Personal computer security
| Main Author: | Tiley, W. Edward (Author) |
|---|---|
| Format: | Book |
| Published: |
Foster City, Calif. :
IDG Books Worldwide ,
c1996
|
| Subjects: |
Similar Items
Computer security
Published: (1986)
Published: (1986)
Security metrics a beginner's guide
by: Wong, Caroline
Published: (2012)
by: Wong, Caroline
Published: (2012)
Computer security
by: Galley, Shari Mendelson
Published: (1987)
by: Galley, Shari Mendelson
Published: (1987)
Computer security handbook strategies and techniques for preventing data loss or theft
by: Maulton, Rolf T.
Published: (1986)
by: Maulton, Rolf T.
Published: (1986)
Handbook of eID security : concepts, practical experiences, technologies
by: Fumy, Walter, et al.
Published: (2011)
by: Fumy, Walter, et al.
Published: (2011)
Secure data management 4th VLDB Workshop, SDM 200, Vienna, Austria, September 23-24, 2007 proceedings
by: Jonker, Willem 1962-, et al.
Published: (2007)
by: Jonker, Willem 1962-, et al.
Published: (2007)
Security protocols 13th international workshop, Cambridge, UK, April 20-22, 2005 : revised selected papers
by: Christianson, Bruce
Published: (2007)
by: Christianson, Bruce
Published: (2007)
Access control, security, and trust a logical approach
by: Chin, Shiu-Kai, et al.
Published: (2011)
by: Chin, Shiu-Kai, et al.
Published: (2011)
Computers under attack intruders, worms, and viruses
by: Denning, Peter J. 1942-
Published: (1990)
by: Denning, Peter J. 1942-
Published: (1990)
The personal computer handbook
by: Rodwell, Peter 1951-
Published: (1983)
by: Rodwell, Peter 1951-
Published: (1983)
The personal computer book
by: McWilliams, Peter
Published: (1983)
by: McWilliams, Peter
Published: (1983)
Modern cryptography theory and practice
by: Mao, Wenbo
Published: (2004)
by: Mao, Wenbo
Published: (2004)
Personal computer applications a strategy for the information society
by: Pfaffenberger, Bryan 1949-
Published: (1987)
by: Pfaffenberger, Bryan 1949-
Published: (1987)
Personal computer quality a guide for victims and vendors
by: Beizer, Boris 1934-
Published: (1986)
by: Beizer, Boris 1934-
Published: (1986)
Security information and event management (SIEM) implementation
by: Miller, David 1959 November 5-
Published: (2011)
by: Miller, David 1959 November 5-
Published: (2011)
The personal computer from the inside out the programmer's guide to low-level PC hardware and software
by: Sargent, Murray, et al.
Published: (1995)
by: Sargent, Murray, et al.
Published: (1995)
Implementing NAP and NAC security technologies the complete guide to network access control
by: Hoffman, Daniel (Daniel V.) 1972-
Published: (2008)
by: Hoffman, Daniel (Daniel V.) 1972-
Published: (2008)
Computer security
by: Gollmann, Dieter
by: Gollmann, Dieter
Industrial network security securing critical infrastructure networks for smart grid, scada, and other industrial control systems
by: Knapp, Eric D., et al.
Published: (2015)
by: Knapp, Eric D., et al.
Published: (2015)
Internet and Intranet security
by: Oppliger, Rolf
Published: (2002)
by: Oppliger, Rolf
Published: (2002)
Remote access essentials
by: Robbins, Margaret
Published: (1996)
by: Robbins, Margaret
Published: (1996)
Cryptology unlocked
by: Wobst, Reinhard, et al.
Published: (2007)
by: Wobst, Reinhard, et al.
Published: (2007)
Computers tools for an information age
by: Capron, H. L., et al.
Published: (2004)
by: Capron, H. L., et al.
Published: (2004)
McGraw-Hill encyclopedia of personal computing
by: Gibilisco, Stan
Published: (1995)
by: Gibilisco, Stan
Published: (1995)
Computer security fundamentals
by: Easttom, Chuck
Published: (2006)
by: Easttom, Chuck
Published: (2006)
Computer security fundamentals
by: Easttom, Chuck
Published: (2016)
by: Easttom, Chuck
Published: (2016)
Computer security fundamentals
by: Easttom, Chuck
Published: (2012)
by: Easttom, Chuck
Published: (2012)
Introduction to computer security
by: Bishop, Matt
Published: (2005)
by: Bishop, Matt
Published: (2005)
Principles of computer security security+TM and beyond
by: Conklin, Wm. Arthur (William Arthur)
Published: (2004)
by: Conklin, Wm. Arthur (William Arthur)
Published: (2004)
Computing
by: Long, Larry E., et al.
Published: (1995)
by: Long, Larry E., et al.
Published: (1995)
CP/M and the personal computer
by: Dwyer, Thomas A. 1923-, et al.
by: Dwyer, Thomas A. 1923-, et al.
Networking personal computers in organizations
by: Weidlein, James R., et al.
Published: (1986)
by: Weidlein, James R., et al.
Published: (1986)
Designing an IAM framework with Oracle identity and access management suite
by: Scheidel, Jeff
Published: (2010)
by: Scheidel, Jeff
Published: (2010)
Computer and cyber security principles, algorithm, applications, and perspectives
Complete guide to security and privacy metrics measuring regulatory compliance, operational resilience, and ROI
by: Herrmann, Debra S.
Published: (2007)
by: Herrmann, Debra S.
Published: (2007)
Computers a visual encylopedia
by: Kinkoph, Sherry, et al.
Published: (1994)
by: Kinkoph, Sherry, et al.
Published: (1994)
Home computers : a beginner's glossary and guide
by: Miller, Merl K. , 1942-, et al.
Published: (1978)
by: Miller, Merl K. , 1942-, et al.
Published: (1978)
Computers the user perspective
by: Hutchinson, Sarah E., et al.
Published: (1990)
by: Hutchinson, Sarah E., et al.
Published: (1990)
Security and policy driven computing
by: Liu, Lei
Published: (2011)
by: Liu, Lei
Published: (2011)
Trust and security in collaborative computing
by: Zou, Xukai 1963-, et al.
Published: (2008)
by: Zou, Xukai 1963-, et al.
Published: (2008)
Similar Items
-
Computer security
Published: (1986) -
Security metrics a beginner's guide
by: Wong, Caroline
Published: (2012) -
Computer security
by: Galley, Shari Mendelson
Published: (1987) -
Computer security handbook strategies and techniques for preventing data loss or theft
by: Maulton, Rolf T.
Published: (1986) -
Handbook of eID security : concepts, practical experiences, technologies
by: Fumy, Walter, et al.
Published: (2011)