Refine your search
Availability
-
Authors
- Ahmad, David R. Mirza (1)
- Alder, Raven (1)
- Antonakos, James L. (1)
- Bahadur, Gary (1)
- Barken, Lee (1)
- Bates, Regis J. (2)
- Bellovin, Steven M. (1)
- Borgesen, Per (1)
- Boswell, Steven (1)
- Breithaupt, Jim (1)
- Brown, Stven A. (1)
- Burnett, Mark (1)
- Calvert, Ben (1)
- Chirillo, John (4)
- Kurtz, George (4)
- McClure, Stuart (5)
- Musaji, Yusufali F. (2)
- Poston, Howard E. (2)
- Scambray, Joel (6)
- Stallings, William (5)
- Show more
- Show less
-
Item types
-
Locations
-
Series
- Advances in Cyber Security (1)
- Advances in information security, privacy, and ethics (AISPE) book series (1)
- Charles River Media Internet series (1)
- Cisco Press networking technologies series (2)
- McGraw-Hill Forouzan networking series (1)
- Networking (1)
- Prentice Hall series in computer networking and distributed systems (2)
- Stealing series (1)
- The Auerbach best practices series (1)
- The basic (1)
- Voices that matter (1)
- Show more
- Show less
-
Topics
- ACCESS CONTROL (3)
- Business enterprises (7)
- CODING THEORY (2)
- COMPUTER HACKERS (2)
- COMPUTER NETWORKS (56)
- COMPUTER PROGRAMS (3)
- COMPUTER SECURITY (40)
- COMPUTERS (3)
- Cisco Systems, Inc (2)
- Computer networks (25)
- Computer security (21)
- DATA ENCRYPTION (COMPUTER SCIENCE) (4)
- DATA PROTECTION (6)
- ELECTRONIC COMMERCE (4)
- INTERNET (COMPUTER NETWORK) (4)
- SECURITY MEASURES (55)
- SECURITY MEASURES. (6)
- Security measures (27)
- WEB SITES (3)
- WORLD WIDE WEB (3)
- Show more
- Show less
-
Collections
- Books (75)
-
Holding libraries
-
Home libraries
-
Languages
- English (90)