Suggested Topics within your search.
Suggested Topics within your search.
1
2
by Tamma, Rohit,
Published 2020
Subjects: ';
“...Smartphones Security measures....”Published 2020
View fulltext via EzAccess
eBook
3
by Thakur, Kutub.
Published 2020
Subjects: ';
“...Computer networks Security measures....”Published 2020
View fulltext via EzAccess
Electronic
4
5
by Lea, Perry,
Published 2018
Subjects: ';
“...Computer network architectures Security measures....”Published 2018
View fulltext via EzAccess
eBook
6
by Monnappa K A,
Published 2018
Subjects: ';
“...Computer security....”Published 2018
View fulltext via EzAccess
eBook
7
8
by Whitman, Michael.
Published 2018
Table of Contents: ';
“... -- Chapter 1: Introduction to the Management of Information Security -- Introduction to Security -- CNSS...”Published 2018
View fulltext via EzAccess
eBook
9
by Stuttard, Dafydd, 1972-
Published 2008
Table of Contents: ';
“...'s on the Web Site -- Bring It On -- Chapter 1: Web Application (In)security -- The Evolution of Web...”Published 2008
Books24x7
ebrary
View fulltext via EzAccess
MyiLibrary
Electronic
10
11
by Kizza, Joseph Migga.
Published 2008
Subjects: ';
“...Internet Security measures....”Published 2008
View fulltext via EzAccess
MyiLibrary
Electronic
12
13
by Ackermann, Tobias.
Published 2013
Table of Contents: ';
“...Cloud Computing -- IT risk management -- Perceived IT security risks -- Scale development...”Published 2013
Get full text
Electronic
14
15
Published 2009
Table of Contents: ';
“... of surveillance at the FIFA World Cup 2006TM in Germany / Francisco R. Klauser -- Checkpoint security : gateways...”ebrary
View fulltext via EzAccess
MyiLibrary
Electronic
16
Published 2008
Table of Contents: ';
“...Security and privacy: global concepts: Web privacy: issues, legislations and technological...”View fulltext via EzAccess
Electronic
17
18
by McNicholas, Michael,
Published 2016
Subjects: ';
“...Merchant marine Security measures....”Published 2016
View fulltext via EzAccess
eBook
19
Published 2007
Table of Contents: ';
“...Foreword -- Preface -- 1. Security architectures / Sophie Gastellier-Prevost and Maryline Laurent...”View fulltext via EzAccess
Electronic
20
Published 2003
Table of Contents: ';
“...1. Network security software / Göran Pulkkis, Kaj Grahn, Peik Åström -- 2. A forensic computing...”View fulltext via EzAccess
Electronic