BOOKS - NETWORK TECHNOLOGIES - Computer and Information Security Handbook
Computer and Information Security Handbook - John Vacca 2013 PDF Morgan Kaufmann BOOKS NETWORK TECHNOLOGIES
ECO~26 kg CO²

2 TON

Views
98300

Telegram
 
Computer and Information Security Handbook
Author: John Vacca
Year: 2013
Format: PDF
File size: 67 MB
Language: ENG



Pay with Telegram STARS
''

You may also be interested in:

Principles of Computer Security, 4th Edition
Computer Security and Penetration Testing, Second Edition
Computer Security Art and Science Second Edition
Computer Science Security Concepts and Tools
The Chinese Computer: A Global History of the Information Age (Studies of the Weatherhead East Asian Institute, Columbia University)
CISSP (ISC)2 Certified Information Systems Security Professional Official Study Guide
(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide
Personal Information Security & Systems Architecture Techniques for PII Management in a Business
Sensor Network Methodologies for Smart Applications (Advances in Information Security, Privacy, and Ethics)
Complete Guide to Building An Information Security Program: Connecting Polices, Procedures, and IT Standards
Computer Security Principles and Practice 5th Edition
Guide to Computer Network Security 3rd Edition
Security, Privacy and Reliability in Computer Communications and Networks
Cryptography Algorithms, Protocols, and Standards for Computer Security
Computer Security Principles and Practice 5th Edition
Cryptography Algorithms, Protocols, and Standards for Computer Security
Computer Security Principles and Practice, Global Edition
Guide to Computer Network Security (6th Edition)
Cryptography: Algorithms, Protocols, and Standards for Computer Security
Guide to Computer Network Security (6th Edition)
The State Secrets Privilege and Other Limits on Classified Information (American Political, Economic, and Security Issues)
Hacking: Computer Hacking, Security Testing, Penetration Testing and Basic Security
Soldering and Brazing Handbook for Home Machinists Practical Information and Useful Exercises for the Small Shop
Cryptography, Information Theory, and Error-Correction A Handbook for the 21st Century, 2nd Edition
Computer Security Fundamentals, 5th Edition (Rough Cuts)
Modern Vulnerability Management: Predictive Cybersecurity (Computer Security)
Computer and Cyber Security Principles, Algorithm, Applications, and Perspectives
Computer Networking from LANs to WANs Hardware, Software and Security
ISC2 CISSP Certified Information Systems Security Professional Official Study Guide, 10th Edition
Preserving Privacy Against Side-Channel Leaks: From Data Publishing to Web Applications (Advances in Information Security, 68)
ISC2 CISSP Certified Information Systems Security Professional Official Practice Tests, 4th Edition
ISC2 CISSP Certified Information Systems Security Professional Official Study Guide, 10th Edition
ISC2 CISSP Certified Information Systems Security Professional Official Practice Tests, 4th Edition
(ISC) 2 CISSP Certified Information Systems Security Professional Official Study Guide, 8th Edition
Handbook of Research on AI Methods and Applications in Computer Engineering
Universal Access in Human-Computer Interaction. Design Methods and User Experience (Information Systems and Applications, incl. Internet Web, and HCI)
Information sources in psycholinguistics: An interdisciplinary bibliographical handbook (Janua Linguarum. Series Minor, 158)
Build Your Computer Security Skills (Unplugged Activities for Future Coders)
The Battle for Your Computer: Israel and the Growth of the Global Cyber-Security Industry
Homeland Security Technology Challenges: From Sensing and Encrypting to Mining and Modeling (Artech House Intelligence and Information Operations)