Tomeki

Explore Books on
computersicherheit

1-24 of 211 Books

View Security Engineering By Ross J. Anderson
Cover of Security Engineering by ross j. anderson

Security Engineering

By Ross J. Anderson

View Introduction to modern cryptography By Jonathan Katz,Yehuda Lindell
Cover of Introduction to modern cryptography by jonathan katz,yehuda lindell

Introduction to modern cryptography

By Jonathan Katz,Yehuda Lindell

View Information Security By Mark Stamp
Cover of Information Security by mark stamp

Information Security

By Mark Stamp

View Cybersecurity Ethics By Mary Manjikian
Cover of Cybersecurity Ethics by mary manjikian

Cybersecurity Ethics

By Mary Manjikian

View Cyber-Security and Threat Politics By Myriam Dunn Cavelty
Cover of Cyber-Security and Threat Politics by myriam dunn cavelty

Cyber-Security and Threat Politics

By Myriam Dunn Cavelty

View Cyberthreats and the Decline of the Nation-State By Susan W. Brenner

Cyberthreats and the Decline of the Nation-State

Cyberthreats and the Decline of the Nation-State

By Susan W. Brenner

View Database Nation <i>(Hardback)</i> By Simson Garfinkel
Cover of Database Nation <i>(Hardback)</i> by simson garfinkel

Database Nation <i>(Hardback)</i>

By Simson Garfinkel

View Cryptography engineering By Niels Ferguson,Bruce Schneier,Tadayoshi Kohno
Cover of Cryptography engineering by niels ferguson,bruce schneier,tadayoshi kohno

Cryptography engineering

By Niels Ferguson,Bruce Schneier,Tadayoshi Kohno

View Fatal Defect By Ivars Peterson
Cover of Fatal Defect by ivars peterson

Fatal Defect

By Ivars Peterson

View Information security policies, procedures, and standards By Thomas R. Peltier
Cover of Information security policies, procedures, and standards by thomas r. peltier

Information security policies, procedures, and standards

By Thomas R. Peltier

View Protecting Information Assets and It Infrastructure in the Cloud By Ravi Das
Cover of Protecting Information Assets and It Infrastructure in the Cloud by ravi das

Protecting Information Assets and It Infrastructure in the Cloud

By Ravi Das

View Sicherheit und Kryptographie im Internet By Jörg Schwenk
Cover of Sicherheit und Kryptographie im Internet by jörg schwenk

Sicherheit und Kryptographie im Internet

By Jörg Schwenk

View Security and Usability By Lorrie Faith Cranor,Simson Garfinkel
Cover of Security and Usability by lorrie faith cranor,simson garfinkel

Security and Usability

By Lorrie Faith Cranor,Simson Garfinkel

View Mobile Device Security For Dummies By Subbu Iyer
Cover of Mobile Device Security For Dummies by subbu iyer

Mobile Device Security For Dummies

By Subbu Iyer

View Mechanics of user identification and authentication By Dobromir Todorov
Cover of Mechanics of user identification and authentication by dobromir todorov

Mechanics of user identification and authentication

By Dobromir Todorov

View Der IT Security Manager By Heinrich Kersten,Gerhard Klett,Klaus-Dieter Wolfenstetter
Cover of Der IT Security Manager by heinrich kersten,gerhard klett,klaus-dieter wolfenstetter

Der IT Security Manager

By Heinrich Kersten,Gerhard Klett,Klaus-Dieter Wolfenstetter

View Information security architecture By Jan Killmeyer Tudor
Cover of Information security architecture by jan killmeyer tudor

Information security architecture

By Jan Killmeyer Tudor

View SSH, the Secure Shell By Daniel J. Barret,Richard E. Silverman,Daniel J. Barrett
Cover of SSH, the Secure Shell by daniel j. barret,richard e. silverman,daniel j. barrett

SSH, the Secure Shell

By Daniel J. Barret,Richard E. Silverman,Daniel J. Barrett

View The Mac hacker's handbook By Miller, Charles,Dino Dai Zovi
Cover of The Mac hacker's handbook by miller, charles,dino dai zovi

The Mac hacker's handbook

By Miller, Charles,Dino Dai Zovi

View Cloud security and privacy By Tim Mather
Cover of Cloud security and privacy by tim mather

Cloud security and privacy

By Tim Mather

View The Art of Intrusion By Kevin D. Mitnick,William L. Simon
Cover of The Art of Intrusion by kevin d. mitnick,william l. simon

The Art of Intrusion

By Kevin D. Mitnick,William L. Simon

View Computer forensics By Warren G. Kruse,Warren G. Kruse II,Jay G. Heiser
Cover of Computer forensics by warren g. kruse,warren g. kruse ii,jay g. heiser

Computer forensics

By Warren G. Kruse,Warren G. Kruse II,Jay G. Heiser

View Cyberphobia By Edward Lucas
Cover of Cyberphobia by edward lucas

Cyberphobia

By Edward Lucas

View Threat modeling By Adam Shostack
Cover of Threat modeling by adam shostack

Threat modeling

By Adam Shostack