Showing 21 - 39 results of 39 for search '"Computer security"', query time: 0.02s Refine Results
  1. 21
    by Rhee, Man Young
    Published 1994
    Subjects: ...Computer Security,Telecommunication System...
    TEXT
  2. 22
    by Cobb, Chey
    Published 2004
    Subjects: ...1. Cryptography -- Computer security system....
    TEXT
  3. 23
    by Abdullah
    Published 2016
    Subjects: ...Computer Security, Data Security/Keamanan Komputer...
  4. 24
    by Harnaningrum, L.N.
    Published 2009
    Subjects: ...Computer Security, Data Security/Keamanan Komputer...
  5. 25
    by Foster, James C.
    Published 2005
    Subjects: ...1. Sftware Severity.2. Computer Security....
    TEXT
  6. 26
    by Simon
    Published 1996
    Subjects: ...1. Computer security,Computer network -- security measures...
    TEXT
  7. 27
    by Symantec
    Published
    Subjects: ...1. Computer security . 2. The Norton Antivirus -- Virus protection...
    TEXT
  8. 28
    by Anley, Chris
    Published 2007
    Subjects: ...1. Computer security.2. Data protection.3. Risk assessment...
    TEXT
  9. 29
    by Amoroso, Edward G.
    Published 1994
    Subjects: ...1. Computer security -- Systems. 2. Data security -- Computer systems. 3. Data encryption...
    TEXT
  10. 30
    by Matt Bishop
    Published
    Subjects: ...ntroduction to Computer Security draws upon Bishops widely praised Computer Security: Art...
    TEXT
  11. 31
    by Matt Bishop
    Published
    Subjects: ...The nature and challenges of computer security, the relationship between policy and security...
    TEXT
  12. 32
    Subjects: ... established and cutting-edge theories and developments on information and computer security. The text contains...
    TEXT
  13. 33
    by Charlie Kaufman
    Published
    Subjects: ...Appropriate for all graduate-level and upper-level courses in network or computer security. Widely...
    TEXT
  14. 34
    by Greg Hoglund
    Published
    Subjects: ... to computer security problems. Increasingly, companies large a...
    TEXT
  15. 35
    by Gary McGraw
    Published
    Subjects: ... to computer security problems. Increasingly, companies large a...
    TEXT
  16. 36
    by Getting Started
    Published
    Subjects: ... established and cutting-edge theories and developments on information and computer security. The text contains...
    TEXT
  17. 37
    Subjects: ... established and cutting-edge theories and developments on information and computer security. The text contains...
    TEXT
  18. 38
    by Gary McGraw
    Published
    Subjects: ...Cuts to the heart of computer security to help you get security right the first time. Your first...
    TEXT
  19. 39
    by John Viega
    Published
    Subjects: ...Cuts to the heart of computer security to help you get security right the first time. Your first...
    TEXT