Refine your search
Availability
-
Authors
- Bosworth, Seymour
- Conklin, Wm. Arthur
- Cothren, Chuck
- Dageforde, Mary
- Dubrawsky, Ido
- Fung, Carol
- Furnell, Steven
- Gardner, Eric
- Ghosh, Sumit
- Jajodia, Sushil
- Kabay, M. E.
- Katsikas, Sokratis
- Masud, Mehedy
- McCanny, John V.
- Merkow, Mark
- Stallings, William
- White, Gregory B.
- Whyne, Eric
- Yee, George
- Zou, Xukai
- Show more
- Show less
-
Collections
-
Item types
-
Locations
-
Topics
- Computer architectur...
- Computer Hackers
- Computer networks - ...
- Computer networks - ...
- Computer networks --...
- Computer security
- Computer security --...
- Computer security --...
- computer security --...
- Computers -- Access ...
- Cryptography
- Data encryption (Com...
- Data encryptions (Co...
- Data Mining
- Data Protection
- Firewalls (Computer ...
- Information technolo...
- Intrusion detection
- Penetration testing ...
- Public key infrastru...
- Show more
- Show less