assessment toolkit :   practical assessments through data collection and data analysis
282. 
Cover image for The basics of cyber warfare : understanding the fundamentals of cyber warfare in theory and practice
283. 
Cover image for The hacker's guide to OS X : exploiting OS X from the root-up
284. 
Cover image for Discrete dynamical systems and chaotic machines : theory and applications
285. 
Cover image for Elementary information security
286. 
Cover image for Cyber security for educational leaders : a guide to understanding and implementing technology policies
287. 
Cover image for Applied cyber security and the smart grid : implementing Security Controls into the Modern Power Infrastructure
289. 
Cover image for Linux Malware Incident Response : a practitioner's guide to forensic collection and examination of volatile data  : an excerpt from Malware Forensic Field Guide for Linux Systems
290. 
Cover image for Professional penetration testing
291. 
Cover image for Engineering dependable software systems
292. 
Cover image for Software safety and security : tools for analysis and verification
293. 
Cover image for Client-side attacks and defense
294. 
Cover image for Hacking web apps : detecting and preventing web application security problems
295. 
Cover image for Advances in intelligence and security informatics
297. 
Cover image for The computer incident response planning handbook : executable plans for protecting information at risk
Go to:Search Results
|
Top of Page
|
Search Facets