Tomeki

Explore Books on
computer networks--security measures

1-24 of 35 Books

View Network security By Charlie Kaufman
Cover of Network security by charlie kaufman

Network security

By Charlie Kaufman

View Web Security & Commerce By Simson Garfinkel,Gene Spafford
Cover of Web Security & Commerce by simson garfinkel,gene spafford

Web Security & Commerce

By Simson Garfinkel,Gene Spafford

View SSH, the Secure Shell By Daniel J. Barret,Richard E. Silverman,Daniel J. Barrett
Cover of SSH, the Secure Shell by daniel j. barret,richard e. silverman,daniel j. barrett

SSH, the Secure Shell

By Daniel J. Barret,Richard E. Silverman,Daniel J. Barrett

View Unauthorised access By Wil Allsopp
Cover of Unauthorised access by wil allsopp

Unauthorised access

By Wil Allsopp

View Computer forensics By Warren G. Kruse,Warren G. Kruse II,Jay G. Heiser
Cover of Computer forensics by warren g. kruse,warren g. kruse ii,jay g. heiser

Computer forensics

By Warren G. Kruse,Warren G. Kruse II,Jay G. Heiser

View Counter hack reloaded By Ed Skoudis,Edward Skoudis,Tom Liston
Cover of Counter hack reloaded by ed skoudis,edward skoudis,tom liston

Counter hack reloaded

By Ed Skoudis,Edward Skoudis,Tom Liston

View The New Era in U.S. National Security By Jack A. Jarmon
Cover of The New Era in U.S. National Security by jack a. jarmon

The New Era in U.S. National Security

By Jack A. Jarmon

View Network intrusion detection By Stephen Northcutt
Cover of Network intrusion detection by stephen northcutt

Network intrusion detection

By Stephen Northcutt

View The art of software security assessment By Mark Dowd,John McDonald,Justin Schuh
Cover of The art of software security assessment by mark dowd,john mcdonald,justin schuh

The art of software security assessment

By Mark Dowd,John McDonald,Justin Schuh

View Understanding PKI By Carlisle Adams,Carlisle Adams,Steve Lloyd
Cover of Understanding PKI by carlisle adams,carlisle adams,steve lloyd

Understanding PKI

By Carlisle Adams,Carlisle Adams,Steve Lloyd

View Internet denial of service By Jelena Mirkovic,Sven Dietrich,David Dittrich,Peter Reiher
Cover of Internet denial of service by jelena mirkovic,sven dietrich,david dittrich,peter reiher

Internet denial of service

By Jelena Mirkovic,Sven Dietrich,David Dittrich,Peter Reiher

View Silence on the Wire By Michal Zalewski
Cover of Silence on the Wire by michal zalewski

Silence on the Wire

By Michal Zalewski

View Malware By Ed Skoudis,Lenny Zeltser
Cover of Malware by ed skoudis,lenny zeltser

Malware

By Ed Skoudis,Lenny Zeltser

View Open Source Security Tools By Tony Howlett
Cover of Open Source Security Tools by tony howlett

Open Source Security Tools

By Tony Howlett

View The modelling and analysis of security protocols By Peter Ryan PhD,Gavin Lowe,M. H. Goldsmith,Bill Roscoe,P. Y. A. Ryan,S. A. Schneider,G. Lowe,A.W. Roscoe
Cover of The modelling and analysis of security protocols by peter ryan phd,gavin lowe,m. h. goldsmith,bill roscoe,p. y. a. ryan,s. a. schneider,g. lowe,a.w. roscoe

The modelling and analysis of security protocols

By Peter Ryan PhD,Gavin Lowe,M. H. Goldsmith,Bill Roscoe,P. Y. A. Ryan,S. A. Schneider,G. Lowe,A.W. Roscoe

View A Practical Guide to TPM 2.0 By Will Arthur
Cover of A Practical Guide to TPM 2.0 by will arthur

A Practical Guide to TPM 2.0

By Will Arthur

View Network Security Fundamentals By Gert DeLaet,Gert Schauwers
Cover of Network Security Fundamentals by gert delaet,gert schauwers

Network Security Fundamentals

By Gert DeLaet,Gert Schauwers

View SSL and TLS By Eric Rescorla
Cover of SSL and TLS by eric rescorla

SSL and TLS

By Eric Rescorla

View Edp Risk Analysis and Controls Justification (Enterprise Protection, Control, Audit, Security, Risk Management and Business Continuity) By W. E. Perry,J. Kuong

Edp Risk Analysis and Controls Justification (Enterprise Protection, Control, Audit, Security, Risk Management and Business Continuity)

Edp Risk Analysis and Controls Justification (Enterprise Protection, Control, Audit, Security, Risk Management and Business Continuity)

By W. E. Perry,J. Kuong

View Developing and Implementing an Integrated Test Facility for Testing Computerized Systems By William E. Perry,Javier F. Kuong

Developing and Implementing an Integrated Test Facility for Testing Computerized Systems

Developing and Implementing an Integrated Test Facility for Testing Computerized Systems

By William E. Perry,Javier F. Kuong

View Microcomputers By J. F. Kuong,G. Osaacspm,C. W. Winters

Microcomputers

Microcomputers

By J. F. Kuong,G. Osaacspm,C. W. Winters

View The database hacker's handbook By David Litchfield,Chris Anley,John Heasman,Bill Grindlay
Cover of The database hacker's handbook by david litchfield,chris anley,john heasman,bill grindlay

The database hacker's handbook

By David Litchfield,Chris Anley,John Heasman,Bill Grindlay

View Cyber war By Richard A. Clarke
Cover of Cyber war by richard a. clarke

Cyber war

By Richard A. Clarke

View Computer Security Fundamentals (Pearson IT Cybersecurity Curriculum (ITCC)) By William (Chuck) Easttom II
Cover of Computer Security Fundamentals (Pearson IT Cybersecurity Curriculum (ITCC)) by william (chuck) easttom ii

Computer Security Fundamentals (Pearson IT Cybersecurity Curriculum (ITCC))

By William (Chuck) Easttom II