Tomeki

Explore Books on
computer data security

1-24 of 73 Books

View CISSP for dummies By Lawrence H. Miller,Peter H. Gregory,Lawrence Miller,Lawrence C. Miller,Peter H., CISA, CISSP Gregory,Peter Gregory
Cover of CISSP for dummies by lawrence h. miller,peter h. gregory,lawrence miller,lawrence c. miller,peter h., cisa, cissp gregory,peter gregory

CISSP for dummies

By Lawrence H. Miller,Peter H. Gregory,Lawrence Miller,Lawrence C. Miller,Peter H., CISA, CISSP Gregory,Peter Gregory

View Computer Security Basics By Deborah Russell,Sr. G.T Gangemi,Rick Lehtinen
Cover of Computer Security Basics by deborah russell,sr. g.t gangemi,rick lehtinen

Computer Security Basics

By Deborah Russell,Sr. G.T Gangemi,Rick Lehtinen

View The shellcoder's handbook By Jack Koziol,David Litchfield,Dave Aitel,Chris Anley,Sinan "noir" Eren,Neel Mehta,Riley Hassell
Cover of The shellcoder's handbook by jack koziol,david litchfield,dave aitel,chris anley,sinan "noir" eren,neel mehta,riley hassell

The shellcoder's handbook

By Jack Koziol,David Litchfield,Dave Aitel,Chris Anley,Sinan "noir" Eren,Neel Mehta,Riley Hassell

View Mastering network security By Chris Brenton,Cameron Hunt
Cover of Mastering network security by chris brenton,cameron hunt

Mastering network security

By Chris Brenton,Cameron Hunt

View Guide to computer forensics and investigations By Bill Nelson,Amelia Phillips,Frank Enfinger,Christopher Steuart
Cover of Guide to computer forensics and investigations by bill nelson,amelia phillips,frank enfinger,christopher steuart

Guide to computer forensics and investigations

By Bill Nelson,Amelia Phillips,Frank Enfinger,Christopher Steuart

View Cisco Asa By Frahim, Jazib/ Santos, Omar,Omar Santos,Jazib Frahim
Cover of Cisco Asa by frahim, jazib/ santos, omar,omar santos,jazib frahim

Cisco Asa

By Frahim, Jazib/ Santos, Omar,Omar Santos,Jazib Frahim

View Mastering system center Data protection manager 2007 By Devin L. Ganger,Ryan Femling
Cover of Mastering system center Data protection manager 2007 by devin l. ganger,ryan femling

Mastering system center Data protection manager 2007

By Devin L. Ganger,Ryan Femling

View Maximum wireless security By Cyrus Peikari,Seth Fogie
Cover of Maximum wireless security by cyrus peikari,seth fogie

Maximum wireless security

By Cyrus Peikari,Seth Fogie

View Disseminating security updates at Internet scale By Jun Li,Jun Li,Peter Reiher,Gerald J. Popek
Cover of Disseminating security updates at Internet scale by jun li,jun li,peter reiher,gerald j. popek

Disseminating security updates at Internet scale

By Jun Li,Jun Li,Peter Reiher,Gerald J. Popek

View TICSA TruSecure ICSA certified security associate By Mike Chapple,Debra Littlejohn Shinder,Shawn Porter
Cover of TICSA TruSecure ICSA certified security associate by mike chapple,debra littlejohn shinder,shawn porter

TICSA TruSecure ICSA certified security associate

By Mike Chapple,Debra Littlejohn Shinder,Shawn Porter

View Cisco Networking Academy Program By Cisco Systems, Inc,Cisco Systems Inc.,Cisco Networking Academy Program
Cover of Cisco Networking Academy Program by cisco systems, inc,cisco systems inc.,cisco networking academy program

Cisco Networking Academy Program

By Cisco Systems, Inc,Cisco Systems Inc.,Cisco Networking Academy Program

View CCSP By Wade Edwards,Tom Lancaster,Eric Quinn,Jason Rohm,Bryant Tow,Wade Edwards ,Tom Lancaster
Cover of CCSP by wade edwards,tom lancaster,eric quinn,jason rohm,bryant tow,wade edwards ,tom lancaster

CCSP

By Wade Edwards,Tom Lancaster,Eric Quinn,Jason Rohm,Bryant Tow,Wade Edwards ,Tom Lancaster

View Internet site security By Erik S. Schetina,Erik Schetina,Ken Green,Jacob Carlson
Cover of Internet site security by erik s. schetina,erik schetina,ken green,jacob carlson

Internet site security

By Erik S. Schetina,Erik Schetina,Ken Green,Jacob Carlson

View Hunting Security Bugs By Tom; Jeffries, Bryan; Landauer, Lawrence Gallagher,Tom Gallagher,Lawrence Landauer,Bryan Jeffries
Cover of Hunting Security Bugs by tom; jeffries, bryan; landauer, lawrence gallagher,tom gallagher,lawrence landauer,bryan jeffries

Hunting Security Bugs

By Tom; Jeffries, Bryan; Landauer, Lawrence Gallagher,Tom Gallagher,Lawrence Landauer,Bryan Jeffries

View Hacking exposed By Stuart McClure,Joel Scambray,George Kurtz
Cover of Hacking exposed by stuart mcclure,joel scambray,george kurtz

Hacking exposed

By Stuart McClure,Joel Scambray,George Kurtz

View Business object design and implementation By OOPSLA (Conference) (1995 Austin, Tex.),J. Sutherland,D. Patel,C Casanave,G Hollowell,J Miller
Cover of Business object design and implementation by oopsla (conference) (1995 austin, tex.),j. sutherland,d. patel,c casanave,g hollowell,j miller

Business object design and implementation

By OOPSLA (Conference) (1995 Austin, Tex.),J. Sutherland,D. Patel,C Casanave,G Hollowell,J Miller

View Inside network perimeter security By Stephen Northcutt,Mark T. Edmead,Lenny Zeltser,Scott Winters,Karen Fredrick,Ronald W. Ritchey
Cover of Inside network perimeter security by stephen northcutt,mark t. edmead,lenny zeltser,scott winters,karen fredrick,ronald w. ritchey

Inside network perimeter security

By Stephen Northcutt,Mark T. Edmead,Lenny Zeltser,Scott Winters,Karen Fredrick,Ronald W. Ritchey

View Intrusion signatures and analysis By Stephen Northcutt,Mark Cooper,Matt Fearnow,Karen Frederick
Cover of Intrusion signatures and analysis by stephen northcutt,mark cooper,matt fearnow,karen frederick

Intrusion signatures and analysis

By Stephen Northcutt,Mark Cooper,Matt Fearnow,Karen Frederick

View EDI By Ian Walden,A. Braganza,I. Walden

EDI

EDI

By Ian Walden,A. Braganza,I. Walden

View 12th IEEE Computer Security Foundations Workshop By Computer Security Foundations Workshop (12th 1999 Mordano, Italy),IEEE Computer Society,Institute of Electrical and Electronics Engineers
Cover of 12th IEEE Computer Security Foundations Workshop by computer security foundations workshop (12th 1999 mordano, italy),ieee computer society,institute of electrical and electronics engineers

12th IEEE Computer Security Foundations Workshop

By Computer Security Foundations Workshop (12th 1999 Mordano, Italy),IEEE Computer Society,Institute of Electrical and Electronics Engineers

View Voice and data security By David Dicenso,Dwayne Williams,Travis Good,Kevin Archer,Gregory White,Chuck Cothren,Roger Davis
Cover of Voice and data security by david dicenso,dwayne williams,travis good,kevin archer,gregory white,chuck cothren,roger davis

Voice and data security

By David Dicenso,Dwayne Williams,Travis Good,Kevin Archer,Gregory White,Chuck Cothren,Roger Davis

View Microsoft Windows XP networking and security inside out By Ed Bott,Carl Siechert
Cover of Microsoft Windows XP networking and security inside out by ed bott,carl siechert

Microsoft Windows XP networking and security inside out

By Ed Bott,Carl Siechert

View The backup book By Dorian J. Cougias,Dorian Cougias,E. L. Heiberger,Karsten Koop
Cover of The backup book by dorian j. cougias,dorian cougias,e. l. heiberger,karsten koop

The backup book

By Dorian J. Cougias,Dorian Cougias,E. L. Heiberger,Karsten Koop

View Trusted recovery and defensive information warfare By Peng Liu,Sushil Jajodia
Cover of Trusted recovery and defensive information warfare by peng liu,sushil jajodia

Trusted recovery and defensive information warfare

By Peng Liu,Sushil Jajodia