BOOKS - PROGRAMMING - Information Security and Computer book
Information Security and Computer book - Ricky Barnes 2018 AZW3 Amazon Digital Services LLC BOOKS PROGRAMMING
ECO~35 kg CO²

3 TON

Views
98855

Telegram
 
Information Security and Computer book
Author: Ricky Barnes
Year: 2018
Pages: 1362
Format: AZW3
File size: 12.0 MB
Language: ENG



Pay with Telegram STARS
''

You may also be interested in:

Principles of Computer Security, 4th Edition
Computer Security and Penetration Testing, Second Edition
Computer Science Security Concepts and Tools
Computer Security Handbook, 6th Edition
Computer Security Handbook, 4th Edition
The Chinese Computer: A Global History of the Information Age (Studies of the Weatherhead East Asian Institute, Columbia University)
CISSP (ISC)2 Certified Information Systems Security Professional Official Study Guide
Personal Information Security & Systems Architecture Techniques for PII Management in a Business
(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide
Sensor Network Methodologies for Smart Applications (Advances in Information Security, Privacy, and Ethics)
Complete Guide to Building An Information Security Program: Connecting Polices, Procedures, and IT Standards
Introduction to Computers: A complete book on Computer for all Levels and all Competitive exams and College Freshers: A detailed guide to Computer Applications
Cryptography: Algorithms, Protocols, and Standards for Computer Security
Guide to Computer Network Security (6th Edition)
Cryptography Algorithms, Protocols, and Standards for Computer Security
Computer Security Principles and Practice, Global Edition
Computer Security Principles and Practice 5th Edition
Guide to Computer Network Security 3rd Edition
Security, Privacy and Reliability in Computer Communications and Networks
Computer Security Principles and Practice 5th Edition
Cryptography Algorithms, Protocols, and Standards for Computer Security
Guide to Computer Network Security (6th Edition)
The State Secrets Privilege and Other Limits on Classified Information (American Political, Economic, and Security Issues)
Logic Reference Book for Computer Scientists The 2nd Revised, Modified, and Enlarged Edition of “Logics for Computer and Data Sciences, and Artificial Intelligence”
Logic Reference Book for Computer Scientists The 2nd Revised, Modified, and Enlarged Edition of “Logics for Computer and Data Sciences, and Artificial Intelligence”
Hacking: Computer Hacking, Security Testing, Penetration Testing and Basic Security
Computer Security Fundamentals, 5th Edition (Rough Cuts)
Modern Vulnerability Management: Predictive Cybersecurity (Computer Security)
Computer Networking from LANs to WANs Hardware, Software and Security
Computer and Cyber Security Principles, Algorithm, Applications, and Perspectives
ISC2 CISSP Certified Information Systems Security Professional Official Practice Tests, 4th Edition
ISC2 CISSP Certified Information Systems Security Professional Official Practice Tests, 4th Edition
(ISC) 2 CISSP Certified Information Systems Security Professional Official Study Guide, 8th Edition
ISC2 CISSP Certified Information Systems Security Professional Official Study Guide, 10th Edition
ISC2 CISSP Certified Information Systems Security Professional Official Study Guide, 10th Edition
Preserving Privacy Against Side-Channel Leaks: From Data Publishing to Web Applications (Advances in Information Security, 68)
Disaster Management and Information Technology: Professional Response and Recovery Management in the Age of Disasters (Public Administration and Information Technology Book 40)
Universal Access in Human-Computer Interaction. Design Methods and User Experience (Information Systems and Applications, incl. Internet Web, and HCI)
Build Your Computer Security Skills (Unplugged Activities for Future Coders)
The Battle for Your Computer: Israel and the Growth of the Global Cyber-Security Industry