Limit search to available items
Nearby Subjects are:
Result Page   Prev Next
Add Marked to Bag Add All On Page Add Marked to My Lists
Mark   Year Entries
Computer security -- China -- Congresses : China internet development report 2018 : Blue Book of World Internet Conference / Chinese Academy of Cyberspace Studies  2020 1
Computer security -- China -- History -- Congresses. : Progress on cryptography : 25 years of cryptography in China / edited by Kefei Chen  2004 1
Computer security -- Computer programs   12
Computer security -- Computer simulation : Multilevel modeling of secure systems in QoP-ML / author, Bogdan Ksiezopolski  2015 1
Computer security -- Congresses.   1165
Computer security -- Congresses -- Periodicals.   2
Computer security -- Congressess : Critical infrastructure protection II / edited by Mauricio Papa, Sujeet Shenoi  2008 1
Computer security -- Costs. : Information security cost management / Ioana V. Bazavan, Ian Lim  2007 1
Computer security -- Data processing   3
Computer security -- Data processing -- Congresses : Intelligence and security informatics : international workshop, WISI 2006, Singapore, April 9, 2006 : proceedings / Hsinchun Chen [and others] (eds.)  2006 1
Computer security -- Decision making. : Data analytics and decision support for cybersecurity : trends, methodologies and applications / Iván Palomares Carrascosa, Harsha Kumara Kalutarage, Yan Huang, editors  2017 1
Computer security -- Developing countries.   5
Computer security -- Dictionaries   4
Computer security -- Dictionaries -- Polyglot : Elsevier's dictionary of information security in English, German, French and Russian / compiled by G. Manoilov and B. Radichkova  2007 1
Computer security -- Economic aspects   3
Computer security -- Economic aspects -- Congresses : Economics of information security and privacy III / Bruce Schneier, editor  c2013 1
Computer security -- Economic aspects -- Risk management : Financial cybersecurity risk management : leadership perspectives and guidance for systems and institutions / Paul Rohmeyer and Jennifer L. Bayuk ; foreword by Dr. Larry Ponemon  2019 1
Computer Security -- economics : The economics of financial and medical identity theft / L. Jean Camp, M. Eric Johnson  2012 1
Computer security -- Employees -- Certification. : A framework for assessing certification schemes for IT security professionals / by Nicholas J.A. Tate  2009 1
Computer security -- Encyclopedias   2
Computer security -- Equipment and supplies. : Hardware-based computer security techniques to defeat hackers : from biometrics to quantum cryptography / Roger Dube  2008 1
Computer security equipment industry.   2
Computer security equipment industry -- Certification : CISSP For Dummies, 6th Edition / Miller, Lawrence  2018 1
Computer security equipment industry -- Directories. : Enterprise directory and security implementation guide : designing and implementing directories in your organization / Charles Carrington [and others]  2002 1
Computer security equipment industry -- Moral and ethical aspects -- Case studies : Yoti : responsible innovation in cyber security / Katharina Jarmai, Barbara Stacherl  2020 1
Computer security equipment industry -- Vocational guidance : Breaking into information security : crafting a custom career path to get the job you really want / Josh More, Anthony J. Stieber, Chris Liu ; technical editor, Beth Friedman  2016 1
Computer Security -- ethics : Disclosure of security vulnerabilities : legal and ethical issues / Alana Maurushat  2013 1
Computer security -- Europe : Cybersecurity research analysis report for Europe and Japan : cybersecurity and privacy dialogue between Europe and Japan / Anna Felkner, Youki Kadobayashi, Marek Janiszewski, Stefano Fantin, Jose Francisco Ruiz, Adam Kozakiewicz, Gregory Blanc  2021 1
Computer security -- European Union countries   3
Computer security -- European Union countries -- Congresses : Trustworthy eternal systems via evolving software, data and knowledge : second international workshop, EternalS 2012, Montpellier, France, August 28, 2012, revised selected papers / Alessandro Moschitti, Riccardo Scandariato (eds.)  2012 1
Computer security -- European Union countries -- Handbooks, manuals, etc   2
Computer security -- Evaluation   14
Computer security -- Evaluation -- Methodology.   3
Computer security -- Evaluations : Security assessment : case studies for implementing the NSA IAM / Russ Rogers, ... [and others]  2004 1
Computer security -- Examinations.   199
Computer security -- Examinations -- Practice : Professional penetration testing : creating and operating a formal hacking lab / by Thomas Wilhelm  2010 1
Computer security -- Examinations, questions, etc   10
Computer security -- Examinations -- Study guides   225
Computer security -- Fiction   5
Computer security -- Forecasting : Theoretical cybersecurity : principles and advanced concepts / Dr. Jacob G. Oakley, Michael Butler, Wayne York, Dr. Matthew Puckett, Dr. J. Louis Sewell  2022 1
Computer security -- France. : Cybersecurity in France / Philippe Baumard  2017 1
Computer security -- Germany : Cybersecurity in Germany / Martin Schallbruch, Isabel Skierka  2018 1
Computer security -- Government policy   29
Computer security -- Government policy -- Australia. : Australian Government information technology security manual : ACSI 33 / Defence Signals Directorate  2004 1
Computer security -- Government policy -- Periodicals : Journal of cyber policy  2016- 1
Computer security -- Government policy -- United States.   15
Computer security -- Government policy -- United States -- Newspapers. : Inside cybersecurity    1
Computer security -- Graphic methods -- Congresses   6
Computer security -- Great Britain : Digital privacy, terrorism and law enforcement : the UK's response to terrorist communication / Simon Hale-Ross  2018 1
Computer security -- Grünerløkka (Oslo, Norway) -- Case studies : A high performance computing cluster under attack : the titan incident / Mark-David J. McLaughlin, W. Alec Cram, Janis L. Gogan  2015 1
Add Marked to Bag Add All On Page Add Marked to My Lists
Result Page   Prev Next