Limit search to available items
Nearby Subjects are:
Result Page   Prev Next
Add Marked to Bag Add All On Page Add Marked to My Lists
Mark   Year Entries
Computer security -- Australia -- Management -- Standards.   2
Computer security -- Case studies.   11
Computer security -- China -- History -- Congresses. : Progress on cryptography : 25 years of cryptography in China / edited by Kefei Chen  2004 1
Computer security -- Computer programs.   10
Computer security -- Congresses.   856
Computer security -- Congresses -- Periodicals.   2
Computer security -- Congressess : Critical infrastructure protection II / edited by Mauricio Papa, Sujeet Shenoi  2008 1
Computer security -- Costs. : Information security cost management / Ioana V. Bazavan, Ian Lim  2007 1
Computer security -- Data processing -- Congresses. : Intelligence and security informatics : international workshop, WISI 2006, Singapore, April 9, 2006 : proceedings / Hsinchun Chen [and others] (eds.)  2006 1
Computer security -- Decision making. : Data analytics and decision support for cybersecurity : trends, methodologies and applications / Iván Palomares Carrascosa, Harsha Kumara Kalutarage, Yan Huang, editors  2017 1
Computer security -- Developing countries.   5
Computer security -- Dictionaries.   3
Computer security -- Economic aspects.   2
Computer security -- Economic aspects -- Congresses. : Economics of information security and privacy III / Bruce Schneier, editor  2013 1
Computer security -- Economic aspects -- Risk management. : Financial cybersecurity risk management : leadership perspectives and guidance for systems and institutions / Paul Rohmeyer and Jennifer L. Bayuk ; foreword by Dr. Larry Ponemon  2019 1
Computer Security -- economics. : The economics of financial and medical identity theft / L. Jean Camp, M. Eric Johnson  2012 1
Computer security -- Employees -- Certification. : A framework for assessing certification schemes for IT security professionals / by Nicholas J.A. Tate  2009 1
Computer security -- Encyclopedias. : Encyclopedia of cryptography and security / Henk C.A. van Tilborg, Sushil Jajodia (eds.)  2011 1
Computer security -- Equipment and supplies. : Hardware-based computer security techniques to defeat hackers : from biometrics to quantum cryptography / Roger Dube  2008 1
Computer security equipment industry.   2
Computer security equipment industry -- Directories. : Enterprise directory and security implementation guide : designing and implementing directories in your organization / Charles Carrington [and others]  2002 1
Computer Security -- ethics. : Disclosure of security vulnerabilities : legal and ethical issues / Alana Maurushat  2013 1
Computer security -- European Union countries.   3
Computer security -- European Union countries -- Congresses. : Trustworthy eternal systems via evolving software, data and knowledge : second international workshop, EternalS 2012, Montpellier, France, August 28, 2012, revised selected papers / Alessandro Moschitti, Riccardo Scandariato (eds.)  2012 1
Computer security -- European Union countries -- Handbooks, manuals, etc.   2
Computer security -- Evaluation.   6
Computer security -- Evaluation -- Methodology.   2
Computer security -- Evaluations : Security assessment : case studies for implementing the NSA IAM / Russ Rogers, ... [and others]  2004 1
Computer security -- Examinations.   3
Computer security -- Examinations -- Practice. : Professional penetration testing : creating and operating a formal hacking lab / by Thomas Wilhelm  2010 1
Computer security -- Examinations, questions, etc   3
Computer security -- Examinations -- Study guides.   81
Computer security -- Fiction.   2
Computer security -- France. : Cybersecurity in France / Philippe Baumard  2017 1
Computer security -- Germany. : Cybersecurity in Germany / Martin Schallbruch, Isabel Skierka  2018 1
Computer security -- Government policy.   10
Computer security -- Government policy -- Australia.   2
Computer security -- Government policy -- Periodicals : Journal of cyber policy  2016- 1
Computer security -- Government policy -- United States.   8
Computer security -- Government policy -- United States -- Newspapers. : Inside cybersecurity    1
Computer security -- Graphic methods -- Congresses.   3
Computer security -- Great Britain.   2
Computer security -- Grünerløkka (Oslo, Norway) -- Case studies : A high performance computing cluster under attack : the titan incident / Mark-David J. McLaughlin, W. Alec Cram, Janis L. Gogan  2015 1
Computer security -- Handbooks, manuals, etc.   17
Computer security -- Hungary -- Management. : Critical infrastructure protection research : results of the first critical infrastructure protection research project in Hungary / László Nádai, József Padányi, editors  2016 1
Computer security -- India. : Pyramid : a case study of cyber security in India / Nimisha Singh, Abha Rishi  2015 1
Computer security -- Information technology. : Selling information security to the board : a primer  2010 1
Computer security -- International cooperation   2
Computer security -- International cooperation -- Congresses.   3
Computer security -- Israel. : Cybersecurity in Israel / Lior Tabansky, Isaac Ben Israel  2015 1
Add Marked to Bag Add All On Page Add Marked to My Lists
Result Page   Prev Next