Computing and Information Technology > Computer security

Vis mig kun

Handbook of Research on Civil Society and National Security in the Era of Cyber Warfare

Handbook of Research on Civil Society and National Security in the Era of Cyber Warfare

Mitko

3652,37 DKK

Optimizing Information Security and Advancing Privacy Assurance: New Technologies

Optimizing Information Security and Advancing Privacy Assurance: New Technologies

Hamid

2190,77 DKK

Handbook of Research on Security Considerations in Cloud Computing

Handbook of Research on Security Considerations in Cloud Computing

Lawan A.

3652,37 DKK

Continuous Authentication Using Biometrics: Data, Models, and Metrics

Continuous Authentication Using Biometrics: Data, Models, and Metrics

Ahmed Awad E.

2190,77 DKK

Handbook of Research on Digital Crime, Cyberspace Security, and Information Assurance

Handbook of Research on Digital Crime, Cyberspace Security, and Information Assurance

Irene Maria

3652,37 DKK

IT Security Governance Innovations: Theory and Research

IT Security Governance Innovations: Theory and Research

Mario G.

2190,77 DKK

Architectures and Protocols for Secure Information Technology Infrastructures

Architectures and Protocols for Secure Information Technology Infrastructures

Fernando

2190,77 DKK

Crime Prevention Technologies and Applications for Advancing Criminal Investigation

Crime Prevention Technologies and Applications for Advancing Criminal Investigation

Anthony T.S.

2190,77 DKK

Anonymous Security Systems and Applications: Requirements and Solutions

Anonymous Security Systems and Applications: Requirements and Solutions

Shinsuke

2190,77 DKK

Practical Deployment of Cisco Identity Services Engine (ISE)

Practical Deployment of Cisco Identity Services Engine (ISE)

Wood, Jeremy

473,39 DKK

Information Security Evaluation

Information Security Evaluation

Ghernaouti-Helie, Solange

403,64 DKK

Access Control, Security, and Trust

Access Control, Security, and Trust

Older, Susan Beth

948,41 DKK

Anti-Virus Tools and Techniques for Computer

Anti-Virus Tools and Techniques for Computer

Carnahan, Lisa J.

192,41 DKK

Access Control, Security, and Trust

Access Control, Security, and Trust

Older, Susan Beth

948,41 DKK

Democratizing Cryptography

Democratizing Cryptography

Slayton, Rebecca

546,47 DKK

SSH, The Secure Shell: The Definitive Guide

SSH, The Secure Shell: The Definitive Guide

Byrnes, Robert G.

230,54 DKK

Cloud Security and Privacy

Cloud Security and Privacy

Latif, Shahed

181,00 DKK

Effective Monitoring and Alerting

Effective Monitoring and Alerting

Ligus, Slawek

104,11 DKK

Cloud Security and Privacy

Cloud Security and Privacy

Latif, Shahed

202,21 DKK

Hacking: The Next Generation

Hacking: The Next Generation

Hardin, Brett

205,98 DKK

Handbook of Research on Securing Cloud-Based Databases with Biometric Applications

Handbook of Research on Securing Cloud-Based Databases with Biometric Applications

Sambit

3652,37 DKK

Cybersecurity Policies and Strategies for Cyberwarfare Prevention

Cybersecurity Policies and Strategies for Cyberwarfare Prevention

Jean-Loup

2921,57 DKK

Kerberos: The Definitive Guide

Kerberos: The Definitive Guide

Garman, Jason

202,21 DKK

Security Engineering for Cloud Computing: Approaches and Tools

Security Engineering for Cloud Computing: Approaches and Tools

Mario G.

2190,77 DKK

Cybersecurity Policies and Strategies for Cyberwarfare Prevention

Cybersecurity Policies and Strategies for Cyberwarfare Prevention

Jean-Loup

2921,57 DKK

Information Security in Diverse Computing Environments

Information Security in Diverse Computing Environments

Christoph

2921,57 DKK

Managing Crises and Disasters with Emerging Technologies: Advancements

Managing Crises and Disasters with Emerging Technologies: Advancements

Murray

2190,77 DKK

Multimedia Information Hiding Technologies and Methodologies for Controlling Data

Multimedia Information Hiding Technologies and Methodologies for Controlling Data

Kazuhiro

2190,77 DKK

CIO's Guide to Information Security Incident Management

CIO's Guide to Information Security Incident Management

Goucher, Wendy Fiona

403,64 DKK

Cyber Crime and the Victimization of Women: Laws, Rights and Regulations

Cyber Crime and the Victimization of Women: Laws, Rights and Regulations

K.

2190,77 DKK