Security in Computing
| Main Author: | Pfleeger, Charles P. |
|---|---|
| Format: | Book |
| Language: | English |
| Published: |
New Jersey :
Prentice Hall ,
c1997
|
| Edition: | Second Edition |
| Subjects: |
Similar Items
Computer security : 20 things every employee should know
by: Rothke, Ben
Published: (2005)
by: Rothke, Ben
Published: (2005)
Akta perlindungan data peribadi 2010 (Akta 709) & Personal Data protection act 2010 (Act 709) : (hingga 15hb Januari 2013)
Published: (2013)
Published: (2013)
Writing Information Security Policies
by: Barman, Scott
Published: (2002)
by: Barman, Scott
Published: (2002)
Information security : protecting the global enterprise
by: Pipkin, Donald L.
Published: (2000)
by: Pipkin, Donald L.
Published: (2000)
Data rescue
Published: (2006)
Published: (2006)
Personal data protection : cases and commentary with applied syari'ah principles
by: Pointon, Leo Desmond, et al.
Published: (2012)
by: Pointon, Leo Desmond, et al.
Published: (2012)
Computer security : principles and practices
by: Stailings, William
Published: (2012)
by: Stailings, William
Published: (2012)
Microsoft Windows security : essentials
by: Gibson,Darril
Published: (2011)
by: Gibson,Darril
Published: (2011)
Linux security
by: Vulpecula
Published: (2004)
by: Vulpecula
Published: (2004)
Tort Law : DIRECTIONS
by: BRENNAN, CAROL
by: BRENNAN, CAROL
Managing information security : a program for the electronic information age
by: Schweitzer, James A.
Published: (1982)
by: Schweitzer, James A.
Published: (1982)
Privacy, regulations, and cybersecurity : the essential business guide
by: Moschovitis, Christos J. P.
Published: (2021)
by: Moschovitis, Christos J. P.
Published: (2021)
Maximum security
Published: (2001)
Published: (2001)
Start-up secure : baking cybersecurity into your company from founding to exit
by: Castaldo, Chris
Published: (2021)
by: Castaldo, Chris
Published: (2021)
Secrets & lies : digital security in a networked world
by: Schneier, Bruce
Published: (2000)
by: Schneier, Bruce
Published: (2000)
Computers and information processing
by: Fuori, William M
Published: (1991)
by: Fuori, William M
Published: (1991)
Kursus Keselamatan Server 13-14 Mei 2025
Published: (2025)
Published: (2025)
Hacker V : pakar keselamatan rangkaian : Norton internet security
by: PC, Man
Published: (2003)
by: PC, Man
Published: (2003)
Network security : an introduction to techniques & standard
by: Kamaruzzaman Seman
Published: (2007)
by: Kamaruzzaman Seman
Published: (2007)
Fundamentals of computing II : Abstraction, data structures, and large software systems
by: Tucker, Allan B.
Published: (1995)
by: Tucker, Allan B.
Published: (1995)
It auditing : using control to protect information assets
by: Davis,Chris
Published: (2011)
by: Davis,Chris
Published: (2011)
Pengenalan kepada keselamatan komputer
by: Omar Zakaria
Published: (2002)
by: Omar Zakaria
Published: (2002)
Times computer dictionary : a guide to computer jargon
by: Wedge, Jon
Published: (1985)
by: Wedge, Jon
Published: (1985)
Information and Computer Science
by: Kimble, Gerald W.
Published: (1975)
by: Kimble, Gerald W.
Published: (1975)
Computer Concepts and Applications : with an lntroduction to Software and BASIC
by: O'Brien, James A.
Published: (1989)
by: O'Brien, James A.
Published: (1989)
Computers and Information Processing Today
by: Dunikoski, Robert H.
Published: (1989)
by: Dunikoski, Robert H.
Published: (1989)
Computer literacy through applications
by: Kurshan, Barbara L.
Published: (1986)
by: Kurshan, Barbara L.
Published: (1986)
Viruses Revealed
by: Harley, David
Published: (2001)
by: Harley, David
Published: (2001)
Computer information systems
by: Burstein, Jerome S
Published: (1989)
by: Burstein, Jerome S
Published: (1989)
Internet Security for Your Macintosh : a guide for the rest of US
by: Oppenheimer, Alan B.
Published: (2001)
by: Oppenheimer, Alan B.
Published: (2001)
Computers and Information Processing : The Complete Couse with BASIC
by: Mandell, Steven L.
Published: (1989)
by: Mandell, Steven L.
Published: (1989)
Computer programming
by: Blacklock P
Published: (1991)
by: Blacklock P
Published: (1991)
Internet in security
by: Hahn, Harley
Published: (2002)
by: Hahn, Harley
Published: (2002)
Understanding : Computer science for advanced level
by: Bradley, Ray
Published: (1999)
by: Bradley, Ray
Published: (1999)
Unjust order : Malaysia's internal secutity act
by: Fritz,Nicole
Published: (2003)
by: Fritz,Nicole
Published: (2003)
Komputer dan pemprosesan maklumat : Computers and information processing
by: Fuori, William M., et al.
Published: (1993)
by: Fuori, William M., et al.
Published: (1993)
Computers and computer languages
by: Silverman, Gordon
Published: (1988)
by: Silverman, Gordon
Published: (1988)
Using computers
by: Dologite, D. G.
Published: (1989)
by: Dologite, D. G.
Published: (1989)
Cyber security management : a governance, risk and compliance framework
by: Trim, Peter R.J, et al.
Published: (2014)
by: Trim, Peter R.J, et al.
Published: (2014)
Introduction to computers
by: Norton's, Peter
Published: (2003)
by: Norton's, Peter
Published: (2003)
Similar Items
-
Computer security : 20 things every employee should know
by: Rothke, Ben
Published: (2005) -
Akta perlindungan data peribadi 2010 (Akta 709) & Personal Data protection act 2010 (Act 709) : (hingga 15hb Januari 2013)
Published: (2013) -
Writing Information Security Policies
by: Barman, Scott
Published: (2002) -
Information security : protecting the global enterprise
by: Pipkin, Donald L.
Published: (2000) -
Data rescue
Published: (2006)