Tomeki

Explore Books on
computer security

1-24 of 7,165 Books

View Digital Fortress By Dan Brown
Cover of Digital Fortress by dan brown

Digital Fortress

By Dan Brown

View Advances in Computers, Volume 49 (Advances in Computers) By Marvin V. Zelkowitz,Marshall C. Yovits
Cover of Advances in Computers, Volume 49 (Advances in Computers) by marvin v. zelkowitz,marshall c. yovits

Advances in Computers, Volume 49 (Advances in Computers)

By Marvin V. Zelkowitz,Marshall C. Yovits

View Hacking for Dummies By Kevin Beaver,Jutta Schmidt
Cover of Hacking for Dummies by kevin beaver,jutta schmidt

Hacking for Dummies

By Kevin Beaver,Jutta Schmidt

View Air traffic control By United States. General Accounting Office

Air traffic control

Air traffic control

By United States. General Accounting Office

View Computer Concepts By June Jamrich Parsons,Dan Oja
Cover of Computer Concepts by june jamrich parsons,dan oja

Computer Concepts

By June Jamrich Parsons,Dan Oja

View Firewall -- Canadian Book Club By Andy McNab
Cover of Firewall -- Canadian Book Club by andy mcnab

Firewall -- Canadian Book Club

By Andy McNab

View CISSP for dummies By Lawrence H. Miller,Peter H. Gregory,Lawrence Miller,Lawrence C. Miller,Peter H., CISA, CISSP Gregory,Peter Gregory
Cover of CISSP for dummies by lawrence h. miller,peter h. gregory,lawrence miller,lawrence c. miller,peter h., cisa, cissp gregory,peter gregory

CISSP for dummies

By Lawrence H. Miller,Peter H. Gregory,Lawrence Miller,Lawrence C. Miller,Peter H., CISA, CISSP Gregory,Peter Gregory

View Tax systems modernization By United States. General Accounting Office

Tax systems modernization

Tax systems modernization

By United States. General Accounting Office

View Advances in Intelligent Information Hiding and Multimedia Signal Processing By Jeng-Shyang Pan,Pei-Wei Tsai,Junzo Watada,Lakhmi C. Jain
Cover of Advances in Intelligent Information Hiding and Multimedia Signal Processing by jeng-shyang pan,pei-wei tsai,junzo watada,lakhmi c. jain

Advances in Intelligent Information Hiding and Multimedia Signal Processing

By Jeng-Shyang Pan,Pei-Wei Tsai,Junzo Watada,Lakhmi C. Jain

View SAS(R) 9.1.3 Intelligence Platform By SAS Publishing
Cover of SAS(R) 9.1.3 Intelligence Platform by sas publishing

SAS(R) 9.1.3 Intelligence Platform

By SAS Publishing

View Information security By United States. General Accounting Office

Information security

Information security

By United States. General Accounting Office

View Advanced Computing and Systems for Security By Rituparna Chaki,Agostino Cortesi,Khalid Saeed,Nabendu Chaki
Cover of Advanced Computing and Systems for Security by rituparna chaki,agostino cortesi,khalid saeed,nabendu chaki

Advanced Computing and Systems for Security

By Rituparna Chaki,Agostino Cortesi,Khalid Saeed,Nabendu Chaki

View Foundations and Practice of Security By Joaquin Garcia-Alfaro
Cover of Foundations and Practice of Security by joaquin garcia-alfaro

Foundations and Practice of Security

By Joaquin Garcia-Alfaro

View IT-Sicherheit By Claudia Eckert

IT-Sicherheit

IT-Sicherheit

By Claudia Eckert

View Security Engineering By Ross J. Anderson
Cover of Security Engineering by ross j. anderson

Security Engineering

By Ross J. Anderson

View Optimal Spending on Cybersecurity Measures By Tara Kissoon
Cover of Optimal Spending on Cybersecurity Measures by tara kissoon

Optimal Spending on Cybersecurity Measures

By Tara Kissoon

View Introduction to modern cryptography By Jonathan Katz,Yehuda Lindell
Cover of Introduction to modern cryptography by jonathan katz,yehuda lindell

Introduction to modern cryptography

By Jonathan Katz,Yehuda Lindell

View Deployment Guide Series By IBM Redbooks
Cover of Deployment Guide Series by ibm redbooks

Deployment Guide Series

By IBM Redbooks

View Hackers By Steven Levy
Cover of Hackers by steven levy

Hackers

By Steven Levy

View Financial Cryptography and Data Security By Jeremy Clark,Sarah Meiklejohn,Peter Y. A. Ryan,Dan Wallach,Michael Brenner,Kurt Rohloff
Cover of Financial Cryptography and Data Security by jeremy clark,sarah meiklejohn,peter y. a. ryan,dan wallach,michael brenner,kurt rohloff

Financial Cryptography and Data Security

By Jeremy Clark,Sarah Meiklejohn,Peter Y. A. Ryan,Dan Wallach,Michael Brenner,Kurt Rohloff

View CISSP By James Michael Stewart,Mike Chapple,Ed Tittel
Cover of CISSP by james michael stewart,mike chapple,ed tittel

CISSP

By James Michael Stewart,Mike Chapple,Ed Tittel

View Open source intelligence techniques By Michael Bazzell
Cover of Open source intelligence techniques by michael bazzell

Open source intelligence techniques

By Michael Bazzell

View Information Security By Mark Stamp
Cover of Information Security by mark stamp

Information Security

By Mark Stamp

View Group policy By Jeremy Moskowitz
Cover of Group policy by jeremy moskowitz

Group policy

By Jeremy Moskowitz