Tomeki

Explore Books on
computers security general

1-24 of 116 Books

View IT Governance By Alan Calder,Steve Watkins
Cover of IT Governance by alan calder,steve watkins

IT Governance

By Alan Calder,Steve Watkins

View Cold cases By James M. Adcock
Cover of Cold cases by james m. adcock

Cold cases

By James M. Adcock

View Implementing Digital Forensic Readiness By Jason Sachowski

Implementing Digital Forensic Readiness

Implementing Digital Forensic Readiness

By Jason Sachowski

View Responsive Security By Meng Chow Kang

Responsive Security

Responsive Security

By Meng Chow Kang

View Electronically stored information By David R. Matthews
Cover of Electronically stored information by david r. matthews

Electronically stored information

By David R. Matthews

View Information security governance simplified By Todd Fitzgerald

Information security governance simplified

Information security governance simplified

By Todd Fitzgerald

View Ethical Hacking and Penetration Testing Guide By Rafay Baloch
Cover of Ethical Hacking and Penetration Testing Guide by rafay baloch

Ethical Hacking and Penetration Testing Guide

By Rafay Baloch

View No-Body Homicide Cases By Thomas A. (Tad) DiBiase

No-Body Homicide Cases

No-Body Homicide Cases

By Thomas A. (Tad) DiBiase

View The practical guide to HIPAA privacy and security compliance By Kevin Beaver
Cover of The practical guide to HIPAA privacy and security compliance by kevin beaver

The practical guide to HIPAA privacy and security compliance

By Kevin Beaver

View Noiseless steganography By Abdelrahman Desoky

Noiseless steganography

Noiseless steganography

By Abdelrahman Desoky

View Multimedia security By Frank Y. Shih

Multimedia security

Multimedia security

By Frank Y. Shih

View Policing global movement By S. Caroline Taylor,Daniel Joseph Torpy,Das, Dilip K.
Cover of Policing global movement by s. caroline taylor,daniel joseph torpy,das, dilip k.

Policing global movement

By S. Caroline Taylor,Daniel Joseph Torpy,Das, Dilip K.

View Automatic Defense Against Zeroday Polymorphic Worms In Communication Networks By Mohssen Mohammed
Cover of Automatic Defense Against Zeroday Polymorphic Worms In Communication Networks by mohssen mohammed

Automatic Defense Against Zeroday Polymorphic Worms In Communication Networks

By Mohssen Mohammed

View Security Risk Models for Cyber Insurance By David Rios Insua,Caroline Baylon,Jose Vila

Security Risk Models for Cyber Insurance

Security Risk Models for Cyber Insurance

By David Rios Insua,Caroline Baylon,Jose Vila

View Managing Security Services in Heterogenous Networks By R. Thandeeswaran,Thinagaran Perumal,Kun Ma,N. Jeyanthi

Managing Security Services in Heterogenous Networks

Managing Security Services in Heterogenous Networks

By R. Thandeeswaran,Thinagaran Perumal,Kun Ma,N. Jeyanthi

View Security without obscurity By Jeffrey James Stapleton

Security without obscurity

Security without obscurity

By Jeffrey James Stapleton

View Fraud Auditing Using Caatt By Shaun Aghili

Fraud Auditing Using Caatt

Fraud Auditing Using Caatt

By Shaun Aghili

View Cyber Arms By Stanislav Abaimov,Maurizio Martellini

Cyber Arms

Cyber Arms

By Stanislav Abaimov,Maurizio Martellini

View Professional Security Management By Charles Swanson

Professional Security Management

Professional Security Management

By Charles Swanson

View Blockchain Technology and Applications By Ahmed Banafa
Cover of Blockchain Technology and Applications by ahmed banafa

Blockchain Technology and Applications

By Ahmed Banafa

View Casino and Gaming Resort Investigations By Derk J. Boss,Alan W. Zajic

Casino and Gaming Resort Investigations

Casino and Gaming Resort Investigations

By Derk J. Boss,Alan W. Zajic

View Enhancing Business Continuity and IT Capability By Nijaz Bajgorić,Lejla Turulja,Semir Ibrahimović,Amra Alagic

Enhancing Business Continuity and IT Capability

Enhancing Business Continuity and IT Capability

By Nijaz Bajgorić,Lejla Turulja,Semir Ibrahimović,Amra Alagic

View Wireless Multimedia Communication Systems By Kamisetty Ramamohan Rao,Zoran S. Bojkovic,Bojan M. Bakmaz
Cover of Wireless Multimedia Communication Systems by kamisetty ramamohan rao,zoran s. bojkovic,bojan m. bakmaz

Wireless Multimedia Communication Systems

By Kamisetty Ramamohan Rao,Zoran S. Bojkovic,Bojan M. Bakmaz

View Introduction to Computer Networks and Cybersecurity By Chwan-Hwa (John) Wu,J. David Irwin
Cover of Introduction to Computer Networks and Cybersecurity by chwan-hwa (john) wu,j. david irwin

Introduction to Computer Networks and Cybersecurity

By Chwan-Hwa (John) Wu,J. David Irwin