Refine your search
Availability
-
Authors
- Chirillo, John
- McClure, Stuart
- Scambray, Joel
- Kurtz, George
- Stallings, William.
- Mattord, Herbert J.
- Musaji, Yusufali F.
- Peltier, Thomas R.
- Poston, Howard E.
- Reich, Pauline C.,
- Syngress (Firm)
- Ahmad, David R. Mirza
- Alder, Raven
- Atkins, Derek
- Atreya, Mohan
- Bailey, Carol
- Bayuk, Jennifer L.
- Bejtlich, Richard
- Bellovin, Steven M.
- Bixler, Dave
- Show more
- Show less
-
Item types
-
Locations
-
Series
- Addison-Wesley professional computing series
- Prentice Hall series in computer networking and distributed systems
- Advances in Cyber Security
- Advances in information security, privacy, and ethics (AISPE) book series
- All-in-one
- Artech House Intelligence and Information Operations Series
- Best practices
- Chapman & Hall/CRC cryptography and network security
- Cisco Press networking technologies series
- London Mathematical Society lecture note series ;
- McGraw-Hill Forouzan networking series
- McGraw-Hill telecom professional
- Microsoft secure software development series
- NATO security through science series.
- Programmer to programmer
- Security and Professional Intelligence Education Series (SPIES) ;
- Stealing series
- The basic
- Voices that matter
- Worldwide series in computer science
- Show more
- Show less
-
Topics
- COMPUTER SECURITY
- SECURITY MEASURES
- COMPUTER NETWORKS
- Computer security
- Computer security.
- Computer networks
- Security measures
- DATA PROTECTION
- Security measures.
- COMPUTER CRIMES
- CRYPTOGRAPHY
- COMPUTER PROGRAMS
- FIREWALLS (COMPUTER SECURITY)
- INTERNET
- Data protection
- ACCESS CONTROL
- Access control
- CERTIFICATION
- CODING THEORY
- COMPUTER HACKERS
- Show more
- Show less
-
Holding libraries
-
Languages