Showing 1 - 20 results of 588 for search '"Computer security"', query time: 0.17s Refine Results
  1. 1
  2. 2

    Selected readings in cybersecurity / by PALCI EBSCO books

    Subjects: “…Computer security.…”
    Get full text
    Online Book
  3. 3

    Check Point NGX R65 security administration / by Bonnell, Ralph, Safari Books Online

    Subjects: “…Firewalls (Computer security)…”
    Get full text
    Online Book
  4. 4

    Electromagnetic information leakage and countermeasure technique / by Liu, Taikang, Li, Yongmei, SpringerLink (Online service)

    Published: Springer, 2019
    Subjects: “…Computer security.…”
    Get full text
    Online Book
  5. 5
  6. 6

    Surveillance systems : design, applications and technology / by PALCI EBSCO books

    Published: Nova Publishers, 2017
    Subjects: “…Computer security.…”
    Get full text
    Online Book
  7. 7

    PERSPECTIVES ON CYBERSECURITY. by JAKUB DRMOLA, PALCI EBSCO books

    Subjects: “…Computer security.…”
    Get full text
    Online Book
  8. 8

    Cyber essentials : a pocket guide / by Calder, Alan

    Published: IT Governance Publishing, 2014
    Subjects: “…Computer security.…”
    Get full text
    Online Book
  9. 9
  10. 10

    Absolute beginner's guide to personal firewalls / by Ford, Jerry Lee, Safari Books Online

    Published: Que, 2002
    Subjects: “…Firewalls (Computer security)…”
    Get full text
    Online Book
  11. 11
  12. 12

    Buffer overflow attacks : detect, exploit, prevent / by PALCI EBSCO books

    Published: Syngress, 2005
    Subjects: Get full text
    Online Book
  13. 13
  14. 14
  15. 15

    Ad hoc anonymous signatures : state of the art, challenges and new directions / by Qin, Zhiguang, Xiong, Hu, Zhu, Guobin, 1981-, PALCI EBSCO books

    Subjects: “…Group signatures (Computer security)…”
    Get full text
    Online Book
  16. 16
  17. 17

    Penetration testing services procurement guide. by Creasey, Jason, Crest

    Published: IT Governance Pub. ; Crest, 2014
    Subjects: “…Penetration testing (Computer security)…”
    Get full text
    Online Book
  18. 18

    Procuring penetration testing services. by Crest

    Published: IT Governance Pub., 2014
    Subjects: “…Penetration testing (Computer security)…”
    Get full text
    Online Book
  19. 19
  20. 20