Listing 1 - 10 of 20 | << page >> |
Sort by
|
Choose an application
Computer architecture. Operating systems --- KBC-manuals --- 681.3 --- Computer networks --- -Intranets (Computer networks) --- -Business enterprises --- -005.8 --- 12.03 --- Business organizations --- Businesses --- Companies --- Enterprises --- Firms --- Organizations, Business --- Business --- Internal internets (Computer networks) --- Business enterprises --- Wide area networks (Computer networks) --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Computerwetenschap --- Security measures --- -Security measures --- Preventie ; Diefstal ; Fraude --- Distributed processing --- Network computersComputerwetenschap --- Intranets (Computer networks) --- 005.8 --- Computer network security --- Network security, Computer --- Security of computer networks --- Computer security --- Computer networks&delete& --- 681.3* / / / / / / / / / / / / / / / / / / / / / / / / / / / /
Choose an application
681.3*D46 --- Computer networks --- -005.8 --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Computer network security --- Network security, Computer --- Security of computer networks --- Computer security --- Security and protection: access controls; authentication; cryptographic controls; information flow controls; security kernels; verification (Operating systems) --- Security measures. --- Security measures --- Distributed processing --- 681.3*D46 Security and protection: access controls; authentication; cryptographic controls; information flow controls; security kernels; verification (Operating systems) --- Réseaux d'ordinateurs --- Sécurité --- Mesures --- Réseaux d'ordinateurs --- Sécurité --- 005.8
Choose an application
Computer security --- 681.3*C20 --- Computer security. --- 005.8 --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Electronic digital computers --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Computer-communication networks: general: data communications, opensystems interconnection reference model (OSI), security and protection (e.g., firewalls) --- Security measures --- Cyber security --- Cybersecurity --- Protection of computer systems --- Protection --- 6813*C20
Choose an application
366.44 --- ICT --- Prince2 --- projectmanagement --- 65 --- 658.5 --- 681.3 --- Projectmanagement --- Software-ontwerp --- Management and organization of industry, trade and communication --- Prince2. --- Projectmanagement. --- 65 Management and organization of industry, trade and communication --- 65 Communicatie en transport. Accountancy. Bedrijfskunde. Public relations --- Communicatie en transport. Accountancy. Bedrijfskunde. Public relations --- 005.8
Choose an application
681.3*E3 --- Computer security. --- Computer networks --- Business enterprises --- Computer security --- -Business enterprises --- -005.8 --- Business organizations --- Businesses --- Companies --- Enterprises --- Firms --- Organizations, Business --- Business --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Electronic digital computers --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Computer network security --- Network security, Computer --- Security of computer networks --- Data encryption: data encryption standard; DES; public key cryptosystems --- Security measures. --- Security measures --- -Security measures --- Distributed processing --- 681.3*E3 Data encryption: data encryption standard; DES; public key cryptosystems --- Cyber security --- Cybersecurity --- Protection of computer systems --- Protection --- 005.8 --- Computer networks&delete&
Choose an application
Computer networks --- World Wide Web --- Web sites --- 681.3*C2 --- -World Wide Web (Information retrieval system) --- -Web sites --- -005.8 --- Pages, Web --- Sites, Web --- Web pages --- Websites --- World Wide Web pages --- World Wide Web sites --- WWW pages --- WWW sites --- Computer network resources --- W3 (World Wide Web) --- Web (World Wide Web) --- World Wide Web (Information retrieval system) --- WWW (World Wide Web) --- Hypertext systems --- Multimedia systems --- Internet --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Computer network security --- Network security, Computer --- Security of computer networks --- Computer security --- Security measures. --- Computer communication networks: data communications; OSI; security and protection --- Security measures --- Distributed processing --- 681.3 *C2 Computer communication networks: data communications; OSI; security and protection --- 005.8 --- 681.3 *C2
Choose an application
681.3*K65 --- Computer security. --- Computers --- Computer networks --- Computer security --- -Computer networks --- -005.8 --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic brains --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Computer systems --- Cybernetics --- Machine theory --- Calculators --- Cyberspace --- Computer privacy --- Computer system security --- Electronic digital computers --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Computer network security --- Network security, Computer --- Security of computer networks --- Security and protection: authentication; insurance; invasive software (e.g. viruses, worms, Trojan horses); physical security; unauthorized access (e.g. hacking, phreaking) --- Access control. --- Security measures. --- Access control --- Security measures --- Distributed processing --- Snort (Computer file) --- Intrusion detection systems (Computer security) --- Intrusion detection systems (Computer security). --- Cyber security --- Cybersecurity --- Protection of computer systems --- Protection --- 005.8 --- IDSs (Intrusion detection systems) --- Snort (Software)
Choose an application
Computer. Automation --- Cryptography. --- Cryptography --- Ciphers. --- Data encryption (Computer science) --- Confidential communications. --- Cryptographie --- Chiffres (Cryptographie) --- Chiffrement (Informatique) --- Secret professionnel --- History. --- Histoire --- -Ciphers --- Confidential communications --- 681.3*E3 --- 005.8 --- Communications, Confidential --- Confidential relationships --- Confidentiality --- Privileged communications (Confidential communications) --- Professional secrets --- Secrets, Professional --- Confession --- Criminal law --- Evidence (Law) --- Objections (Evidence) --- Personality (Law) --- Professional ethics --- Secrecy --- Privacy, Right of --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Codes --- Contractions --- Signs and symbols --- Symbolism --- Abbreviations --- Code names --- Writing --- Cryptanalysis --- Cryptology --- Secret writing --- Steganography --- Ciphers --- History --- Data encryption: data encryption standard; DES; public key cryptosystems --- Law and legislation --- 681.3*E3 Data encryption: data encryption standard; DES; public key cryptosystems
Choose an application
Java (Computer program language) --- Computer security --- 681.3*D32 --- 681.3*D3 --- 005.8 --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Electronic digital computers --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Object-oriented programming languages --- JavaSpaces technology --- language classifications: applicative languages; data-flow languages; design languages; extensible languages; macro and assembly languages; nonprocedural languages; specialized application and very high-level languages (Programminglanguages) --- Programming languages --- Security measures --- 681.3*D3 Programming languages --- 681.3*D32 language classifications: applicative languages; data-flow languages; design languages; extensible languages; macro and assembly languages; nonprocedural languages; specialized application and very high-level languages (Programminglanguages) --- Cyber security --- Cybersecurity --- Protection of computer systems --- Protection --- Computer security.
Choose an application
Computer security --- Data protection --- 681.3*C20 --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Electronic data processing --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Electronic digital computers --- Security of computer systems --- Security systems --- Hacking --- Management --- Computer-communication networks: general: data communications, opensystems interconnection reference model (OSI), security and protection (e.g., firewalls) --- Security measures --- Cyber security --- Cybersecurity --- Protection of computer systems --- Protection --- -Data protection --- -658.0558 --- 005.8 --- -Protection --- 6813*C20 --- Sécurité informatique --- Protection de l'information (Informatique) --- Handbooks, manuals, etc. --- Gestion --- Guides, manuels, etc.
Listing 1 - 10 of 20 | << page >> |
Sort by
|