Protection and security on the information superhighway
Enregistré dans:
| Auteur principal: | Cohen Frederick |
|---|---|
| Format: | Livre |
| Publié: |
New York :
Chichester : Wiley,
c1995.
|
| Sujets: | |
| Tags: |
Ajouter un tag
Pas de tags, Soyez le premier à ajouter un tag!
|
Documents similaires
Principles of information security
par: Whitman Michael E.
Publié: (2012)
par: Whitman Michael E.
Publié: (2012)
Computer security fundamentals /
par: Easttom, Chuck
Publié: (2012)
par: Easttom, Chuck
Publié: (2012)
Forensic -ICT
par: Kelmen,Danies
Publié: (2011)
par: Kelmen,Danies
Publié: (2011)
Computer security : concepts, issues and implementation
par: Basta Alfred
Publié: (2007)
par: Basta Alfred
Publié: (2007)
Information system security guidelines for the United Nations organizations /
Publié: (1992)
Publié: (1992)
Managing legal and security risks in computing and communications /
par: Shaw, Paul
Publié: (1998)
par: Shaw, Paul
Publié: (1998)
Computers, ethics & social values /
Publié: (1995)
Publié: (1995)
Information technology simplified /
par: Saleemi, N.A
Publié: (2000)
par: Saleemi, N.A
Publié: (2000)
Information & communication technology : legal issues /
Publié: (2010)
Publié: (2010)
Fighting computer crime : a new framework for protecting information /
par: Parker, Donn B.
Publié: (1998)
par: Parker, Donn B.
Publié: (1998)
Network security /
par: Pardoe, Terry D.
Publié: (2005)
par: Pardoe, Terry D.
Publié: (2005)
Information security : Inclident response and disaster recovery
par: Whiteman Michael E.
Publié: (2007)
par: Whiteman Michael E.
Publié: (2007)
Information Systems
par: Gallaugher, John
par: Gallaugher, John
Risky business : protect your business from being stalked, conned, or blackmailed on the Web /
par: Janal, Daniel S.
Publié: (1998)
par: Janal, Daniel S.
Publié: (1998)
Database systems : design, implementation, and management /
par: Rob, Peter
Publié: (2009)
par: Rob, Peter
Publié: (2009)
Database systems : design, implementation, and management /
par: Rob, Peter
Publié: (2008)
par: Rob, Peter
Publié: (2008)
Computer law
Publié: (2002)
Publié: (2002)
Softwre security: theory, programming and practice
par: Sinn Richard
Publié: (2008)
par: Sinn Richard
Publié: (2008)
The security-development nexus : expressions of sovereignty and securitization in Southern Africa /
Publié: (2007)
Publié: (2007)
Data communications & teleprocessing systems /
par: Housley, Trevor
Publié: (1987)
par: Housley, Trevor
Publié: (1987)
Data and computer communications
par: Stallings, William
Publié: (2007)
par: Stallings, William
Publié: (2007)
Data communications and computer networks
par: Singh, Brijendra
Publié: (2007)
par: Singh, Brijendra
Publié: (2007)
Universal food security issues for the south
Publié: (1997)
Publié: (1997)
Telecommunications : protocols and design /
par: Spragins, John D.
Publié: (1991)
par: Spragins, John D.
Publié: (1991)
Interconnections : bridges, routers, switches, and internetworking protocols /
par: Perlman, Radia
Publié: (2000)
par: Perlman, Radia
Publié: (2000)
Maritime security and the law of the sea /
par: Klein, Natalie
Publié: (2012)
par: Klein, Natalie
Publié: (2012)
How networks work /
par: Derfler, Frank J.
Publié: (2000)
par: Derfler, Frank J.
Publié: (2000)
Business data communications : basic concepts, security, and design /
par: FitzGerald, Jerry
Publié: (1990)
par: FitzGerald, Jerry
Publié: (1990)
Data communications and network security /
par: Carr, Houston H.
Publié: (2007)
par: Carr, Houston H.
Publié: (2007)
Internet and itranet engineering : technologies, protocol and applications
par: Minoli Daniel
Publié: (1997)
par: Minoli Daniel
Publié: (1997)
Information technology law /
par: Lloyd, Ian J.
Publié: (2017)
par: Lloyd, Ian J.
Publié: (2017)
Information technology law /
par: Lloyd, Ian J.
Publié: (2008)
par: Lloyd, Ian J.
Publié: (2008)
Documents similaires
-
Principles of information security
par: Whitman Michael E.
Publié: (2012) -
Computer security fundamentals /
par: Easttom, Chuck
Publié: (2012) -
Forensic -ICT
par: Kelmen,Danies
Publié: (2011) -
Computer security : concepts, issues and implementation
par: Basta Alfred
Publié: (2007) -
Information system security guidelines for the United Nations organizations /
Publié: (1992)