Refine your search
Availability
-
Authors
- Alexander, David
- Anderson, Ross
- Bashir, Imran
- Bianco, David J.
- Breithaupt, Jim
- Brotby, W. Krag
- Calder, Alan
- Chapple, Mike
- Chell, Dominic
- Colley, Shaun
- Easttom, Chuck
- Elhoseny, Mohamed
- Harper, Allen
- Kennedy, David
- Kim, David
- Krausz, Michael
- Mattord, Herbert J.
- Schneier, Bruce
- Solomon, Michael
- Whitman, Michael E.
- Show more
- Show less
-
Item types
-
Locations
-
Series
- (ISC)2 official study guide
- Advanced sciences and technologies for security applications
- Advances in information security
- Always learning
- Artech House information security and privacy series
- Data-enabled engineering
- Digital formations
- Information Systems Security & Assurance Series
- Information systems security & assurance series
- Internal audit and IT audit
- International Federation for Information Processing
- Jones & Bartlett Learning information systems security & assurance series
- Jones & Bartlett learning information systems security & assurance series
- Pearson custom library
- SEI series in software engineering
- Security series
- Theory in practice
- Undergraduate Topics in Computer Science
- Show more
- Show less
-
Topics
- Business enterprises
- Computer crimes
- Computer hackers
- Computer networking & communications
- Computer networks
- Computer security
- Computers and IT
- Computers and IT.
- Computing & information technology
- Crime
- Data encryption
- Data protection
- Information technology: general issues
- Internet
- Management
- Network security
- Prevention
- Privacy & data protection
- Security measures
- Standards
- Show more
- Show less
-
Holding libraries
-
Languages