Tomeki

Explore Books on
computers internet security

1-24 of 43 Books

View Cyber Enigma By E. Dilipraj

Cyber Enigma

Cyber Enigma

By E. Dilipraj

View Build your own security lab By Michael Gregg
Cover of Build your own security lab by michael gregg

Build your own security lab

By Michael Gregg

View Security Risk Models for Cyber Insurance By David Rios Insua,Caroline Baylon,Jose Vila

Security Risk Models for Cyber Insurance

Security Risk Models for Cyber Insurance

By David Rios Insua,Caroline Baylon,Jose Vila

View Routledge Companion to Global Cyber-Security Strategy By Scott N. Romaniuk,Mary Manjikian
Cover of Routledge Companion to Global Cyber-Security Strategy by scott n. romaniuk,mary manjikian

Routledge Companion to Global Cyber-Security Strategy

By Scott N. Romaniuk,Mary Manjikian

View Internet of Things By S. Velliangiri,Sathish A. P. Kumar,P. Karthikeyan

Internet of Things

Internet of Things

By S. Velliangiri,Sathish A. P. Kumar,P. Karthikeyan

View Mainframe basics for security professionals By Ori Pomerantz,Barbara Vander Weele,Mark Nelson,Tim Hahn
Cover of Mainframe basics for security professionals by ori pomerantz,barbara vander weele,mark nelson,tim hahn

Mainframe basics for security professionals

By Ori Pomerantz,Barbara Vander Weele,Mark Nelson,Tim Hahn

View Mobile Technology and Social Transformations By Stefanie Felsberger,Ramesh Subramanian

Mobile Technology and Social Transformations

Mobile Technology and Social Transformations

By Stefanie Felsberger,Ramesh Subramanian

View Cisco Asa By Frahim, Jazib/ Santos, Omar,Omar Santos,Jazib Frahim
Cover of Cisco Asa by frahim, jazib/ santos, omar,omar santos,jazib frahim

Cisco Asa

By Frahim, Jazib/ Santos, Omar,Omar Santos,Jazib Frahim

View Securing VoIP networks By Peter Thermos,Ari Takanen
Cover of Securing VoIP networks by peter thermos,ari takanen

Securing VoIP networks

By Peter Thermos,Ari Takanen

View China and Cybersecurity By Jon R. Lindsay,Tai Ming Cheung,Derek S. Reveron
Cover of China and Cybersecurity by jon r. lindsay,tai ming cheung,derek s. reveron

China and Cybersecurity

By Jon R. Lindsay,Tai Ming Cheung,Derek S. Reveron

View What stays in Vegas By Adam Tanner
Cover of What stays in Vegas by adam tanner

What stays in Vegas

By Adam Tanner

View Cisco Network Admission Control By Jazib Frahim,Denise Helfrich,Lou Ronnau,Jason Frazier,Paul Forbes
Cover of Cisco Network Admission Control by jazib frahim,denise helfrich,lou ronnau,jason frazier,paul forbes

Cisco Network Admission Control

By Jazib Frahim,Denise Helfrich,Lou Ronnau,Jason Frazier,Paul Forbes

View Cisco NAC appliance By Jamey Heary,Chad Sullivan,Alok Agrawal,Jerry Lin
Cover of Cisco NAC appliance by jamey heary,chad sullivan,alok agrawal,jerry lin

Cisco NAC appliance

By Jamey Heary,Chad Sullivan,Alok Agrawal,Jerry Lin

View SSL and Remote Access VPNs By Jazib Frahim,Quiang Huang,Aamir Waheed
Cover of SSL and Remote Access VPNs by jazib frahim,quiang huang,aamir waheed

SSL and Remote Access VPNs

By Jazib Frahim,Quiang Huang,Aamir Waheed

View Understanding PKI By Carlisle Adams,Carlisle Adams,Steve Lloyd
Cover of Understanding PKI by carlisle adams,carlisle adams,steve lloyd

Understanding PKI

By Carlisle Adams,Carlisle Adams,Steve Lloyd

View The smartphone By Elizabeth Woyke
Cover of The smartphone by elizabeth woyke

The smartphone

By Elizabeth Woyke

View Online child safety By Joseph Savirimuthu
Cover of Online child safety by joseph savirimuthu

Online child safety

By Joseph Savirimuthu

View Mapping security By Tom Patterson,Scott Gleeson Blue
Cover of Mapping security by tom patterson,scott gleeson blue

Mapping security

By Tom Patterson,Scott Gleeson Blue

View CCSP self-study By Grey, Paul CCIE.,Ido Dubrawsky,Paul Grey
Cover of CCSP self-study by grey, paul ccie.,ido dubrawsky,paul grey

CCSP self-study

By Grey, Paul CCIE.,Ido Dubrawsky,Paul Grey

View Internet of Things By Scott J. Shackelford

Internet of Things

Internet of Things

By Scott J. Shackelford

View Intrusion signatures and analysis By Stephen Northcutt,Mark Cooper,Matt Fearnow,Karen Frederick
Cover of Intrusion signatures and analysis by stephen northcutt,mark cooper,matt fearnow,karen frederick

Intrusion signatures and analysis

By Stephen Northcutt,Mark Cooper,Matt Fearnow,Karen Frederick

View Inside network perimeter security By Stephen Northcutt,Mark T. Edmead,Lenny Zeltser,Scott Winters,Karen Fredrick,Ronald W. Ritchey
Cover of Inside network perimeter security by stephen northcutt,mark t. edmead,lenny zeltser,scott winters,karen fredrick,ronald w. ritchey

Inside network perimeter security

By Stephen Northcutt,Mark T. Edmead,Lenny Zeltser,Scott Winters,Karen Fredrick,Ronald W. Ritchey

View Social media risk and governance By Phil Mennie
Cover of Social media risk and governance by phil mennie

Social media risk and governance

By Phil Mennie

View Challenges in Cybersecurity and Privacy By Jorge Bernal Bernabe,Antonio Skarmeta
Cover of Challenges in Cybersecurity and Privacy by jorge bernal bernabe,antonio skarmeta

Challenges in Cybersecurity and Privacy

By Jorge Bernal Bernabe,Antonio Skarmeta