Menu Expand
Login
Search Titles
Search
Catalogue (Books)
Publishers
Computer security
Subjects (Books)
Computing & Information Technology
Computer security
Advanced search
Metadata Search
Availability
All Items
Open Access
Items I can access
Subjects (Books)
Any
Medicine & Nursing
Reference, Information & Interdisciplinary subjects
Earth Sciences, Geography, Environment, Planning
Technology, Engineering, Agriculture
Computing & Information Technology
History & Archaeology
Society & Social Sciences
Health, Relationships & Personal development
The Arts
Biography, Literature & Literary studies
Economics, Finance, Business & Management
Law
Sports & Active outdoor recreation
Mathematics & Science
Lifestyle, Hobbies & Leisure
Language
Any
English
German
French
Italian
Publication Year
(From)
(To)
Search
Results
(371–380 out of 525)
Sort by:
Title, ascending
Title, descending
Publication date, ascending
Publication date, descending
Newest added, ascending
Newest added, descending
BOOK
Risk Management for Computer Security
Andy Jones
Debi Ashenden
(2005)
Info
BOOK
Sockets, Shellcode, Porting, and Coding: Reverse Engineering Exploits and Tool Coding for Security Professionals
James C Foster
(2005)
Info
BOOK
Network Security
Jan L. Harrington
(2005)
Info
BOOK
Aggressive Network Self-Defense
Neil R. Wyler
(2005)
Info
BOOK
Black Hat Physical Device Security: Exploiting Hardware and Software
Drew Miller
(2005)
Info
BOOK
Cyber Spying Tracking Your Family's (Sometimes) Secret Online Lives
Eric Cole
Michael Nordfelt
Sandra Ring
Ted Fair
(2005)
Info
BOOK
Intrusion Prevention and Active Response
Michael Rash
Angela Orebaugh
Graham Clark
(2005)
Info
BOOK
Apple I Replica Creation
Tom Owad
(2005)
Info
BOOK
Microsoft Log Parser Toolkit
Gabriele Giuseppini
Mark Burnett
(2005)
Info
BOOK
Buffer Overflow Attacks
Jason Deckard
(2005)
Info
‹
1
2
...
35
36
37
38
39
40
41
...
52
53
›
We use cookies to ensure that you get the best experience on our website.
Learn more about how we use cookies.
Accept all cookies
Reject non-essential cookies