1. 201
    by Kyriazoglou, John
    Published 2013
    Subjects:
    Access E-Book
    Electronic eBook
  2. 202
  3. 203
  4. 204
    by Overly, Michael R.
    Published 1999
    Table of Contents: “…Attorney-Client Communications Using E-mail: Are They Protected? -- Ch. 10. Computer Security -- Ch. 11. Preventing Waste of Computer Resources -- pt. …”
    Access E-Book
    Electronic eBook
  5. 205
    by Broad, James
    Published 2014
    Subjects: “…Penetration testing (Computer security)…”
    Access E-Book
    Electronic eBook
  6. 206
    by Masud, Mehedy
    Published 2012
    Subjects:
    Access E-Book
    Electronic eBook
  7. 207
  8. 208
    Published 2014
    Subjects: “…Computer security.…”
    Access E-Book
    Electronic eBook
  9. 209
  10. 210
    Published 2014
    Subjects: “…Computer networks -- Security measures.…”
    Access E-Book
    Electronic eBook
  11. 211
  12. 212
    Published 2013
    Subjects: “…Computer networks -- Security measures.…”
    Access E-Book
    Electronic eBook
  13. 213
  14. 214
  15. 215
    by McPhee, Michael
    Published 2017
    Subjects: “…Penetration testing (Computer security)…”
    Access E-Book
    Electronic eBook
  16. 216
    by Sharma, Himanshu
    Published 2017
    Subjects: “…Penetration testing (Computer security)…”
    Access E-Book
    Electronic eBook
  17. 217
    by Bautista, Wilson
    Published 2018
    Subjects: “…Computer networks -- Security measures.…”
    Access E-Book
    Electronic eBook
  18. 218
    by Allsopp, Wil
    Published 2017
    Subjects: “…Penetration testing (Computer security)…”
    Access E-Book
    Electronic eBook
  19. 219
  20. 220
    by Raggad, Bel G.
    Published 2010
    Subjects: “…Computer security -- Management.…”
    Access E-Book
    Electronic eBook
  21. 221
    by Siron, Eric, Syrewicze, Andy
    Published 2014
    Subjects: “…Virtual computer systems -- Security measures.…”
    Access E-Book
    Electronic eBook
  22. 222
  23. 223
  24. 224
    by Clarke, Justin
    Published 2012
    Subjects: “…Computer security.…”
    Access E-Book
    Electronic eBook
  25. 225
    by Monte, Matthew
    Published 2015
    Subjects:
    Access E-Book
    Electronic eBook
  26. 226
    by Moeller, Robert R.
    Published 2010
    Subjects:
    Access E-Book
    Electronic eBook
  27. 227
    by Krausz, Michael
    Published 2009
    Subjects: “…Business enterprises -- Computer networks -- Security measures.…”
    Access E-Book
    Electronic eBook
  28. 228
    Published 2014
    Subjects: “…Computer networks -- Security measures.…”
    Access E-Book
    Electronic eBook
  29. 229
    by Huseby, Sverre H.
    Published 2004
    Subjects: “…Computer security.…”
    Access E-Book
    Electronic eBook
  30. 230
    Subjects: “…Computer networks -- Security measures.…”
    Access E-Book
    Electronic eBook
  31. 231
  32. 232
    by Axelrod, C. Warren
    Published 2004
    Subjects: “…Computer networks -- Security measures -- United States.…”
    Access E-Book
    Electronic eBook
  33. 233
    by Landau, Susan Eva
    Published 2010
    Subjects: “…Telecommunication -- Security measures -- United States.…”
    Access E-Book
    Electronic eBook
  34. 234
    by Mischel, Magnus
    Published 2009
    Subjects:
    Access E-Book
    Electronic eBook
  35. 235
  36. 236
    by Wyler, Neil R.
    Published 2005
    Subjects: “…Computer security.…”
    Access E-Book
    Electronic eBook
  37. 237
    by Merkow, Mark S.
    Published 2000
    Subjects:
    Access E-Book
    Electronic eBook
  38. 238
    by Long, Johnny
    Published 2005
    Subjects:
    Access E-Book
    Electronic eBook
  39. 239
    Published 2014
    Subjects: “…Computer security.…”
    Access E-Book
    Electronic eBook
  40. 240
    Published 2002
    Subjects: “…Computer security.…”
    Access E-Book
    Electronic eBook
  41. 241
    Published 2006
    Subjects:
    Access E-Book
    Electronic eBook
  42. 242
    by Kostopoulos, George K., 1939-
    Published 2013
    Subjects: “…Computer security.…”
    Access E-Book
    Electronic eBook
  43. 243
    by Dixit, V. S., Singh, V. B.
    Published 2013
    Subjects: “…Computer networks -- Textbooks.…”
    Access E-Book
    Electronic eBook
  44. 244
    by Speed, Tim
    Published 2013
    Subjects: “…Mobile computing -- Security measures.…”
    Access E-Book
    Electronic eBook
  45. 245
    by Carvey, Harlan A.
    Published 2007
    Subjects: “…Microsoft Windows (Computer file) -- Security measures.…”
    Access E-Book
    Electronic eBook
  46. 246
  47. 247
    by Shema, Mike
    Published 2012
    Subjects: “…Computer networks -- Security measures.…”
    Access E-Book
    Electronic eBook
  48. 248
  49. 249
    by Cardwell, Kevin
    Published 2016
    Subjects:
    Access E-Book
    Electronic eBook
  50. 250
    by Thuraisingham, Bhavani M.
    Published 2011
    Subjects:
    Access E-Book
    Electronic eBook
  51. 251
    by Wilhelm, Thomas
    Published 2013
    Subjects: “…Computer networks -- Security measures.…”
    Access E-Book
    Electronic eBook
  52. 252
    Published 2006
    Subjects: “…Client/server computing -- Security measures.…”
    Access E-Book
    Electronic eBook
  53. 253
    Published 2015
    Subjects: “…Computer security.…”
    Access E-Book
    Electronic eBook
  54. 254
    by Todd, Chad
    Published 2001
    Subjects:
    Access E-Book
    Electronic eBook
  55. 255
  56. 256
  57. 257
  58. 258
    by Calder, Alan
    Published 2017
    Subjects: “…Computer security -- Management.…”
    Access E-Book
    Electronic eBook
  59. 259
    by Bingley, Richard
    Published 2015
    Subjects:
    Access E-Book
    Electronic eBook
  60. 260
    Published 2002
    Subjects: “…Computer security.…”
    Access E-Book
    Electronic eBook
  61. 261
    by Tevault, Donald
    Published 2018
    Subjects: “…Computer security -- Standards.…”
    Access E-Book
    Electronic eBook
  62. 262
  63. 263
    Published 2005
    Subjects:
    Access E-Book
    Electronic eBook
  64. 264
    Published 2002
    Subjects:
    Access E-Book
    Electronic eBook
  65. 265
    by Gilchrist, Alasdair
    Published 2017
    Subjects:
    Access E-Book
    Electronic eBook
  66. 266
  67. 267
    by Liotine, Matthew
    Published 2003
    Subjects:
    Access E-Book
    Electronic eBook
  68. 268
    Published 2006
    Subjects: “…Computer security.…”
    Access E-Book
    Electronic eBook
  69. 269
  70. 270
    by Couretas, Jerry M., 1966-
    Published 2019
    Table of Contents: “…Brief review of cyber incidents -- Cyber security : an introduction to assessment and maturity frameworks -- Introduction to cyber modeling and simulation (M&S) -- Technical and operational scenarios -- Cyber standards for M&S -- Cyber course of action (COA) strategies -- Cyber computer assisted exercise (CAX) and situational awareness (SA) via cyber M&S -- Cyber model based evaluation background -- Cyber M&S & system risk analysis -- Cyber modeling & simulation for test and evaluation (T&E) -- Developing model based cyber M&S frameworks -- Appendix : cyber M&S supporting data, tools & techniques.…”
    Access E-Book
    Electronic eBook
  71. 271
  72. 272
  73. 273
  74. 274
  75. 275
    by Calder, Alan
    Published 2016
    Subjects: “…Computer security.…”
    Access E-Book
    Electronic eBook
  76. 276
    by Jagielski, Piotr
    Published 2013
    Subjects: “…Computer networks -- Security measures.…”
    Access E-Book
    Electronic eBook
  77. 277
    by Field, Alan
    Published 2017
    Subjects:
    Access E-Book
    Electronic eBook
  78. 278
    by Ben-Natan, Ron
    Published 2005
    Subjects: “…Computer security.…”
    Access E-Book
    Electronic eBook
  79. 279
    by Konheim, Alan G., 1934-
    Published 1981
    Subjects:
    Book
  80. 280
  81. 281
    by Ryabko, Boris
    Published 2005
    Subjects: “…Computer security.…”
    Access E-Book
    Electronic eBook
  82. 282
    by Grimes, Roger A.
    Published 2017
    Subjects: “…Computer security.…”
    Access E-Book
    Electronic eBook
  83. 283
    by Liu, Alex X.
    Published 2011
    Subjects: “…Firewalls (Computer security)…”
    Access E-Book
    Electronic eBook
  84. 284
    by Fair, Ted
    Published 2005
    Subjects: “…Computer security.…”
    Access E-Book
    Electronic eBook
  85. 285
    by Oppliger, Rolf
    Published 2005
    Subjects:
    Access E-Book
    Electronic eBook
  86. 286
    by Goncalves, Marcus
    Published 2000
    Subjects: “…Firewalls (Computer security)…”
    Access E-Book
    Electronic eBook
  87. 287
    by Goncalves, Marcus
    Published 1998
    Subjects: “…Firewalls (Computer security)…”
    Access E-Book
    Electronic eBook
  88. 288
    by Chapman, D. Brent
    Published 1995
    Subjects: “…Firewalls (Computer security)…”
    Access E-Book
    Electronic eBook
  89. 289
    Published 2006
    Subjects: “…Computer security.…”
    Access E-Book
    Electronic eBook
  90. 290
    by Slade, Robert
    Published 2006
    Subjects: “…Computer security -- Dictionaries.…”
    Access E-Book
    Electronic eBook
  91. 291
    Published 2003
    Subjects: “…Computer networks -- Security measures.…”
    Access E-Book
    Electronic eBook
  92. 292
  93. 293
    by Winch, Robert
    Published 2012
    Subjects: “…Computer security.…”
    Access E-Book
    Electronic eBook
  94. 294
    Published 2014
    Subjects: “…Computer networks -- Security measures.…”
    Access E-Book
    Electronic eBook
  95. 295
  96. 296
  97. 297
    by Dalziel, Henry
    Published 2015
    Subjects:
    Access E-Book
    Electronic eBook
  98. 298
    by Porche, Isaac, 1968-
    Published 2011
    Subjects: “…Computer security -- United States.…”
    Access E-Book
    Electronic eBook
  99. 299
    by Oppliger, Rolf
    Published 2009
    Subjects:
    Access E-Book
    Electronic eBook
  100. 300
    by Watkins, Steve G.
    Published 2013
    Subjects: “…Computer security.…”
    Access E-Book
    Electronic eBook