Computer security
| Main Author: | Galley, Shari Mendelson (Author) |
|---|---|
| Corporate Author: | Security management |
| Format: | Book |
| Published: |
London
Butterworths
1987
|
| Subjects: |
Similar Items
Computer security handbook strategies and techniques for preventing data loss or theft
by: Maulton, Rolf T.
Published: (1986)
by: Maulton, Rolf T.
Published: (1986)
Computer security
by: Carroll, John M. (John Millar) 1950-
Published: (1987)
by: Carroll, John M. (John Millar) 1950-
Published: (1987)
UNIX system security how to protect your date and prevent intruders
by: Farrow, Rik 1950-
Published: (1991)
by: Farrow, Rik 1950-
Published: (1991)
Personal computer security
by: Tiley, W. Edward
Published: (1996)
by: Tiley, W. Edward
Published: (1996)
Computer security
Published: (1986)
Published: (1986)
Handbook of eID security : concepts, practical experiences, technologies
by: Fumy, Walter, et al.
Published: (2011)
by: Fumy, Walter, et al.
Published: (2011)
Modern cryptography theory and practice
by: Mao, Wenbo
Published: (2004)
by: Mao, Wenbo
Published: (2004)
Industrial network security securing critical infrastructure networks for smart grid, scada, and other industrial control systems
by: Knapp, Eric D., et al.
Published: (2015)
by: Knapp, Eric D., et al.
Published: (2015)
Organization and management of a computer center
by: Graef, Martin, et al.
Published: (1985)
by: Graef, Martin, et al.
Published: (1985)
Remote access essentials
by: Robbins, Margaret
Published: (1996)
by: Robbins, Margaret
Published: (1996)
Security strategy from requirements to reality
by: Stackpole, Bill, et al.
Published: (2011)
by: Stackpole, Bill, et al.
Published: (2011)
Secure data management 4th VLDB Workshop, SDM 200, Vienna, Austria, September 23-24, 2007 proceedings
by: Jonker, Willem 1962-, et al.
Published: (2007)
by: Jonker, Willem 1962-, et al.
Published: (2007)
Practical computer cost accounting
by: Sullivan, Kenneth M.
Published: (1983)
by: Sullivan, Kenneth M.
Published: (1983)
Security metrics a beginner's guide
by: Wong, Caroline
Published: (2012)
by: Wong, Caroline
Published: (2012)
Audit and control of information system
by: Gallegos, Frederick, et al.
Published: (1987)
by: Gallegos, Frederick, et al.
Published: (1987)
Audit and control of information system
by: Gallegos, Frederick, et al.
Published: (1987)
by: Gallegos, Frederick, et al.
Published: (1987)
Cloud security : a general guide to secured computing
by: Masnida Hussin, et al.
Published: (2021)
by: Masnida Hussin, et al.
Published: (2021)
Security protocols 13th international workshop, Cambridge, UK, April 20-22, 2005 : revised selected papers
by: Christianson, Bruce
Published: (2007)
by: Christianson, Bruce
Published: (2007)
Security engineering a guide to building dependable distributed systems
by: Anderson, Ross 1956-
Published: (2008)
by: Anderson, Ross 1956-
Published: (2008)
Internet and Intranet security
by: Oppliger, Rolf
Published: (2002)
by: Oppliger, Rolf
Published: (2002)
Securing E-Business applications and communications
by: Held, Jonathan S., et al.
Published: (2001)
by: Held, Jonathan S., et al.
Published: (2001)
Computer security fundamentals
by: Easttom, Chuck
Published: (2006)
by: Easttom, Chuck
Published: (2006)
Computer security fundamentals
by: Easttom, Chuck
Published: (2016)
by: Easttom, Chuck
Published: (2016)
Computer security fundamentals
by: Easttom, Chuck
Published: (2012)
by: Easttom, Chuck
Published: (2012)
Security information and event management (SIEM) implementation
by: Miller, David 1959 November 5-
Published: (2011)
by: Miller, David 1959 November 5-
Published: (2011)
Implementing NAP and NAC security technologies the complete guide to network access control
by: Hoffman, Daniel (Daniel V.) 1972-
Published: (2008)
by: Hoffman, Daniel (Daniel V.) 1972-
Published: (2008)
Access control, security, and trust a logical approach
by: Chin, Shiu-Kai, et al.
Published: (2011)
by: Chin, Shiu-Kai, et al.
Published: (2011)
Computers under attack intruders, worms, and viruses
by: Denning, Peter J. 1942-
Published: (1990)
by: Denning, Peter J. 1942-
Published: (1990)
Security in computing
by: Pfleeger, Charles P. 1948-, et al.
Published: (2007)
by: Pfleeger, Charles P. 1948-, et al.
Published: (2007)
EDP : controls and auditing
by: Porter, W. Thomas
Published: (1974)
by: Porter, W. Thomas
Published: (1974)
EDP controls and auditing
by: Porter, W. Thomas, et al.
Published: (1984)
by: Porter, W. Thomas, et al.
Published: (1984)
Analyzing computer security a threat/vulnerability/countermeasure approach
by: Pfleeger, Charles P. 1948-, et al.
Published: (2012)
by: Pfleeger, Charles P. 1948-, et al.
Published: (2012)
Computer and cyber security principles, algorithm, applications, and perspectives
Cryptology unlocked
by: Wobst, Reinhard, et al.
Published: (2007)
by: Wobst, Reinhard, et al.
Published: (2007)
Implementing email security and tokens current standards, tools, and practices
by: Turner, Sean H., et al.
Published: (2008)
by: Turner, Sean H., et al.
Published: (2008)
Complete guide to security and privacy metrics measuring regulatory compliance, operational resilience, and ROI
by: Herrmann, Debra S.
Published: (2007)
by: Herrmann, Debra S.
Published: (2007)
Protecting business information a manager's guide
by: Schweitzer, James A.
Published: (1996)
by: Schweitzer, James A.
Published: (1996)
Network security : an introduction to techniques & standard
by: Kamaruzzaman Seman, et al.
Published: (2007)
by: Kamaruzzaman Seman, et al.
Published: (2007)
Information security governance
by: Solms Von, S. H.
Published: (2009)
by: Solms Von, S. H.
Published: (2009)
Handbook of financial cryptography and security
by: Rosenberg, Burton
Published: (2011)
by: Rosenberg, Burton
Published: (2011)
Similar Items
-
Computer security handbook strategies and techniques for preventing data loss or theft
by: Maulton, Rolf T.
Published: (1986) -
Computer security
by: Carroll, John M. (John Millar) 1950-
Published: (1987) -
UNIX system security how to protect your date and prevent intruders
by: Farrow, Rik 1950-
Published: (1991) -
Personal computer security
by: Tiley, W. Edward
Published: (1996) -
Computer security
Published: (1986)