1
by Bishop, Matt
Published 2004
Addison Wesley Professional
Subjects: ...Computer security / http://id.loc.gov/authorities/subjects/sh90001862...

2
by Bosworth, Seymour
Published 2009
John Wiley & Sons
Table of Contents: ...Psychology of computer criminals / Q. Campbell and David M. Kennedy -- Dangerous information...

3
Published 2019
Springer International Publishing
Table of Contents: ...Security Protocols for IoT -- Security in Ubiquitous Computing Environment: Vulnerabilities...

4
by Bishop, Matthew A.
Published 2002
Addison Wesley Professional
Subjects: ...Computer security / http://id.loc.gov/authorities/subjects/sh90001862...

5
Published 2015
Springer Nature Singapore
Table of Contents: ...I CSA -- 1 Mobile and ubiquitous computing -- 2 Dependable, reliable and autonomic computing -- 3...

6
Published 2017
O'Reilly Media, Inc.
Subjects: ...Computer networks / Security measures / http://id.loc.gov/authorities/subjects/sh94001277...

7
by Sen, Jaydip
Published 2020
IntechOpen
Subjects: ...Computer networking and communications / bicssc...

8
by Easttom, Chuck
Published 2022
PEARSON IT CERTIFICATION
Subjects: ...Computer networks / Security measures / http://id.loc.gov/authorities/subjects/sh94001277...

9
by Thomas, Ciza
Published 2020
IntechOpen
Subjects: ...Computer networking and communications / bicssc...

10
by Sadiqui, Ali
Published 2020
Wiley-ISTE
Table of Contents: .... Supervising a Computer Network -- 4. Securing Access Using AAA -- 5. Using Firewalls -- 6. Putting in Place...

11
by Easttom, Chuck
Published 2011
Pearson
Table of Contents: ...Introduction to computer security -- Networks and the internet -- Cyber stalking, fraud, and abuse...

12
by Easttom, Chuck
Published 2016
Pearson
Subjects: ...Computer security...

13
by Jacobson, Douglas, Idziorek, Joseph
Published 2016
Chapman and Hall/CRC
Subjects: ...Computer security / http://id.loc.gov/authorities/subjects/sh90001862...

14
Published 2016
Springer Nature Singapore
Table of Contents: .... Improving Lifetime of Memory Devices Using Evolutionary Computing Based Error Correction Coding -- Chapter...

15
Published 2014
Springer India
Table of Contents: ... Computational Intelligence -- Modeling Heavy-tails in Traffic Sources for Network Performance Evaluation...

16
Published 2019
Springer International Publishing
Subjects: ...Computer crimes...

17
by Elahi, Ata, Cushman, Alex
Published 2024
Springer International Publishing
Subjects: ...Computer Communication Networks...

18
Published 2020
Springer International Publishing
Table of Contents: ... and Detecting Weaknesses in Industrial Control Systems -- Self Adaptive Privacy in Cloud Computing Environments...

19
Published 2020
Springer International Publishing
Subjects: ...Computer Communication Networks...

20
by Erl, Thomas, Barcelo, Eric
Published 2023
Pearson
Subjects: ...Cloud computing / fast...