|
Your search for [subject]Computer security returned 152 records. |
|
|
Sort by:
|
|
|
|
|
|
|
|
Mapping security : the corporate security sourcebook for today's global economy.
by Patterson, Tom.; Upper Saddle River, NJ: Addison-Wesley, 2005.
Subject: Electronic commerce -- Security measures; International business enterprises -- Computer networks -- Security measures; Internet -- Security measures; Computer security.
|
|
|
|
|
|
|
|
|
|
|
|
|
PCweek Intranet and Internet Firewall strategies.
by Amoroso, Edward G.; Emeryville, Calif.: Ziff-Davis Press, 1996.
Subject: Computer networks -- Security measures; Computer security; Data protection; Internet (Computer network) -- Security measures.
|
|
|
|
|
|
|
|
|
|
|
|
|
Cryptography and network security : principles and practice.
by Stallings, William; Upper Saddle River, N.J.: Prentice-Hall International, 1999.
Subject: Computer networks -- Security measures; Data encryption (Computer science); Coding theory; Computer security.
|
|
|
|
|
|
|
|
|
|
|
|
|
Cryptography and network security : principles and practice.
by Stallings, William; Upper Saddle River, N.J.: Pearson Education International, 2006.
Subject: Computer networks -- Security measures; Data encryption (Computer science); Coding theory; Computer security.
|
|
|
|
|
|
|
|
|
|
|
|
|
Risky business : protect your business from being stalked, conned, or blackmailed on the web.
by Janal, Daniel S.; New York: Wiley, 1998.
Subject: Computer crimes; Internet (Computer network) -- Security measures; Computer security; Fraud; Extortion.
|
|
|
|
|
|
|
|
|
|
|
|
|
Microsoft Windows XP networking and security : also covers Windows 2000.
by Bott, Ed; Redmond, WA: Microsoft Press, 2006.
Subject: Microsoft Windows (Computer file); Computer networks--Security measures; Computer security.
|
|
|
|
|
|
|
|
|
|
|
|
|
Firewall architecture for the enterprise.
by Pohlmann, Norbert; New York, N.Y.: Wiley, 2002.
Subject: Firewalls (Computer security); Computer networks -- Security measures; Computer network architectures.
|
|
|
|
|
|
|
|
|
|
|
|
|
E-policy : how to develop computer, E-mail, and Internet guidelines to protect your company and its assets.
by Overly, Michael R.; New York: American Management Association, 1999.
Subject: Business enterprises -- Computer networks -- Security measures; Computer security; Electronic mail systems -- Security measures.
|
|
|
|
|
|
|
|
|
|
|
|
|
Firewalls and VPNs : principles and practices.
by Tibbs, Richard W.; Upper Saddle River, N.J: Pearson/Prentice Hall, 2006.
Subject: Computer security; Computer networks -- Security measures; Firewalls (Computer security); Extranets (Computer networks).
|
|
|
|
|
|
|
|
|
|
|
|
|
Protection and security on the information superhighway.
by Cohen, Frederick B., 1956-; New York: Wiley, 1995.
Subject: Computer security; Computer networks -- Security measures; Data protection; Information superhighway -- Security measures.
|
|
|
|
|
|
|
|
|
|
« Previous 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 Next » |