Tomeki

Explore Books on
computerbeveiliging

1-24 of 39 Books

View Security Engineering By Ross J. Anderson
Cover of Security Engineering by ross j. anderson

Security Engineering

By Ross J. Anderson

View Introduction to modern cryptography By Jonathan Katz,Yehuda Lindell
Cover of Introduction to modern cryptography by jonathan katz,yehuda lindell

Introduction to modern cryptography

By Jonathan Katz,Yehuda Lindell

View Crypto By Steven Levy
Cover of Crypto by steven levy

Crypto

By Steven Levy

View Security in computing By Charles P. Pfleeger,Charles P. Pfleeger,Shari Lawrence Pfleeger,Jonathan Margulies
Cover of Security in computing by charles p. pfleeger,charles p. pfleeger,shari lawrence pfleeger,jonathan margulies

Security in computing

By Charles P. Pfleeger,Charles P. Pfleeger,Shari Lawrence Pfleeger,Jonathan Margulies

View Hacking exposed By Joel Scambray,Stuart McClure,George Kurtz
Cover of Hacking exposed by joel scambray,stuart mcclure,george kurtz

Hacking exposed

By Joel Scambray,Stuart McClure,George Kurtz

View Building Internet Firewalls By D. Brent Chapman,Elizabeth D. Zwicky
Cover of Building Internet Firewalls by d. brent chapman,elizabeth d. zwicky

Building Internet Firewalls

By D. Brent Chapman,Elizabeth D. Zwicky

View The Art of Deception By Kevin D. Mitnick,William L. Simon
Cover of The Art of Deception by kevin d. mitnick,william l. simon

The Art of Deception

By Kevin D. Mitnick,William L. Simon

View Legal Regulations, Implications, and Issues Surrounding Digital Data By Margaret Jackson,Marita Shelly
Cover of Legal Regulations, Implications, and Issues Surrounding Digital Data by margaret jackson,marita shelly

Legal Regulations, Implications, and Issues Surrounding Digital Data

By Margaret Jackson,Marita Shelly

View Guide to computer forensics and investigations By Bill Nelson,Amelia Phillips,Frank Enfinger,Christopher Steuart
Cover of Guide to computer forensics and investigations by bill nelson,amelia phillips,frank enfinger,christopher steuart

Guide to computer forensics and investigations

By Bill Nelson,Amelia Phillips,Frank Enfinger,Christopher Steuart

View Rsa Security's Official Guide to Cryptography By Steve Burnett
Cover of Rsa Security's Official Guide to Cryptography by steve burnett

Rsa Security's Official Guide to Cryptography

By Steve Burnett

View Hack Attacks Denied By John Chirillo
Cover of Hack Attacks Denied by john chirillo

Hack Attacks Denied

By John Chirillo

View Enterprise security with EJB and CORBA By Bret Hartman
Cover of Enterprise security with EJB and CORBA by bret hartman

Enterprise security with EJB and CORBA

By Bret Hartman

View Data Privacy and Security By David Salomon
Cover of Data Privacy and Security by david salomon

Data Privacy and Security

By David Salomon

View Network Security By Fred Simonds
Cover of Network Security by fred simonds

Network Security

By Fred Simonds

View Computer crime By David J. Icove,Karl Seger,William VonStorch
Cover of Computer crime by david j. icove,karl seger,william vonstorch

Computer crime

By David J. Icove,Karl Seger,William VonStorch

View Windows NT Security Handbook By Tom Sheldon
Cover of Windows NT Security Handbook by tom sheldon

Windows NT Security Handbook

By Tom Sheldon

View Securing PCs and data in libraries and schools By Allen C. Benson
Cover of Securing PCs and data in libraries and schools by allen c. benson

Securing PCs and data in libraries and schools

By Allen C. Benson

View PC magazine fighting spyware, viruses, and malware By Ed Tittel
Cover of PC magazine fighting spyware, viruses, and malware by ed tittel

PC magazine fighting spyware, viruses, and malware

By Ed Tittel

View Mobile agents and security By Giovanni Vigna
Cover of Mobile agents and security by giovanni vigna

Mobile agents and security

By Giovanni Vigna

View Net privacy By Michael Erbschloe,John R. Vacca
Cover of Net privacy by michael erbschloe,john r. vacca

Net privacy

By Michael Erbschloe,John R. Vacca

View Hacking exposed By Stuart McClure,Joel Scambray,George Kurtz
Cover of Hacking exposed by stuart mcclure,joel scambray,george kurtz

Hacking exposed

By Stuart McClure,Joel Scambray,George Kurtz

View Managing privacy By H. Jeff Smith
Cover of Managing privacy by h. jeff smith

Managing privacy

By H. Jeff Smith

View Computer security By David K. Hsiao
Cover of Computer security by david k. hsiao

Computer security

By David K. Hsiao