Torthaí cuardaigh - "Computer Security"

  1. 1

    SECURITY IN COMPUTING de réir PFLEEGER CHARLES P

    Foilsithe / Cruthaithe 2003
    Ábhair: “…SECURITY IN COMPUTING,SECURITY,COMPUTING, 3569…”
    LEABHAR
  2. 2

    SECURITY IN COMPUTING de réir PFLEEGER CHARLES P

    Foilsithe / Cruthaithe 2006
    Ábhair: “…COMPUTER SECURITY,SECURITY,COMPUTING, 3568…”
    LEABHAR
  3. 3

    FUNDAMENTALS OF INFORMATION SYSTEMS SECURITY de réir KIM DAVID

    Foilsithe / Cruthaithe 2014
    Ábhair: “…COMPUTER SECURITY…”
    LEABHAR
  4. 4

    Introduction to Computer Security de réir Bishop Matt

    Foilsithe / Cruthaithe 2022
    Ábhair: “…Computer Security 82162…”
    LEABHAR
  5. 5

    Information Security de réir Fugini Mariagrazia

    Foilsithe / Cruthaithe 2004
    Ábhair: “…Computer Security, Integrated Circuits…”
    LEABHAR
  6. 6

    Principles of Information Security de réir Whitman, Michael E.

    Foilsithe / Cruthaithe 2005
    Ábhair: “…Computer networks-Security measures,Computer security,Information technology-Security measures 39820…”
    LEABHAR
  7. 7

    Computer Security de réir Stalling, W

    Foilsithe / Cruthaithe 2010
    Ábhair: “…Computer Engg., Computer Security 3406…”
    LEABHAR
  8. 8

    ALICE AND BOB LEARN APPLICATION SECURITY de réir JANCA TANYA

    Foilsithe / Cruthaithe 2021
    Ábhair: “…COMPUTER SECURITY 1749…”
    Anaithnid
  9. 9

    MALWARE ANALYSIS AND DETECTION ENGINEERING de réir MOHANTA ABHIJIT

    Foilsithe / Cruthaithe 2022
    Ábhair: “…COMPUTER SECURITY 1762…”
    Anaithnid
  10. 10

    CYBER THREAT INTELLIGENCE de réir ROBERTS AARON

    Foilsithe / Cruthaithe 2023
    Ábhair: “…COMPUTER SECURITY 1798…”
    Anaithnid
  11. 11

    PRACTICAL MALWARE ANALYSIS de réir SIKORSKI MICHAEL

    Foilsithe / Cruthaithe 2012
    Ábhair: “…COMPUTER SECURITY 1885…”
    Anaithnid
  12. 12

    INFORMATION SECURITY MANAGEMENT PRINCIPLES de réir TAYLOR ANDY

    Foilsithe / Cruthaithe 2014
    Ábhair: “…COMPUTER SECURITY MANAGEMENT 836…”
    Anaithnid
  13. 13

    MANAGING RISK IN INFORMATION SYSTEMS de réir GIBSON DARRIL

    Foilsithe / Cruthaithe 2015
    Ábhair: “…COMPUTER SECURITY 428…”
    Anaithnid
  14. 14

    RESEARCH METHODS FOR CYBER SECURITY de réir EDGAR THOMAS W

    Foilsithe / Cruthaithe 2017
    Ábhair: “…COMPUTER SECURITY 836…”
    Anaithnid
  15. 15

    BIOMETRICS FOR NETWORK SECURITY de réir REID PAUL

    Foilsithe / Cruthaithe 2015
    Ábhair: “…COMPUTER SECURITY 428…”
    Anaithnid
  16. 16

    INCIDENT RESPONSE AND COMPUTER FORENSICS de réir LUTTGENS JASON T

    Foilsithe / Cruthaithe 2014
    Ábhair: “…COMPUTER SECURITY 1199…”
    LEABHAR
  17. 17

    FOUNDATIONS OF COMPUTER SECURITY WITH 45 FIGURE de réir SALOMON DAVID

    Foilsithe / Cruthaithe 2006
    Ábhair: “…COMPUTER SECURITY,COMPUTER SECURITY…”
    LEABHAR
  18. 18

    ENCASE COMPUTER FORENSICS de réir BUNTING STEVE; COMPUTER LANGUAGE

    Foilsithe / Cruthaithe 2006
    Ábhair: “…COMPUTER SECURITY 1145…”
    LEABHAR
  19. 19

    COMPUTER FORENSICS AND INVESTIGATIONS de réir NELSON BILL

    Foilsithe / Cruthaithe 2009
    Ábhair: “…COMPUTER SECURITY 1143…”
    LEABHAR
  20. 20

    Computer Security:Principal and Practice de réir Brown,Lawrie

    Foilsithe / Cruthaithe 2015
    Ábhair: “…Computer Sc,Computer security 472…”
    LEABHAR