Refine your search
Availability
-
Authors
- Burke, Bill
- Carothers, Sonya
- Carpenter, Larry
- edited by Abbas, Ali...
- edited by Gnanasunda...
- edited by Tipton, Ha...
- Hayden, Lance
- Kim, Charles
- Kundu, Joydip
- Layton, Timothy P.
- Lloyd, Ian J.
- Martin, Keith M.
- Meeks, Joe
- Nozaki, Micki Krause
- P R, Biju
- Peltier, Justin., jt...
- Peltier, Thomas R.
- Pfleeger, P. Charles
- Pfleeger, Shari Lawr...
- Rhodes-Oustey, Mark
- Schou, Corey
- Shoemaker, Dan
- Shrivastava, Alok
- Sinha, Sanjib
- Smith, Michael
- Stapleton, J. J.
- Tambe, Milind
- Umesh, Jude
- Vacca, John R.
- Vengurlekar, Nitin
- Von Winterfeldt, Det...
- Yadav, Avantika
- Show more
- Show less
-
Collections
-
Item types
-
Locations
-
Topics
- Business --Data proc...
- Business enterprises...
- Civil defense
- Computer crimes
- Computer crimes --Pr...
- Computer crimesᅠ
- Computer networks--S...
- Computer programming
- Computer science
- Computer security
- Computer security --...
- Computer security --...
- Computer security ᅠ
- Computer security--M...
- Computer security. ᅠ
- Computer securityᅠ
- Computer storage dev...
- Computers--Law and l...
- Computers--Law and l...
- Confidential busines...
- Copyright and electr...
- Cryptography
- Data encryption (Com...
- Data protection
- Data protection -- H...
- Data protection --Ev...
- Data protection ᅠ
- Data protection--Law...
- Data protection--Law...
- Data protection--Sta...
- Data protection. ᅠ
- Data recovery (Compu...
- Data transmission sy...
- Data transmission sy...
- Electronic data inte...
- Electronic data inte...
- Great Britain
- Great Britainᅠ
- Hacking
- Information storage ...
- Information technolo...
- Information technolo...
- Information technolo...
- Information technolo...
- Information technolo...
- Internal security
- Internet--Law and le...
- Internet--Safety mea...
- Internet--Security m...
- Internetᅠ
- Kali Linux
- Management informati...
- National security
- Open source software
- Oracle (Computer fil...
- Penetration testing ...
- Risk assessment. ᅠ
- Security measures
- System analysis
- United States
- ᅠ
- Show more
- Show less