Resultados da busca

Refinar Resultados
  1. 1

    Technology and privacy : the new landscape /

    Publicado em 1997
    Obter o texto integral
    Licensed eBooks
  2. 2

    Trust in cyberspace /

    Publicado em 1999
    Obter o texto integral
    Licensed eBooks
  3. 3

    Information security best practices : 200 basic rules / por Stefanek, George L.

    Publicado em 2001
    Obter o texto integral
    Licensed eBooks
  4. 4

    Techniques and applications of digital watermarking and content protection / por Arnold, Michael (Michael Konrad), 1964-

    Publicado em 2003
    Obter o texto integral
    Licensed eBooks
  5. 5

    Protecting your library's digital sources : the essential guide to planning and preservation / por Kahn, Miriam (Miriam B.)

    Publicado em 2004
    Obter o texto integral
    Licensed eBooks
  6. 6

    Security and control in information systems : a guide for business and accounting / por Hawker, Andrew

    Publicado em 2000
    Obter o texto integral
    Licensed eBooks
  7. 7

    Penetration tester's open source toolkit / por Long, Johnny

    Publicado em 2006
    Obter o texto integral
    Licensed eBooks
  8. 8

    Basics of contemporary cryptography for IT practitioners / por Ryabko, Boris

    Publicado em 2005
    Obter o texto integral
    Licensed eBooks
  9. 9
  10. 10

    Risk management for computer security : Protecting your network and information assets / por Jones, Andy, 1952-

    Publicado em 2005
    Obter o texto integral
    Licensed eBooks
  11. 11

    Digital watermarking and steganography /

    Publicado em 2008
    Obter o texto integral
    Licensed eBooks
  12. 12

    Fuzzing for software security testing and quality assurance / por Takanen, Ari

    Publicado em 2008
    Obter o texto integral
    Licensed eBooks
  13. 13

    Best damn firewall book period /

    Publicado em 2007
    Obter o texto integral
    Licensed eBooks
  14. 14

    Document Security : Protecting Physical and Electronic Content. por Mendell, Ronald L.

    Publicado em 2007
    Obter o texto integral
    Licensed eBooks
  15. 15

    Managing Information Security Breaches : Studies from Real Life. por Krausz, Michael

    Publicado em 2010
    Obter o texto integral
    Licensed eBooks
  16. 16

    The chief information security officer : insights, tools and survival skills / por Kouns, Barry

    Publicado em 2011
    Obter o texto integral
    Licensed eBooks
  17. 17
  18. 18

    Cyber crime, security and digital intelligence / por Johnson, Mark, 1959-

    Publicado em 2013
    Obter o texto integral
    Licensed eBooks
  19. 19

    Cryptography and network security. por Parashar, Ajay Raj

    Publicado em 2015
    Obter o texto integral
    Licensed eBooks
  20. 20

Ferramentas de busca: