Searching Books & More : "Electronic books"

Computer security X Security measures X
297 results found in Books & More
RSS
Cover images provided by Open Library

Instant Burp Suite starter get up and running with Burp Suite using this hands-on practical guide

Published: Birmingham [England] : Packt Pub. Ltd., 2013
Format: Electronic Resource, Remote
Retrieving Holdings Information
Cover images provided by Open Library

Practical anonymity hiding in plain sight online

Published: Waltham, MA : Elsevier Science, 2013
Format: Electronic Resource, Remote
Retrieving Holdings Information
Cover images provided by Open Library

Seven deadliest USB attacks

Published: Burlington, MA : Syngress, c2010
Format: Electronic Resource, Remote
Retrieving Holdings Information
Cover images provided by Open Library

The complete guide to Internet security

Published: New York : AMACOM, 2000
Format: Electronic Resource, Remote
Retrieving Holdings Information
Cover images provided by Open Library

Seven deadliest Unified Communications attacks

Published: Amsterdam ; Boston : Elsevier : Burlington, MA : Syngress, 2010
Format: Electronic Resource, Remote
Retrieving Holdings Information
Cover images provided by Open Library

The web application hacker's handbook discovering and exploiting security flaws

Published: Indianapolis, IN : Wiley Pub., c2008
Format: Electronic Resource, Remote
Retrieving Holdings Information
Cover images provided by Open Library

The basics of IT audit Purposes, processes, and practical information

Published: Waltham, MA : Syngress, 2014
Format: Electronic Resource, Remote
Retrieving Holdings Information
Cover images provided by Open Library

CISSP study guide

Published: Waltham, MA : Syngress, c2012
Format: Electronic Resource, Remote
Retrieving Holdings Information
Cover images provided by Open Library

Cyber Security and IT Infrastructure Protection

Published: Rockland, Massachusetts : Syngress 2014
Format: Electronic Resource, Remote
Retrieving Holdings Information
Cover images provided by Open Library

E-mail Security a Pocket Guide

Published: Ely : IT Governance Pub., 2010
Format: Electronic Resource, Remote
Retrieving Holdings Information
Cover images provided by Open Library

Selling information security to the board a primer

Published: Ely : IT Governance Pub., 2010
Format: Electronic Resource, Remote
Retrieving Holdings Information
Cover images provided by Open Library

24 deadly sins of software security programming flaws and how to fix them

Published: New York : McGraw-Hill, c2010
Format: Electronic Resource, Remote
Retrieving Holdings Information
Cover images provided by Open Library

Applied cryptography protocols, algorithms, and source code in C

Published: New York : J. Wiley & Sons, c1996
Format: Electronic Resource, Remote
Retrieving Holdings Information
Cover images provided by Open Library

Cloud security a comprehensive guide to secure cloud computing

Published: Indianapolis, Ind. : Wiley Pub., Inc., 2010
Format: Electronic Resource, Remote
Retrieving Holdings Information
Cover images provided by Open Library

Cloud Security and Governance Who's on your cloud?

Published: Ely : IT Governance Pub., 2010
Format: Electronic Resource, Remote
Retrieving Holdings Information