-
1door Brancik, Kenneth COnderwerpen: “...Compuiter- access control Computer security Computer viruses Computer crimes...”
Gepubliceerd in 2008
Printed Book -
2door Hutt, Arthur, E.Onderwerpen: “...Computer security Compuiter- access control Computer security Computer viruses Computer crimes...”
Gepubliceerd in 1988
Printed Book -
3door Barua, YogeshOnderwerpen: “...Cyber crimes Internet crimes Compuiter- access control Computer security Computer viruses Computer...”
Gepubliceerd in 2001
Printed Book -
4door Barua, YogeshOnderwerpen: “...Cyber crimes Internet crimes Compuiter- access control Computer security Computer viruses Computer...”
Gepubliceerd in 2001
Printed Book -
5door Barua, YogeshOnderwerpen: “...Cyber crimes Internet crimes Compuiter- access control Computer security Computer viruses Computer...”
Gepubliceerd in 2001
Printed Book -
6door Arnold, MichaelOnderwerpen: “...Compuiter- access control Computer security Computer crimes Cryptography Network security Digital...”
Gepubliceerd in 2003
Printed Book -
7door Kaufman, CharlieOnderwerpen: “...Network security Compuiter- access control Computer security Computer viruses Computer crimes...”
Gepubliceerd in 2005
Printed Book -
8door McClure, StuartOnderwerpen: “...Web Hacking Compuiter- access control Computer security Computer viruses Computer crimes Computer...”
Gepubliceerd in 2007
Printed Book -
9door Chakrabarti, AnirbanOnderwerpen: “...Computational grids (Computer systems) Compuiter- access control Computer security Computer viruses...”
Gepubliceerd in 2007
Printed Book -
10door Tsai, Jeffrey J POnderwerpen: “...Cyberterrorism - Prevention machine learning Compuiter- access control Computer security Computer...”
Gepubliceerd in 2009
Printed Book -
11door Pfleeger, Charles P.Onderwerpen: “...Compuiter- access control Computer security Computer viruses Computer crimes Computers Network...”
Gepubliceerd in 2003
Printed Book -
12Gepubliceerd in 2005Onderwerpen: “...Compuiter- access control Computer science Computer viruses Computer crimes Computers Multimedia...”
Printed Book -
13door Mollin, Richard A.Onderwerpen: “...Data encryption- history Cryptography- history Compuiter- access control Computer security Computer...”
Gepubliceerd in 2005
Printed Book -
14door Gregory, Peter H.Onderwerpen: “...Security, internet Internet security Hacking - Internet Compuiter- access control Computer security...”
Gepubliceerd in 2000
Printed Book -
15door Ghosh, SumitOnderwerpen: “...Computer networks- security measures Compuiter- access control Computer security Computer viruses...”
Gepubliceerd in 2002
Printed Book -
16door Noonan, WesOnderwerpen: “...Compuiter- access control Computer security Computer viruses Computer crimes Computer science TCP...”
Gepubliceerd in 2006
Printed Book -
17door Bishop, MattOnderwerpen: “...Compuiter- access control Computer security Computer viruses Computer crimes Computers Network...”
Gepubliceerd in 2005
Printed Book -
18door Prosise, ChrisOnderwerpen: “...Computer crimes Computer security Computer crimes- Investigation Compuiter- access control Computer...”
Gepubliceerd in 2006
Printed Book -
19door Bidgoli, HosseinOnderwerpen: “...Compuiter- access control Computer security Computer viruses Computer crimes Computer science...”
Gepubliceerd in 2006
Printed Book -
20door Khadraoui, DjamelOnderwerpen: “...Business enterprises- Computer Security Information technology- Security Compuiter- access control...”
Gepubliceerd in 2007
Printed Book