Tomeki

Explore Books on
datensicherung

1-24 of 203 Books

View Introduction to modern cryptography By Jonathan Katz,Yehuda Lindell
Cover of Introduction to modern cryptography by jonathan katz,yehuda lindell

Introduction to modern cryptography

By Jonathan Katz,Yehuda Lindell

View Information Security By Mark Stamp
Cover of Information Security by mark stamp

Information Security

By Mark Stamp

View Security in computing By Charles P. Pfleeger,Charles P. Pfleeger,Shari Lawrence Pfleeger,Jonathan Margulies
Cover of Security in computing by charles p. pfleeger,charles p. pfleeger,shari lawrence pfleeger,jonathan margulies

Security in computing

By Charles P. Pfleeger,Charles P. Pfleeger,Shari Lawrence Pfleeger,Jonathan Margulies

View Cyber-Security and Threat Politics By Myriam Dunn Cavelty
Cover of Cyber-Security and Threat Politics by myriam dunn cavelty

Cyber-Security and Threat Politics

By Myriam Dunn Cavelty

View The Future of the Internet-And How to Stop It By Jonathan L. Zittrain
Cover of The Future of the Internet-And How to Stop It by jonathan l. zittrain

The Future of the Internet-And How to Stop It

By Jonathan L. Zittrain

View Protecting Information Assets and It Infrastructure in the Cloud By Ravi Das
Cover of Protecting Information Assets and It Infrastructure in the Cloud by ravi das

Protecting Information Assets and It Infrastructure in the Cloud

By Ravi Das

View Internet of Things Security By Chintan Patel,Nishant Doshi

Internet of Things Security

Internet of Things Security

By Chintan Patel,Nishant Doshi

View Sicherheit und Kryptographie im Internet By Jörg Schwenk
Cover of Sicherheit und Kryptographie im Internet by jörg schwenk

Sicherheit und Kryptographie im Internet

By Jörg Schwenk

View Practical Cloud Security By Greer, Jr., Melvin B.,Kevin L. Jackson
Cover of Practical Cloud Security by greer, jr., melvin b.,kevin l. jackson

Practical Cloud Security

By Greer, Jr., Melvin B.,Kevin L. Jackson

View Managing Cyber Risk in the Financial Sector By Ruth Taplin

Managing Cyber Risk in the Financial Sector

Managing Cyber Risk in the Financial Sector

By Ruth Taplin

View Cyber Security Culture By Peter R.J. Trim,David Upton

Cyber Security Culture

Cyber Security Culture

By Peter R.J. Trim,David Upton

View Practical UNIX Security By Simson Garfinkel,Gene Spafford
Cover of Practical UNIX Security by simson garfinkel,gene spafford

Practical UNIX Security

By Simson Garfinkel,Gene Spafford

View Der IT Security Manager By Heinrich Kersten,Gerhard Klett,Klaus-Dieter Wolfenstetter
Cover of Der IT Security Manager by heinrich kersten,gerhard klett,klaus-dieter wolfenstetter

Der IT Security Manager

By Heinrich Kersten,Gerhard Klett,Klaus-Dieter Wolfenstetter

View Security in the Private Cloud By John R. Vacca

Security in the Private Cloud

Security in the Private Cloud

By John R. Vacca

View Theoretical analysis of information systems By Börje Langefors
Cover of Theoretical analysis of information systems by börje langefors

Theoretical analysis of information systems

By Börje Langefors

View Mobile Device Security For Dummies By Subbu Iyer
Cover of Mobile Device Security For Dummies by subbu iyer

Mobile Device Security For Dummies

By Subbu Iyer

View Network intrusion detection By Stephen Northcutt
Cover of Network intrusion detection by stephen northcutt

Network intrusion detection

By Stephen Northcutt

View Computer Security and Cryptography By Alan G. Konheim
Cover of Computer Security and Cryptography by alan g. konheim

Computer Security and Cryptography

By Alan G. Konheim

View Network security By Eric Maiwald
Cover of Network security by eric maiwald

Network security

By Eric Maiwald

View Internet and Intranet security By Rolf Oppliger
Cover of Internet and Intranet security by rolf oppliger

Internet and Intranet security

By Rolf Oppliger

View Network Security By Fred Simonds
Cover of Network Security by fred simonds

Network Security

By Fred Simonds

View Hacking für Manager By Tobias Schrödel
Cover of Hacking für Manager by tobias schrödel

Hacking für Manager

By Tobias Schrödel

View Hack proofing your network By Ryan Russell
Cover of Hack proofing your network by ryan russell

Hack proofing your network

By Ryan Russell

View Trust Management for Service-Oriented Environments By Zaki Malik
Cover of Trust Management for Service-Oriented Environments by zaki malik

Trust Management for Service-Oriented Environments

By Zaki Malik