-
61
-
62by Harnaningrum, L.N.Subjects: “...Computer Security, Data Security/Keamanan Komputer...”
Published 2009
-
63
-
64by SimonSubjects: “...1. Computer security,Computer network -- security measures...”
Published 1996
TEXT -
65by SymantecSubjects: “...1. Computer security . 2. The Norton Antivirus -- Virus protection...”
Published
TEXT -
66by Anley, ChrisSubjects: “...1. Computer security.2. Data protection.3. Risk assessment...”
Published 2007
TEXT -
67by Abdul Aziz Bin Muhammad Abd. LathifSubjects: “... established and cutting-edge theories and developments on information and computer security. The text contains...”
Published
TEXT -
68by Charlie KaufmanSubjects: “...Appropriate for all graduate-level and upper-level courses in network or computer security. Widely...”
Published
TEXT -
69by Greg HoglundSubjects: “... to computer security problems. Increasingly, companies large a...”
Published
TEXT -
70by Gary McGrawSubjects: “... to computer security problems. Increasingly, companies large a...”
Published
TEXT -
71by Getting StartedSubjects: “... established and cutting-edge theories and developments on information and computer security. The text contains...”
Published
TEXT -
72by Shalih bin Fauzan Bin Abdullah Al-FauzanSubjects: “... established and cutting-edge theories and developments on information and computer security. The text contains...”
Published
TEXT -
73by Gary McGrawSubjects: “...Cuts to the heart of computer security to help you get security right the first time. Your first...”
Published
TEXT -
74by John ViegaSubjects: “...Cuts to the heart of computer security to help you get security right the first time. Your first...”
Published
TEXT