Menu Expand
Login
Search Titles
Search
Catalogue (Books)
Publishers
Computer security
Subjects (Books)
Computing & Information Technology
Computer security
Advanced search
Metadata Search
Availability
All Items
Open Access
Items I can access
Subjects (Books)
Any
Medicine & Nursing
Reference, Information & Interdisciplinary subjects
Earth Sciences, Geography, Environment, Planning
Technology, Engineering, Agriculture
Computing & Information Technology
History & Archaeology
Society & Social Sciences
Health, Relationships & Personal development
The Arts
Biography, Literature & Literary studies
Economics, Finance, Business & Management
Law
Sports & Active outdoor recreation
Mathematics & Science
Lifestyle, Hobbies & Leisure
Language
Any
English
German
French
Italian
Publication Year
(From)
(To)
Search
Results
(181–190 out of 525)
Sort by:
Title, ascending
Title, descending
Publication date, ascending
Publication date, descending
Newest added, ascending
Newest added, descending
BOOK
How to Cheat at Configuring Exchange Server 2007
Henrik Walther
(2011)
Info
BOOK
Techno Security's Guide to Managing Risks for IT Managers, Auditors, and Investigators
Johnny Long
Jack Wiles
Russ Rogers
Phil Drake
Ron J. Green
Greg Kipper
Raymond Todd Blackwood
Amber Schroader
Eric Cole
Dennis O'Brien
Kevin O'Shea
Donald Withers
(2011)
Info
BOOK
Business Continuity and Disaster Recovery Planning for IT Professionals
Susan Snedaker
(2011)
Info
BOOK
Cyber Crime Investigations
Anthony Reyes
Richard Brittson
Kevin O'Shea
James Steele
(2011)
Info
BOOK
How to Cheat at Configuring Open Source Security Tools
Michael Gregg
Eric Seagren
Angela Orebaugh
Matt Jonkman
Raffael Marty
(2011)
Info
BOOK
How to Cheat at Microsoft Vista Administration
Jan Kanclirz
(2011)
Info
BOOK
How to Cheat at VoIP Security
Thomas Porter, CISSP, CCNP, CCDA, CCS
Michael Gough
(2011)
Info
BOOK
XSS Attacks
Seth Fogie
Jeremiah Grossman
Robert Hansen
Anton Rager
Petko D. Petkov
(2011)
Info
BOOK
Metasploit Toolkit for Penetration Testing, Exploit Development, and Vulnerability Research
David Maynor
(2011)
Info
BOOK
Security Convergence
Dave Tyson
(2011)
Info
‹
1
2
...
16
17
18
19
20
21
22
...
52
53
›
We use cookies to ensure that you get the best experience on our website.
Learn more about how we use cookies.
Accept all cookies
Reject non-essential cookies