Toggle navigation
Campus Access
About MPG.eBooks
Skip to content
Search Tips
Home
>
Search: ((international security) or (internet securite))
Language
English
Deutsch
Español
Français
Italiano
日本語
Nederlands
Português
Português (Brasil)
中文(简体)
中文(繁體)
Türkçe
עברית
Gaeilge
Cymraeg
Ελληνικά
Català
Euskara
Русский
Čeština
Suomi
Svenska
polski
Dansk
slovenščina
اللغة العربية
বাংলা
Galego
Tiếng Việt
Hrvatski
हिंदी
All Fields
Title
Person
Topic
ISBN/ISSN
Year
Collection
Advanced
Retain my current filters
dewey-ones:"620 - Engineering & allied operations"
Search alternatives
:
international security »
national security
internet securite »
internet security
Showing
1
-
7
of
7
Search:
'((international security) or (internet securite))'
,
query time: 0.48s
Book List
0
Sort:
Relevance
Year Descending
Year Ascending
Author
Title
Read Now
1
Getting started with
secure
embedded systems : developing IoT systems for micro:bit and Raspberry Pi Pico using Rust and Tock
by
Radovici, Alexandru
,
Culic, Ioana
Published 2022
Apress
Subjects:
“
...
Internet
des objets...
”
Call Number:
TK5105.8857
Read Now
2
Deploying Microsoft Forefront Unified Access Gateway 2010
by
Diogenes, Yuri
Published 2010
Microsoft Press
Table of Contents:
“
... of a Forefront UAG DirectAccess Solution; DirectAccess
Security
Considerations...
”
Call Number:
QA76.9.A25
Read Now
3
CCNP
Security
Firewall 642-617 quick reference
by
Mason, Andrew
Published 2011
Cisco Press
Subjects:
“
...Firewalls (Computer
security
) / fast...
”
Call Number:
TK5105.59
Read Now
4
Iris biometric model for
secured
network access
by
El Khoury, Franjieh
Published 2013
CRC Press
Subjects:
“
...COMPUTERS /
Internet
/
Security
/ bisacsh...
”
Call Number:
TK7882.B56
Read Now
5
Managing risk and information
security
: protect to enable
by
Harkins, Malcolm
Published 2013
Apress
Subjects:
“
...Computer
security
...
”
Call Number:
QA76.9.A25
Read Now
6
Hack I.T. : security through penetration testing
by
Klevinsky, T. J.
Published 2002
Addison-Wesley
Table of Contents:
“
... -- Appendix B. The twenty most critical
Internet
security
vulnerabilities--the experts' consensus...
”
Call Number:
QA76.9.A25
Read Now
7
Digital forensics explained
Published 2021
CRC Press
Table of Contents:
“
... -- Mobile forensics tools -- Visual analysis --
Secured
storage -- Damaged media -- Summary -- References...
”
Call Number:
HV8079.C65
Back
Narrow Search
Remove Filters
Clear Filter
Classification: 620 - Engineering & allied operations
Year of Publication
From:
To:
Classification
620 - Engineering & allied operations
005 - Computer programming, programs & data
6
500 - Natural sciences & mathematics
5
331 - Labor economics
4
384 - Communications; telecommunication
3
006 - Special computer methods
1
more ...
363 - Other social problems & services
1
364 - Criminology
1
621 - Applied physics
1
see all ...
less ...
Language
English
7
Collection
O'Reilly
7
Author
Culic, Ioana
1
Diogenes, Yuri
1
El Khoury, Franjieh
1
Gogolin, Greg
1
Gupta, Ajay
1
Harkins, Malcolm
1
more ...
Klevinsky, T. J.
1
Laliberte, Scott
1
Mason, Andrew
1
Radovici, Alexandru
1
Shinder, Thomas W.
1
see all ...
less ...
Search Tools
Get RSS Feed
Share Search
https://ebooks.mpdl.mpg.de/ebooks/Search/Results?filter%5B%5D=dewey-ones%3A%22620+-+Engineering+%26+allied+operations%22&lookfor=%28%28international+security%29+or+%28internet+securite%29%29&type=AllFields
Send by Email
×
Loading...