Search Results
Suggested Topics within your search.
Suggested Topics within your search.
- Computer security
- Security measures 4,551
- Computer networks 3,166
- Data protection 1,429
- Prevention 1,014
- Law and legislation 930
- Government policy 925
- Data encryption (Computer science) 846
- Computer crimes 792
- Information technology 764
- Access control 700
- Internet 628
- Cyberterrorism 612
- Management 579
- Computers 519
- Privacy, Right of 413
- Cryptography 412
- Data processing 399
- Examinations 359
- Administrative agencies 329
- Artificial intelligence 286
- Certification 272
- Evaluation 260
- Standards 258
- Electronic data processing personnel 256
- National security 243
- Government information 236
- Hackers 232
- Cloud computing 228
- Cyberspace 207
-
1
Cloud management and security Imad M. Abbadi.
Published 2014Online Access (A-Z Journals and Newspapers)
Electronic eBook -
2
Full stack Python security cryptography, TLS, and attack resistance / Dennis Byrne.
Published 2021Online Access (A-Z Journals and Newspapers)
Electronic eBook -
3
CompTIA Security+ certification study guide (Exam SYO-601) / Glen E. Clarke.
Published 2022Online Access (A-Z Journals and Newspapers)
Electronic eBook -
4
Real-world cryptography David Wong.
Published 2021Online Access (A-Z Journals and Newspapers)
Electronic eBook -
5
Designing secure software a guide for developers / Loren Kohnfelder.
Published 2022Online Access (A-Z Journals and Newspapers)
Electronic eBook -
6
CEH certified ethical hacker all-in-one exam guide Matt Walker.
Published 2022Online Access (A-Z Journals and Newspapers)
Electronic eBook -
7
-
8
-
9
-
10
-
11
API security in action Neil Madden.
Published 2020Online Access (A-Z Journals and Newspapers)
Electronic eBook -
12
Reversing secrets of reverse engineering / Eldad Eilam ; [foreword by Elliot Chikofsky].
Published 2005Online Access (A-Z Journals and Newspapers)
Electronic eBook -
13
Cyber threat! how to manage the growing risk of cyber attacks / N. MacDonnell Ulsch.
Published 2014Online Access (A-Z Journals and Newspapers)
Electronic eBook -
14
-
15
CISSP certified information systems security professional study guide.
Published 2012Online Access (A-Z Journals and Newspapers)
Electronic eBook -
16
Hacking the art of exploitation / by Jon Erickson.
Published 2003Online Access (A-Z Journals and Newspapers)
Electronic eBook -
17
-
18
-
19
Security architect careers in IT service management / Jon Collins.
Published 2014Online Access (A-Z Journals and Newspapers)
Electronic eBook -
20