Showing 121 - 140 results of 233 for search '"Security"', query time: 0.02s Refine Results
  1. 121
    by John Viega
    Published
    Subjects: ...Cuts to the heart of computer security to help you get security right the first time. Your first...
    TEXT
  2. 122
    by Granor, Tamar E.
    Published 1998
    Subjects: ...1. Security programs. 2. Visual FoxPro -- Programming language...
    TEXT
  3. 123
    by Granor, Tamar E.
    Published 2002
    Subjects: ...1. Visual FoxPro -- Relational database. 2. Security programs...
    TEXT
  4. 124
    by Anley, Chris
    Published 2007
    Subjects: ...1. Computer security.2. Data protection.3. Risk assessment...
    TEXT
  5. 125
    by Dmitry Bokotey
    Published
    Subjects: ...CCIE Practical Studies: Security leads you through the requirements of the CCIE Security one-day...
    TEXT
  6. 126
    by Jon Edney
    Published
    Subjects: ...This book describes an entirely new approach to wireless LAN security based on the latest...
    TEXT
  7. 127
    by Matt Bishop
    Published
    Subjects: ...The nature and challenges of computer security, the relationship between policy and security...
    TEXT
  8. 128
  9. 129
    by Cottle, Sidney
    Published 1989
    Subjects: ...Investment analysis,Securities - United State...
    TEXT
  10. 130
    by Raymond R. Panko
    Published
    Subjects: ...Synopsis: 1. Framework: Examples of Security. 2. Access Control and Site Security. 3. Review of TCP...
    TEXT
  11. 131
    by Joel Scambray
    Published
    Subjects: ...High-profile viruses and hacking incidents serve to highlight the dangers of system security...
    TEXT
  12. 132
    by Chip Andrews
    Published
    Subjects: ...Addresses SQL Server vulnerabilities and provides security solutions. Covers installation...
    TEXT
  13. 133
    by Linda Volonino
    Published
    Subjects: ... to support investment decisions in security technology. It discusses security from the perspective of hackers...
    TEXT
  14. 134
    by David W. Chapman
    Published
    Subjects: ...Security continues to be an important topic for networkers looking to protect their organizations...
    TEXT
  15. 135
    by Adhityo Priyambodo
    Published
    Subjects: ...---- Secure Soket Layer -LDAP Identity Manager -Authentication System -Domain Controller -Secure...
    TEXT
  16. 136
    by Aidil Chendramata
    Published
    Subjects: ...---- Secure Soket Layer -LDAP Identity Manager -Authentication System -Domain Controller -Secure...
    TEXT
  17. 137
    by PURWANTO, Teguh
    Published 1997
    Subjects: ...disain interor Kantor Exim Securities...
    Get full text
    Tugas Akhir
  18. 138
    by Francis, Jack Clark
    Published 1986
    Subjects: ...Investments^bSecurities^cFinancial Futur,...
    TEXT
  19. 139
    by Scott, David L.
    Published 1988
    Subjects: ...1. Investments -- dictionaries 2. Securities -- Dictionaries...
    TEXT
  20. 140
    by Benjamin M. Lail
    Published
    Subjects: ...Synopsis: Design, build, and implement a secure broadband network infrastructure using...
    TEXT