Handbook of research on information security and assurance
"This book offers comprehensive explanations of topics in computer system security in order to combat the growing risk associated with technology"--Provided by publisher
Saved in:
| Other Authors: | Gupta, Sharma |
|---|---|
| Format: | Book |
| Published: |
Hershey, PA
Information Science Reference
c2009
|
| Subjects: | |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
Handbook of research on Web information systems quality
Published: (2008)
Published: (2008)
The computer incident response planning handbook executable plans for protecting information at risk
by: McCarthy, N.K
Published: (2012)
by: McCarthy, N.K
Published: (2012)
Handbook of applied cryptography
by: Menezes, A. J. (Alfred J.) 1965-, et al.
Published: (1997)
by: Menezes, A. J. (Alfred J.) 1965-, et al.
Published: (1997)
Networking the complete reference
by: ZackerlhCraig
by: ZackerlhCraig
Cyber warfare techniques, tactics and tools for security practitioners
by: Andrees, Jason, et al.
Published: (2014)
by: Andrees, Jason, et al.
Published: (2014)
Handbook of research on wireless multimedia quality of service and solutions /
Published: (2009)
Published: (2009)
Information security management handbook
Published: (2007)
Published: (2007)
Information security management handbook
Published: (2007)
Published: (2007)
Information security management handbooks
by: lh
by: lh
Information security management handbook
Published: (2012)
Published: (2012)
Network administrator's reference
by: Parnell
Published: (1999)
by: Parnell
Published: (1999)
The web application hacker's handbook finding and exploiting security flaws
by: Stuttard, Dafydd 1972-, et al.
Published: (2011)
by: Stuttard, Dafydd 1972-, et al.
Published: (2011)
Cyber security basics protect your organization by applying the fundamentals
by: Franke, Don
Published: (2016)
by: Franke, Don
Published: (2016)
Handbook of research on web log analysis
Published: (2009)
Published: (2009)
Handbook of crime prevention and community safety
Published: (2017)
Published: (2017)
Information Security Management Handbook
Published: (2012)
Published: (2012)
VoIP handbook applications, technologies, reliability, and security
Published: (2009)
Published: (2009)
Handbook of measurements benchmarks for systems accuracy and precision
Published: (2016)
Published: (2016)
Managing information services An integrated approach
by: Bryson, Jo
Published: (1997)
by: Bryson, Jo
Published: (1997)
Instrument engineers' handbook process control and optimization : volume II
Published: (2006)
Published: (2006)
Malware forensics field guide for Linux systems digital forensics field guides
by: Malin, Cameron H
Published: (2014)
by: Malin, Cameron H
Published: (2014)
IP multimedia subsystem (IMS) handbook
Published: (2009)
Published: (2009)
IS management handbook
Published: (2003)
Published: (2003)
The Cabling Handbook
by: Vacca,John
Published: (1999)
by: Vacca,John
Published: (1999)
The handbook to literary research
Published: (2010)
Published: (2010)
Brady's guide to navigating yhe internet
by: StulllhAndrew T.
by: StulllhAndrew T.
Handbook of temperature measurement the theory and practice of thermoelectrics thermometry
Published: (1998)
Published: (1998)
Handbook of research on information and cyber security in the fourth industrial revolution
Published: (2018)
Published: (2018)
Handbook of research on end-to-end cloud computing architecture design
Published: (2017)
Published: (2017)
Handbook of alternative fuel technologies
by: Lee
Published: (2007)
by: Lee
Published: (2007)
1001 of the best internet sites for educators
by: Treadwell
Published: (1999)
by: Treadwell
Published: (1999)
The undergraduate research handbook
by: Wisker, Gina
Published: (2019)
by: Wisker, Gina
Published: (2019)
Similar Items
-
Handbook of research on Web information systems quality
Published: (2008) -
The computer incident response planning handbook executable plans for protecting information at risk
by: McCarthy, N.K
Published: (2012) -
Handbook of applied cryptography
by: Menezes, A. J. (Alfred J.) 1965-, et al.
Published: (1997) -
Networking the complete reference
by: ZackerlhCraig -
Cyber warfare techniques, tactics and tools for security practitioners
by: Andrees, Jason, et al.
Published: (2014)


