Search Results - "Computer Access control"
Suggested Topics within your search.
Suggested Topics within your search.
- Computers 22
- access control 17
- Computer security 13
- Security measures 13
- Computer networks 11
- Access control 6
- Cryptography 2
- Data protection 2
- Database security 2
- Electronic data processing departments 2
- Penetration testing (Computer security) 2
- Authentication 1
- Computer 1
- Computer simulation 1
- Cryphotography 1
- Data encryption (Computer science) 1
- Data processing 1
- Data transmission systems 1
- Electronic data processing 1
- Evaluation 1
- False personation 1
- Identification 1
- Intrusion detection systems (Computer security) 1
- Local area networks (Computer networks) 1
- Monitoring 1
- Prevention 1
- Privacy right of 1
- Records 1
- Risk assessment 1
- Snort (Software) 1
-
1
-
2
Computer security a comprehensive controls checklist
Published 1987Subjects: “…Computers access control…”
Book -
3
Kali Linux cookbook effective penetration testing solutions
Published 2017Subjects: “…Computers access control.…”
Book -
4
-
5
Cryptography and security services mechanisms and applications
Published 2007Subjects: “…Computers access control…”
Book -
6
The basics of digital privacy simple tools to protect your personal your information and your identity online
Published 2014Subjects: “…Computers access control…”
Book -
7
Innovative solutions for access control management
Published 2016Subjects: “…Computers access control…”
Book -
8
-
9
-
10
Computer and communication security strategies for the 1990s
Published 1989Subjects: “…Computers access control…”
Book -
11
-
12
Building virtual pentesting labs for advanced penetration testing learn how to build complex virtual architectures that allow you to perform virtually any required testing methodol...
Published 2016Subjects: “…Computers access control…”
Book -
13
Metasploit bootcamp a fast-paced guide to enhance your pentesting skills
Published 2017Subjects: “…Computers access control.…”
Book -
14
Network security assessment know your network
Published 2017Subjects: “…Computers Access control Evaluation…”
Book -
15
-
16
Handbook of applied cryptography
Published 1997Subjects: “…Computers Access control Handbooks, manuals, etc…”
Book -
17
Identity and access management business performance through connected intelligence
Published 2013Subjects: “…Computers access control…”
Book -
18
Practical intrusion analysis prevention and detection for the twenty-first century
Published 2010Subjects: “…Computers access control…”
Book -
19
Managing security with Snort and IDS tools
Published 2004Subjects: “…Computers access control.…”
Book -
20
ENHANCING CENTRALISED CYBERSECURITY FOR CAMPUS NETWORK INFRASTRUCTURE USING LOG CONSOLIDATION PROCESSING FRAMEWORK BASED ON SIEM /
Published 2021Subjects: “…Computers Access control…”
Thesis Book


