1
by Gomzin, Slava
Published 2014
Wiley
Subjects: ...Computer security...

2
by Cooper, Arthur B.
Published 2023
Apress L. P.
Subjects: ...Computer Security...

3
by Neagu, Adrian
Published 2012
Packt Pub.
Subjects: ...Computer security / http://id.loc.gov/authorities/subjects/sh90001862...

4
by Ozelli, Selva
Published 2023
John Wiley & Sons, Inc.
Subjects: ...Computer security / http://id.loc.gov/authorities/subjects/sh90001862...

5
by Shimonski, Robert
Published 2020
For Dummies
Subjects: ...Computer security / http://id.loc.gov/authorities/subjects/sh90001862...

6
by Lat, Sarah Jane
Published 2024
Packt Publishing
Subjects: ...Computer security / http://id.loc.gov/authorities/subjects/sh90001862...

7
by Lat, Joshua Arvin
Published 2023
Packt Publishing Ltd.
Subjects: ...Computer security / http://id.loc.gov/authorities/subjects/sh90001862...

8
by Bashir, Imran
Published 2023
Packt Publishing
Subjects: ...Computer security / fast...

9
by Mangrulkar, Ramchandra, Chavan, Pallavi
Published 2024
Apress
Subjects: ...Computer security / http://id.loc.gov/authorities/subjects/sh90001862...

10
by Hancock, Stephen
Published 2024
IT Governance Publishing
Subjects: ...COMPUTERS / Security / General / bisacsh...

11
by Loukides, Michael Kosta
Published 2023
O'Reilly Media, Inc.
Subjects: ...Computer security / Technological innovations...

12
by Loukides, Michael Kosta
Published 2023
O'Reilly Media, Inc.
Subjects: ...Computer security / Technological innovations...

13
by Loukides, Michael Kosta
Published 2022
O'Reilly Media, Inc.
Subjects: ...Computer security / Technological innovations...

14
by Kumble, Ganesh Prasad
Published 2020
Packt Publishing Ltd.
Subjects: ...Computers / Security / Cryptography / bisacsh...

15
by Wright, Steve
Published 2011
IT Governance Pub.
Subjects: ...COMPUTERS / Security / General / bisacsh...

16
by Badr, Bellaj, Horrocks, Richard, Wu, Xun (Brian)
Published 2018
Packt Publishing
Subjects: ...Computers / Security / Cryptography / bisacsh...

17
Published 2004
Springer Berlin Heidelberg
Table of Contents: ... Models of Computer Security -- Visualization Tools for Security Administrators -- Secure Interaction...