Tomeki

Explore Books on
computer networks security measures

1-24 of 2,124 Books

View Hacking for Dummies By Kevin Beaver,Jutta Schmidt
Cover of Hacking for Dummies by kevin beaver,jutta schmidt

Hacking for Dummies

By Kevin Beaver,Jutta Schmidt

View Advances in Intelligent Information Hiding and Multimedia Signal Processing By Jeng-Shyang Pan,Pei-Wei Tsai,Junzo Watada,Lakhmi C. Jain
Cover of Advances in Intelligent Information Hiding and Multimedia Signal Processing by jeng-shyang pan,pei-wei tsai,junzo watada,lakhmi c. jain

Advances in Intelligent Information Hiding and Multimedia Signal Processing

By Jeng-Shyang Pan,Pei-Wei Tsai,Junzo Watada,Lakhmi C. Jain

View Foundations and Practice of Security By Joaquin Garcia-Alfaro
Cover of Foundations and Practice of Security by joaquin garcia-alfaro

Foundations and Practice of Security

By Joaquin Garcia-Alfaro

View Hackers By Steven Levy
Cover of Hackers by steven levy

Hackers

By Steven Levy

View Financial Cryptography and Data Security By Jeremy Clark,Sarah Meiklejohn,Peter Y. A. Ryan,Dan Wallach,Michael Brenner,Kurt Rohloff
Cover of Financial Cryptography and Data Security by jeremy clark,sarah meiklejohn,peter y. a. ryan,dan wallach,michael brenner,kurt rohloff

Financial Cryptography and Data Security

By Jeremy Clark,Sarah Meiklejohn,Peter Y. A. Ryan,Dan Wallach,Michael Brenner,Kurt Rohloff

View CISSP By James Michael Stewart,Mike Chapple,Ed Tittel
Cover of CISSP by james michael stewart,mike chapple,ed tittel

CISSP

By James Michael Stewart,Mike Chapple,Ed Tittel

View CISSP By Shon Harris,Fernando Maymi
Cover of CISSP by shon harris,fernando maymi

CISSP

By Shon Harris,Fernando Maymi

View Security in Computing and Communications By Sabu M. Thampi,Sanjay Madria,Guojun Wang,Danda B. Rawat,Jose M. Alcaraz Calero
Cover of Security in Computing and Communications by sabu m. thampi,sanjay madria,guojun wang,danda b. rawat,jose m. alcaraz calero

Security in Computing and Communications

By Sabu M. Thampi,Sanjay Madria,Guojun Wang,Danda B. Rawat,Jose M. Alcaraz Calero

View Protocols for secure electronic commerce By Mostafa Hashem Sherif
Cover of Protocols for secure electronic commerce by mostafa hashem sherif

Protocols for secure electronic commerce

By Mostafa Hashem Sherif

View Cybersecurity Law By Jeff Kosseff
Cover of Cybersecurity Law by jeff kosseff

Cybersecurity Law

By Jeff Kosseff

View Network Security Assessment By Chris McNab
Cover of Network Security Assessment by chris mcnab

Network Security Assessment

By Chris McNab

View Intelligence and Security Informatics By Michael Chau
Cover of Intelligence and Security Informatics by michael chau

Intelligence and Security Informatics

By Michael Chau

View Cloud Computing and Security By Xingming Sun,Alex Liu,Han-Chieh Chao,Elisa Bertino
Cover of Cloud Computing and Security by xingming sun,alex liu,han-chieh chao,elisa bertino

Cloud Computing and Security

By Xingming Sun,Alex Liu,Han-Chieh Chao,Elisa Bertino

View CISA Certified Information Systems Auditor Study Guide By David L. Cannon
Cover of CISA Certified Information Systems Auditor Study Guide by david l. cannon

CISA Certified Information Systems Auditor Study Guide

By David L. Cannon

View Apache Cookbook By Ken Coar,Rich Bowen
Cover of Apache Cookbook by ken coar,rich bowen

Apache Cookbook

By Ken Coar,Rich Bowen

View Practical Introduction to Enterprise Network and Security Management By Bongsik Shin
Cover of Practical Introduction to Enterprise Network and Security Management by bongsik shin

Practical Introduction to Enterprise Network and Security Management

By Bongsik Shin

View Cybersecurity Ethics By Mary Manjikian
Cover of Cybersecurity Ethics by mary manjikian

Cybersecurity Ethics

By Mary Manjikian

View AWS Certified Solutions Architect Study Guide By Ben Piper,David Clinton
Cover of AWS Certified Solutions Architect Study Guide by ben piper,david clinton

AWS Certified Solutions Architect Study Guide

By Ben Piper,David Clinton

View Critical Infrastructure Protection in Homeland Security By Ted G. Lewis
Cover of Critical Infrastructure Protection in Homeland Security by ted g. lewis

Critical Infrastructure Protection in Homeland Security

By Ted G. Lewis

View Intelligent Computing & Optimization By Pandian Vasant,Ivan Zelinka,Gerhard Wilhelm Weber
Cover of Intelligent Computing & Optimization by pandian vasant,ivan zelinka,gerhard wilhelm weber

Intelligent Computing & Optimization

By Pandian Vasant,Ivan Zelinka,Gerhard Wilhelm Weber

View Engineering information security By Stuart Jacobs
Cover of Engineering information security by stuart jacobs

Engineering information security

By Stuart Jacobs

View Secrets and Lies By Bruce Schneier
Cover of Secrets and Lies by bruce schneier

Secrets and Lies

By Bruce Schneier

View Guide to computer network security By Joseph Migga Kizza
Cover of Guide to computer network security by joseph migga kizza

Guide to computer network security

By Joseph Migga Kizza

View CompTIA Security+ Review Guide By James Michael Stewart
Cover of CompTIA Security+ Review Guide by james michael stewart

CompTIA Security+ Review Guide

By James Michael Stewart