BooksSitemapComputersSecurityGeneral
Compendium of state privacy and security legislation, 1984 edition by Paul L. Woodard, Search Group, United States. Bureau of Justice Statistics - 1985 - 181 pages
Complete Guide to CISM Certification by Thomas R. Peltier, Justin Peltier - 2006 - 480 pages
Complexity Theory and Cryptology by Jörg Rothe, Jr̲g Rothe - 2005 - 478 pages
CompTIA Security+ Deluxe Study Guide by Emmett Dulaney - 2011 - 704 pages
CompTIA Security+ Deluxe Study Guide by Emmett Dulaney - 2008 - 704 pages
CompTIA Security+ Deluxe Study Guide by Emmett Dulaney - 2008 - 704 pages
CompTIA Security+Study Guide by Emmett Dulaney - 2010 - 600 pages
CompTIA Security+Study Guide by Emmett Dulaney - 2009 - 600 pages
Computer abuse by United States, Practising Law Institute - 1975 - 208 pages
Computer access control by Michael B. Wood - 1985 - 142 pages
Computer and communications security by James Arlin Cooper - 1989 - 411 pages
Computer And Intellectual Property Crime by Scott A. Hugh - 2006
Computer and internet fraud manual by Association of Certified Fraud Examiners, Inc - 2007 - 183 pages
Computer and Intrusion Forensics by George M. Mohay - 2003 - 395 pages
Computer and network security in higher education by Mark A. Luker, Rodney J. Petersen, EDUCAUSE (Association) - 2003 - 111 pages
Computer Architecture and Security by Shuangbao Paul Wang, Robert S. Ledley - 2012 - 344 pages
Computer Architecture and Security by Shuangbao Paul Wang, Robert S. Ledley - 2012 - 416 pages
Computer Capers by Thomas Whiteside - 1979 - 166 pages
Computer Capers by Thomas Whiteside - 1978 - 164 pages
Computer Control Guidelines by Canadian Institute of Chartered Accountants, Canadian Institute of Chartered Accountants. Study Group on Computer Control and Audit Guidelines. Computer control guidelines - 1986 - 197 pages
Computer control guidelines by Canadian Institute of Chartered Accountants. Study Group on Computer Control and Audit Guidelines - 1970 - 135 pages
Computer crime by New Jersey State Commission of Investigation, Leslie Z. Celentano, John J. Farmer, New Jersey. Dept. of Law and Public Safety, New Jersey. Office of the Attorney General - 2000 - 147 pages
Computer crime by Karen Judson - 1999 - 128 pages
Computer crime by David J. Icove, Karl A. Seger, William VonStorch - 1995 - 437 pages
Computer crime by Karen Judson - 1994 - 128 pages
Computer crime by Donn B. Parker, National Institute of Justice (U.S.). Office of Justice Programs, Abt Associates, SRI International - 1989 - 221 pages
Computer crime by Mary A. Vance - 1988 - 35 pages
Computer crime by United States. Congress. House. Committee on the Judiciary. Subcommittee on Civil and Constitutional Rights - 1984 - 80 pages
Computer crime by Kent W. Colton, United States. Bureau of Justice Statistics, Public Systems Evaluation, Inc - 1982 - 182 pages
Computer crime by United States. National Criminal Justice Information and Statistics Service, SRI International - 1979 - 17 pages
Computer crime by August Bequai - 1978 - 207 pages
Computer crime by August Bequai - 1978 - 207 pages
Computer crime by Gerald McKnight - 1973 - 221 pages
Computer crime and computer security by United States. Congress. House. Committee on the Judiciary. Subcommittee on Crime - 1986 - 230 pages
Computer crime and security by Library of Congress. Science and Technology Division. Reference Section - 1994 - 20 pages
Computer crime in Canada by Robert W. K. Davis, Scott C. Hutchison - 1997 - 313 pages
Computer Crime Investigation and Prosecution by Catherine H. Conly - 1991 - 124 pages
Computer crime law by Orin S. Kerr - 2006 - 755 pages
Computer crime law by Orin S. Kerr - 2006 - 755 pages
Computer crime, abuse, liability, and security by Reba A. Best, D. Cheryn Picquet - 1985 - 155 pages
Computer data authentication by United States. National Bureau of Standards - 1985 - 6 pages
Computer data security by Bureau of National Affairs (Washington, D.C.) - 1989
Computer data security by Harry Katzan - 1973 - 223 pages
Computer e sicurezza. Tutto quello che dovreste sapere by John Viega - 2009 - 261 pages
Computer evidence by Edward Wilding - 1996 - 236 pages
Computer Forensics by Andrea Ghirardini, Gabriele Faggioli - 2010 - 480 pages
Computer Forensics by Michael Sheetz - 2007 - 152 pages
Computer forensics and cyber crime by Marjie Britz - 2004 - 248 pages
Computer Forensics and Investigations by Bill Nelson, Amelia Phillips, Frank Enfinger, Chris Stewart - 2004 - 552 pages
Computer Forensics and Investigations by Bill Nelson, Amelia Phillips, Frank Enfinger, Chris Stewart - 2004 - 552 pages
Computer Forensics and Investigations by Bill Nelson, Amelia Phillips, Frank Enfinger, Chris Stewart - 2004 - 552 pages
Computer forensics and privacy by Michael A. Caloyannides - 2001 - 392 pages
Computer Forensics For Dummies by Linda Volonino, Reynaldo Anzaldua - 2008 - 388 pages
Computer Forensics For Dummies by Linda Volonino, Reynaldo Anzaldua - 2008 - 388 pages
Computer Forensics For Dummies by Linda Volonino, Reynaldo Anzaldua - 2008 - 388 pages
Computer Forensics For Dummies by Linda Volonino, Reynaldo Anzaldua - 2008 - 388 pages
Computer fraud and collusion in customer service & billing systems by Yanush Will - 1987 - 104 pages
Computer fraud and collusion in customer service & billing systems by Yanush Will - 1987 - 104 pages
Computer fraud and countermeasures by Leonard I. Krauss, Aileen MacGahan - 1979 - 509 pages
Computer fraud and information security by Joseph T. Wells, Association of Certified Fraud Examiners - 2002
Computer fraud legislation by United States. Congress. Senate. Committee on the Judiciary. Subcommittee on Criminal Law - 1986 - 66 pages
Computer fraud legislation by United States. Congress. Senate. Committee on the Judiciary. Subcommittee on Criminal Law - 1986 - 66 pages
Computer fuori legge? Uno sguardo ai reati informatici by Emanuele Florindi - 2006 - 60 pages
Computer generated check fraud by United States. Congress. House. Committee on Banking and Financial Services. Subcommittee on Domestic and International Monetary Policy - 1997 - 96 pages
Computer Generated Check Fraud - 1997 - 96 pages
Computer Generated Check Fraud - 1997 - 96 pages
Computer generated check fraud by United States. Congress. House. Committee on Banking and Financial Services. Subcommittee on Domestic and International Monetary Policy - 1997 - 96 pages
Computer generated check fraud by United States. Congress. House. Committee on Banking and Financial Services. Subcommittee on Domestic and International Monetary Policy - 1997 - 96 pages
Computer generated check fraud by United States. Congress. House. Committee on Banking and Financial Services. Subcommittee on Domestic and International Monetary Policy - 1997 - 96 pages
Computer generated check fraud by United States. Congress. House. Committee on Banking and Financial Services. Subcommittee on Domestic and International Monetary Policy - 1997 - 96 pages
Computer Incident Response Planning by N.K. McCarthy - 2012 - 528 pages
Computer insecurities at DOE headquarters by United States. Congress. House. Committee on Commerce. Subcommittee on Oversight and Investigations - 2000 - 53 pages
Computer insecurities at DOE headquarters by United States. Congress. House. Committee on Commerce. Subcommittee on Oversight and Investigations - 2000 - 53 pages
Computer insecurities at DOE headquarters by United States. Congress. House. Committee on Commerce. Subcommittee on Oversight and Investigations - 2000 - 53 pages
Computer Matching and Privacy Protection Act of 1986 by United States. Congress. Senate. Committee on Governmental Affairs. Subcommittee on Oversight of Government Management - 1986 - 364 pages
Computer Matching and Privacy Protection Act of 1987 by United States. Congress. House. Committee on Government Operations. Government Information, Justice, and Agriculture Subcommittee - 1987 - 143 pages
Computer Matching and Privacy Protection Act of 1987 by United States. Congress. House. Committee on Government Operations. Government Information, Justice, and Agriculture Subcommittee - 1987 - 143 pages
Computer Matching and Privacy Protection Act of 1987 by United States. Congress. House. Committee on Government Operations. Government Information, Justice, and Agriculture Subcommittee - 1987 - 143 pages
Computer Matching and Privacy Protection Amendments of 1990 by United States. Congress. House. Committee on Government Operations. Government Information, Justice, and Agriculture Subcommittee - 1991 - 88 pages
Computer misuse by Stefan Fafinski - 2009 - 328 pages
Computer Misuse by Stefan Fafinski - 2009 - 328 pages
Computer Pornograph [i.e. Pornography] and Child Exploitation Prevention Act by United States. Congress. Senate. Committee on the Judiciary. Subcommittee on Juvenile Justice - 1986 - 100 pages
Computer Pornograph [i.e. Pornography] and Child Exploitation Prevention Act by United States. Congress. Senate. Committee on the Judiciary. Subcommittee on Juvenile Justice - 1986 - 100 pages
Computer privacy and computer security by Willis H. Ware - 1974 - 5 pages
Computer Related Occupational Deviance by David Godschalk - 2007 - 260 pages
Computer Related Occupational Deviance by David Godschalk - 2007 - 260 pages
Computer Related Occupational Deviance by David Godschalk - 2007 - 260 pages
Computer Safety, Reliability and Security by Floor Koornneef, Meine van der Meulen - 2000
Computer security by Dieter Gollmann - 2006 - 374 pages
Computer security by Ben Rothke - 2005 - 48 pages
Computer Security by John S. Potts - 2002 - 132 pages
Computer security by United States. Congress. House. Committee on Government Reform. Subcommittee on Government Management, Information, and Technology - 2001 - 197 pages
Computer security by United States. Congress. House. Committee on Government Reform. Subcommittee on Government Management, Information, and Technology - 2001 - 197 pages
Computer Security by United States. Congress. House. Committee on Government Reform. Subcommittee on Government Management, Information, and Technology - 2001 - 197 pages
Computer security by United States. Congress. House. Committee on Government Reform. Subcommittee on Government Management, Information, and Technology - 2001 - 197 pages
Computer security by United States. General Accounting Office - 2000 - 15 pages
Computer Security by John Millar Carroll - 1996 - 648 pages
Computer security by E. Graham Dougall - 1993 - 417 pages
Computer security by United States. General Accounting Office, United States. Congress. House. Committee on Government Operations. Government Information, Justice, and Agriculture Subcommittee - 1992 - 38 pages
Computer security by United States. General Accounting Office - 1992 - 38 pages
Computer security by United States. General Accounting Office - 1992 - 11 pages
Computer security by Time-Life Books - 1990 - 128 pages
Computer security by United States. General Accounting Office - 1990 - 24 pages
Computer security by United States. General Accounting Office - 1989 - 24 pages
Computer security by United States. General Accounting Office, United States. Congress. House. Committee on Energy and Commerce. Subcommittee on Telecommunications and Finance - 1989 - 48 pages
Computer security by United States. General Accounting Office - 1988 - 35 pages
Computer security by United States. General Accounting Office - 1988 - 35 pages
Computer security by Charles Cresson Wood, Abel A. Garcia - 1987 - 214 pages
Computer security - 1986 - 128 pages
Computer security by United States. Veterans Administration. Office of Data Management and Telecommunications - 1986
Computer security by Jane B. Grimson, Hans-Jürgen Kugler, International Federation for Information Processing. Technical Committee 11--Security and Protection in Information Processing Systems - 1985 - 439 pages
Computer security by Library of Congress. Science and Technology Division. Reference Section - 1985 - 10 pages
Computer security by Peter Hamilton - 1973 - 122 pages
Computer security by Peter Hamilton - 1973 - 122 pages
Computer security by Peter Hamilton - 1973 - 122 pages
Computer security by Peter Hamilton - 1973 - 122 pages
Computer Security - ESORICS 2003 by Einar Snekkenes, Dieter Gollmann - 2003 - 343 pages
Computer Security - ESORICS 2004 by Pierangela Samarati - 2004 - 456 pages
Computer Security - ESORICS 2004 by Pierangela Samarati - 2004 - 456 pages
Computer Security - ESORICS 98 by Jean-Jacques Quisquater - 1998 - 375 pages
Computer Security Act of 1987 by United States. Congress. House. Committee on Science, Space, and Technology. Subcommittee on Technology and Competitiveness - 1992 - 15 pages
Computer Security Act of 1987 by United States. Congress. House. Committee on Government Operations. Legislation and National Security Subcommittee - 1987 - 710 pages
Computer Security Act of 1987 by United States. Congress. House. Committee on Government Operations. Legislation and National Security Subcommittee - 1987 - 710 pages
Computer Security Act of 1987 by United States. Congress. House. Committee on Science, Space, and Technology. Subcommittee on Science, Research, and Technology, United States. Congress. House. Committee on Science, Space, and Technology. Subcommittee on Transportation, Aviation, and Materials - 1987 - 214 pages
Computer Security and Cryptography by Alan G. Konheim - 2007 - 504 pages
Computer Security and Cryptography by Alan G. Konheim - 2007 - 504 pages
Computer Security and Cryptography by Alan G. Konheim - 2007 - 504 pages
Computer security and industrial cryptography by Bart Preneel, René Govaerts, Joos Vandewalle - 1993 - 274 pages
Computer security and information integrity - 1991 - 421 pages
Computer Security and Privacy Symposium by Honeywell Information Systems - 1976 - 80 pages
Computer security and protection structures by Bruce J. Walker, Ian F. Blake - 1977 - 142 pages
Computer security and protection structures by Bruce J. Walker, Ian F. Blake - 1977 - 142 pages
Computer security and the data encryption standard by United States Civil Service Commission, United States. National Bureau of Standards - 1978 - 125 pages
Computer security and the data encryption standard by United States. National Bureau of Standards, United States Civil Service Commission - 1978 - 125 pages
Computer Security Applications Conference by Applied Computer Security Associates, Association for Computing Machinery. Special Interest Group on Security, Audit, and Control - 1998 - 365 pages
Computer Security at the Drug Enforcement Administration by United States. Congress. House. Committee on Government Operations. Government Information, Justice, and Agriculture Subcommittee - 1993 - 85 pages
Computer security basics by Deborah Russell, G. T. Gangemi - 1991 - 448 pages
Computer security basics by Deborah Russell, G. T. Gangemi - 1991 - 448 pages
Computer Security Basics by DEBORAH AUTOR RUSSELL, G. T. Gangemi - 1991 - 448 pages
Computer security basics by Deborah Russell, G. T. Gangemi - 1991 - 448 pages
Computer Security Enhancement Act of 1997 by United States. Congress. Senate. Committee on Commerce, Science, and Transportation - 1998 - 12 pages
Computer Security Enhancement Act of 1997 by United States. Congress. House. Committee on Science - 1997 - 72 pages
Computer Security Enhancement Act of 2000 by United States. Congress. House. Committee on Science - 2000 - 88 pages
Computer security foundations by IEEE Computer Society. Technical Committee on Security and Privacy - 1999 - 239 pages
Computer security foundations by IEEE Computer Society - 1999 - 239 pages
Computer Security Foundations Workshop VII - 1994 - 201 pages
Computer security guidelines for implementing the Privacy act of 1974 by United States. National Bureau of Standards - 1975 - 20 pages
Computer Security Handbook - 2002 - 1224 pages
Computer security handbook by Richard H. Baker - 1991 - 416 pages
Computer security handbook by Rolf T. Moulton - 1986 - 246 pages
Computer security handbook by Rolf T. Moulton - 1986 - 246 pages
Computer security impact of Y2K by United States. Congress. House. Committee on Science. Subcommittee on Technology, United States. Congress. House. Committee on Government Reform. Subcommittee on Government Management, Information, and Technology - 2000 - 81 pages
Computer Security in the 21st Century by D. T. Lee, S. P. Shieh, J. D. Tygar - 2005 - 268 pages
Computer security in the age of information by William Caelli, International Federation for Information Processing - 1989 - 490 pages
Computer security in the federal government by United States. Congress. Senate. Committee on Commerce, Science, and Transportation. Subcommittee on Science, Technology, and Space - 2000 - 58 pages
Computer security in the federal government by United States. Congress. Senate. Committee on Commerce, Science, and Transportation. Subcommittee on Science, Technology, and Space - 2000 - 58 pages
Computer security management by Dennie Van Tassel - 1972 - 220 pages
Computer security management by Dennie Van Tassel - 1972 - 220 pages
Computer security management by Dennie Van Tassel - 1972 - 220 pages
Computer security reference book by Keith M. Jackson, Jan Hruska, Donn B. Parker - 1992 - 949 pages
Computer security report card by United States. Congress. House. Committee on Government Reform. Subcommittee on Government Management, Information, and Technology - 2001 - 225 pages
Computer security report card by United States. Congress. House. Committee on Government Reform. Subcommittee on Government Management, Information, and Technology - 2001 - 225 pages
Computer security report card by United States. Congress. House. Committee on Government Reform. Subcommittee on Government Management, Information, and Technology - 2001 - 225 pages
Computer Security Report Card by United States. Congress. House. Committee on Government Reform. Subcommittee on Government Management, Information, and Technology - 2001 - 225 pages
Computer security requirements by Computer Security Center (U.S.) - 1985 - 13 pages
Computer Security Research and Training Act of 1985 by United States. Congress. House. Committee on Government Operations. Legislation and National Security Subcommittee - 1986 - 123 pages
Computer security risk management by I. C. Palmer, G. A. Potter - 1989 - 317 pages
Computer security solutions by Jan Hruska, Keith M. Jackson - 1990 - 221 pages
Computer security subsystem interpretation of the trusted computer system evaluation criteria by National Computer Security Center (U.S.) - 1988 - 36 pages
Computer Security Subsystem Interpretation of the Trusted Computer System Evaluation Criteria by Michael W. Hale - 1988 - 36 pages
Computer Security, Dependability, and Assurance by Paul T. Ammann, Paul Ammann - 1999 - 213 pages
Computer security, ESORICS 92 by Yves Deswarte, Gérard Eizenberg, Jean-Jacques Quisquater - 1992 - 450 pages
Computer Security: 20 Things Every Employee Should Know by Ben Rothke - 2006
Computer Security: 20 Things Every Employee Should Know by Ben Rothke - 2005 - 48 pages
Computer System and Network Security by Gregory B. White, Gregory W. White, Eric A. Fisch, Udo W. Pooch - 1996 - 296 pages
Computer system security by Gildas Avoine, Pascal Junod, Philippe Oechslin - 2007 - 260 pages
Computer system security by Gildas Avoine, Pascal Junod, Philippe Oechslin - 2007 - 260 pages
Computer und Bürgerrechte by Bürgerinitiative Orwell 84 - 1980 - 75 pages
Computer Virus Survival Guide by David J. Stang - 1991 - 75 pages
Computer viruses by United States. Congress. House. Committee on Energy and Commerce. Subcommittee on Telecommunications and Finance - 1989 - 80 pages
Computer-related crime by South African Law Commission - 2001 - 69 pages
Computer-related crime by European Committee on Crime Problems, Council of Europe. Directorate of Legal Affairs - 1990 - 114 pages
Computer-related crime by Organisation for Economic Co-operation and Development - 1986 - 71 pages
Computer-related crime - 1986 - 71 pages
Computer-related crimes in Federal programs by United States. General Accounting Office - 1976 - 24 pages
Computer-security technology by James Arlin Cooper - 1984 - 166 pages
Computers by President's Council on Integrity and Efficiency (U.S.). Prevention Committee - 1986 - 39 pages
Computers by President's Council on Integrity and Efficiency (U.S.). Prevention Committee - 1986 - 39 pages
Computers + business by August Bequai - 1984 - 26 pages
Computers - Crimes, Clues and Controls - 1993 - 52 pages
Computers and personal privacy by Willis H. Ware - 1977 - 8 pages
Computers and privacy by Richard R. Tolman, Biological Sciences Curriculum Study - 1983 - 94 pages
Computers at Risk by National Research Council (U.S.). Computer Science and Telecommunications Board. System Security Study Committee - 1991 - 303 pages
Computers at risk by National Research Council (U.S.). Computer Science and Telecommunications Board. System Security Study Committee - 1991 - 303 pages
Computers e responsabilità civile by Guido Alpa - 1985 - 150 pages
Computers, business, and security by James A. Schweitzer - 1987 - 153 pages
Computers, ethics, and society by M. David Ermann, Mary B. Williams - 1990 - 376 pages
Computers, freedom & privacy by Jay Thorwaldson, Bruce Koball, Computer Professionals for Social Responsibility, Institute of Electrical and Electronics Engineers - 1991 - 230 pages
Computers, health records, and citizen rights by Alan F. Westin - 1976 - 381 pages
Computers, health records, and citizen rights by Alan F. Westin - 1976 - 381 pages
1 2 3 4 5 6 7 8 9 10 11