ePrivacy and GPDR Cookie Consent by Cookie Consent
Info You can find and rate any book here

Explore all books in Computers / Security / General category

Decrypted Secrets

Methods and Maxims of Cryptology

Friedrich L. Bauer

Computers / Security / General

🥺 Not rated yet

Transactions on Computational Science XXIX

C.J. Kenneth Tan , Marina L. Gavrilova

Computers / Security / General

🥺 Not rated yet

Personal Data Privacy and Protection in a Surveillance Era: Technologies and Practices

Technologies and Practices

Akrivopoulou, Christina , Psygkas, Athanasios

Computers / Security / General

🥺 Not rated yet

Foundations of Information Security

A Straightforward Introduction

Jason Andress

Computers / Security / General

🥺 Not rated yet

Blockchain Security from the Bottom Up

Securing and Preventing Attacks on Cryptocurrencies, Decentralized Applications, NFTs, and Smart Contracts

Howard E. Poston, III

Computers / Security / General

🥺 Not rated yet

Information Security

Principles and Practice

Mark Stamp

Computers / Security / General

🥺 Not rated yet

Introduction to Network Security

Theory and Practice

Jie Wang , Zachary A. Kissel

Computers / Security / General

🥺 Not rated yet

Security Management, Integrity, and Internal Control in Information Systems

IFIP TC-11 WG 11.1 & WG 11.5 Joint Working Conference

Bhavani Thuraisingham , Paul Dowland , Steve Furnell , X. Sean Wang

Computers / Security / General

🥺 Not rated yet

Computer Crimes and Digital Investigations

Ian Walden

Computers / Security / General

🥺 Not rated yet

CompTIA CySA+ Practice Tests

Exam CS0-002

David Seidl , Mike Chapple

Computers / Security / General

🥺 Not rated yet

Privacy Enhancing Technologies

6th International Workshop, PET 2006, Cambridge, UK, June 28-30, 2006, Revised Selected Papers

George Danezis , Philippe Golle

Computers / Security / General

🥺 Not rated yet

The Basics of Cyber Safety

Computer and Mobile Device Safety Made Easy

John Sammons , Michael Cross

Computers / Security / General

🥺 Not rated yet

Ansible For Security by Examples

100+ Automation Examples to Automate Security and Verify Compliance for IT Modern Infrastructure

Luca Berton

Computers / Security / General

🥺 Not rated yet

Critical Research on Scalability and Security Issues in Virtual Cloud Environments

Aljawarneh, Shadi , Malhotra, Manisha

Computers / Security / General

🥺 Not rated yet

Information Security Policies, Procedures, and Standards

Guidelines for Effective Information Security Management

Thomas R. Peltier

Computers / Security / General

🥺 Not rated yet