Tomeki

Explore Books on
beveiliging

1-21 of 21 Books

View Security Engineering By Ross J. Anderson
Cover of Security Engineering by ross j. anderson

Security Engineering

By Ross J. Anderson

View The society of captives By Gresham M. Sykes
Cover of The society of captives by gresham m. sykes

The society of captives

By Gresham M. Sykes

View Behind the Gates By Setha M. Low
Cover of Behind the Gates by setha m. low

Behind the Gates

By Setha M. Low

View Protecting Your Collection By Slade Richard Gandert
Cover of Protecting Your Collection by slade richard gandert

Protecting Your Collection

By Slade Richard Gandert

View Practical UNIX Security By Simson Garfinkel,Gene Spafford
Cover of Practical UNIX Security by simson garfinkel,gene spafford

Practical UNIX Security

By Simson Garfinkel,Gene Spafford

View Cryptography's Role in Securing the Information Society By Kenneth W. Dam,Herbert S. Lin,National Research Council Staff,Computer Science and Telecommunications Board Staff
Cover of Cryptography's Role in Securing the Information Society by kenneth w. dam,herbert s. lin,national research council staff,computer science and telecommunications board staff

Cryptography's Role in Securing the Information Society

By Kenneth W. Dam,Herbert S. Lin,National Research Council Staff,Computer Science and Telecommunications Board Staff

View Preventing Identity Theft in Your Business By Judith M. Collins
Cover of Preventing Identity Theft in Your Business by judith m. collins

Preventing Identity Theft in Your Business

By Judith M. Collins

View Information warfare By Winn Schwartau
Cover of Information warfare by winn schwartau

Information warfare

By Winn Schwartau

View Data Protection in Practice By Kenneth Gulleford
Cover of Data Protection in Practice by kenneth gulleford

Data Protection in Practice

By Kenneth Gulleford

View Network & Internet Security By Vijay Ahuja
Cover of Network & Internet Security by vijay ahuja

Network & Internet Security

By Vijay Ahuja

View Computer crime and business information By James A. Schweitzer
Cover of Computer crime and business information by james a. schweitzer

Computer crime and business information

By James A. Schweitzer

View Book theft and library security systems, 1981-82 By Alice Harrison Bahr
Cover of Book theft and library security systems, 1981-82 by alice harrison bahr

Book theft and library security systems, 1981-82

By Alice Harrison Bahr

View Cybersecurity What Everyone Needs to Know Paper By Peter W. Singer
Cover of Cybersecurity
            
                What Everyone Needs to Know Paper by peter w. singer

Cybersecurity What Everyone Needs to Know Paper

By Peter W. Singer

View Protecting library staff, users, collections, and facilities By Pamela J. Cravey
Cover of Protecting library staff, users, collections, and facilities by pamela j. cravey

Protecting library staff, users, collections, and facilities

By Pamela J. Cravey

View Bandits on the information superhighway By Daniel J. Barrett
Cover of Bandits on the information superhighway by daniel j. barrett

Bandits on the information superhighway

By Daniel J. Barrett

View Security Technologies for the World Wide Web (Artech House Computer Security Series) By Rolf Oppliger
Cover of Security Technologies for the World Wide Web (Artech House Computer Security Series) by rolf oppliger

Security Technologies for the World Wide Web (Artech House Computer Security Series)

By Rolf Oppliger

View Web security sourcebook By Aviel D. Rubin
Cover of Web security sourcebook by aviel d. rubin

Web security sourcebook

By Aviel D. Rubin

View Designing secure web-based applications for Microsoft Windows 2000 By Michael Howard
Cover of Designing secure web-based applications for Microsoft Windows 2000 by michael howard

Designing secure web-based applications for Microsoft Windows 2000

By Michael Howard

View Library disaster planning and recovery handbook By Camila A. Alire
Cover of Library disaster planning and recovery handbook by camila a. alire

Library disaster planning and recovery handbook

By Camila A. Alire

View Security protocols By Bruce Christianson
Cover of Security protocols by bruce christianson

Security protocols

By Bruce Christianson

View Electronic commerce relationships By Peter G. W. Keen
Cover of Electronic commerce relationships by peter g. w. keen

Electronic commerce relationships

By Peter G. W. Keen