Listing 1 - 10 of 29 | << page >> |
Sort by
|
Choose an application
Computer. Automation --- Computers --- Electronic data processing departments --- Informatique, Centres d' --- Access control --- Security measures --- Sûreté --- Mesures --- Computer securities --- Computer systems --- Computers - Access control. --- Electronic data processing departments - Security measures. --- Electronic data processing departments - Security measures
Choose an application
Choose an application
Computer security --- Computerbeveiliging --- Computers--Beveiliging --- Informatique--Sécurité --- Sécurité informatique --- Computer security. --- Electronic data processing departments --- Security measures. --- Computer systems --- Security measures --- Electronic data processing departments - Security measures.
Choose an application
Choose an application
Elektronische informatieverwerkingsafdelingen. Zekerheidsmaatregelen. --- Computermisdaden. --- Information (Traitement automatique de l') (Départements de). Mesures de sécudité. --- Ordinateurs électroniques. Contrôle d'accès. --- Crimes par ordinateur. --- Electronic data processing departments - Security measures. --- Computers - Access control. --- Computer crimes. --- Elektronische ordinatoren. Toegangscontrole.
Choose an application
Computer architecture. Operating systems --- Electronic data processing departments --- Security measures --- 681.3*K6M --- -Computer centers --- Management of computing and information systems: economics --- -Management of computing and information systems: economics --- 681.3*K6M Management of computing and information systems: economics --- -681.3*K6M Management of computing and information systems: economics --- Computer centers --- Computer department security measures --- Data protection --- Electronic data processing departments - Security measures
Choose an application
Computer architecture. Operating systems --- Computer security --- Computers --- Electronic data processing departments --- Computer networks --- Access control --- Security measures --- Computer security. --- Security measures. --- Access control. --- Computers - Access control --- Electronic data processing departments - Security measures --- Computer networks - Security measures --- Réseaux d'ordinateurs --- Mesures de sûreté.
Choose an application
Online data processing --- Electronic data processing departments --- Security measures --- -Online data processing --- 681.3.02 --- In-line data processing --- On-line data processing --- Electronic data processing --- Teleprocessing monitors (Computer programs) --- Time-sharing computer systems --- Computer centers --- Computerwetenschap--?.02 --- Online data processing. --- Security measures. --- Computer department security measures --- Data protection --- Electronic data processing departments - Security measures
Choose an application
Computer crimes --- Electronic data processing departments --- Security measures --- -Electronic data processing departments --- -681.3*K42 --- Computer centers --- Computers and crime --- Cyber crimes --- Cybercrimes --- Electronic crimes (Computer crimes) --- Internet crimes --- Crime --- Privacy, Right of --- Computerwetenschap--?*K42 --- 681.3*K42 --- Computer department security measures --- Data protection --- Computer crimes - United States --- Electronic data processing departments - Security measures
Choose an application
Individuals wishing to attack a company's network have found a new path of least resistance-the end user. A client- side attack is one that uses the inexperience of the end user to create a foothold in the user's machine and therefore the network. Client-side attacks are everywhere and hidden in plain sight. Common hiding places are malicious Web sites and spam. A simple click of a link will allow the attacker to enter. This book presents a framework for defending your network against these attacks in an environment where it might seem impossible. The most current attacks are discuss
Computer networks -- Security measures. --- Computer security. --- Electronic data processing departments -- Security measures. --- Computer networks --- Electrical & Computer Engineering --- Engineering & Applied Sciences --- Telecommunications --- Access control --- Security measures --- Hacktivism. --- Security measures. --- Information Technology --- General and Others --- Activism, Hacker --- Hacker activism --- Computer crimes --- Hacking --- Internet --- Computer network security --- Network security, Computer --- Security of computer networks --- Computer security --- Political aspects --- Social aspects
Listing 1 - 10 of 29 | << page >> |
Sort by
|