Suggested Topics within your search.
Suggested Topics within your search.
Security measures
Computer networks
231
Computer security
96
Data protection
29
Computer crimes
25
Internet
23
Prevention
17
Access control
16
Business enterprises
16
Information technology
14
Cyberterrorism
13
Computers
10
Cloud computing
9
Data encryption (Computer science)
9
Management
9
Cryptography
7
Investigation
7
Cyberspace
6
Data processing
6
Electronic commerce
6
Information warfare
6
National security
6
Telecommunication
6
Computer network protocols
5
Internet (Computer network)
5
Privacy, Right of
5
Web sites
5
Wireless communication systems
5
Coding theory
4
Computer hackers
4
-
1Subjects: '; “...Computer networks....”
Book -
2
-
3
-
4
-
5by Liu, Lei, 1968-Subjects: '; “...Computer networks Security measures....”
Published 2011
Get full text
eBook -
6Published 2006Subjects: '; “...Computer networks Security measures Congresses....”
Get full text
eBook -
7Published 2007Subjects: '; “...Computer networks Security measures Congresses....”
Get full text
eBook -
8Published 2006Subjects: '; “...Computer networks Security measures Congresses....”
Get full text
eBook -
9
-
10Edition: Sixth edition.Subjects: '; “...Computer networks Security measures....”
Get full text
eBook -
11by Kostopoulos, George K., 1939-Subjects: '; “...Computer networks Security measures....”
Published 2013
Book -
12by Kizza, Joseph Migga
Published 2015Edition: Third edition.Subjects: '; “...Computer networks Security measures....”
Book -
13Published 2014Edition: Second edition.Subjects: '; “...Computer networks Security measures....”
Book -
14by Stallings, William
Published 2017Edition: Sixth edition.Subjects: '; “...Computer networks Security measures....”
Book -
15by Jacobs, StuartSubjects: '; “...Computer networks Security measures....”
Published 2014
Get full text
eBook -
16
-
17
-
18by Fung, K. T. (Kwok T.)
Published 2005Edition: 2nd ed.Subjects: '; “...Computer networks Security measures...”
Book -
19
-
20by Conway, Richard, 1974-Subjects: '; “...Computer networks Security measures...”
Published 2004
Book