Explore: Computer Data Security
Discover books, insights, and more — all in one place.
Learn more about Computer Data Security with top reads curated from trusted sources — all in one place.
AI-Generated Overview About “computer-data-security”:
Books Results
Source: The Open Library
The Open Library Search Results
Search results from The Open Library
1Computer Security Basics
By Deborah Russell, Sr. G.T Gangemi and Rick Lehtinen

“Computer Security Basics” Metadata:
- Title: Computer Security Basics
- Authors: Deborah RussellSr. G.T GangemiRick Lehtinen
- Language: English
- Number of Pages: Median: 448
- Publisher: ➤ O'Reilly & Associates - O'Reilly Media, Incorporated - O'Reilly - O'Reilly Media, Inc.
- Publish Date: 1991 - 1992 - 2006
- Publish Location: ➤ Sebastopol, Calif - Sebastopol, CA - Cambridge, MA
“Computer Security Basics” Subjects and Themes:
- Subjects: ➤ Computer security - Data security & data encryption - Privacy & data protection - Computers - Computer Data Security - Computers - Computer Security - Computer Books: General - Security - General - Computers / Computer Security - Computers / Security - Electronic data processing departments, security measures - Computer Security - Sécurité informatique - COMPUTERS - Security - General - Computadores (software) - Computer networks - Security measures - Viruses - Com053000 - Cs.cmp_sc.app_sw - Cs.cmp_sc.secur
Edition Identifiers:
- The Open Library ID: ➤ OL36799042M - OL17157910M - OL17455894M - OL36706430M - OL1237444M - OL24961154M - OL36717671M - OL8414532M - OL7581091M
- Online Computer Library Center (OCLC) ID: 44958507 - 71665969 - 664376113
- Library of Congress Control Number (LCCN): 94241137 - 93118560 - 2006287147
- All ISBNs: ➤ 9781449317423 - 9781449317058 - 9781306813495 - 1449317057 - 1306813492 - 0596006691 - 0937175714 - 9780596006693 - 9780937175712 - 1449317421
Access and General Info:
- First Year Published: 1991
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Borrowable
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
- Borrowing from Open Library: Borrowing link
- Borrowing from Archive.org: Borrowing link
Online Marketplaces
Find Computer Security Basics at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
2Hacking exposed
By Stuart McClure, Joel Scambray and George Kurtz

“Hacking exposed” Metadata:
- Title: Hacking exposed
- Authors: Stuart McClureJoel ScambrayGeorge Kurtz
- Language: English
- Number of Pages: Median: 484
- Publisher: Computing Mcgraw-Hill
- Publish Date: 1999
“Hacking exposed” Subjects and Themes:
- Subjects: ➤ Computer security - Computer networks - Hacking - Computerbeveiliging - Security measures - Data protection - Computer fraud & hacking - Data security & data encryption - Network security - Reference works - Security measures - Computer security - Computer Data Security - Computers - Computers - Communications / Networking - Security - General - Computer Books And Software - Security - Networking - General - Computer Bks - Communications / Networking - Computer networks - Security measures
Edition Identifiers:
- The Open Library ID: OL7302141M - OL9256818M
- All ISBNs: 0072121270 - 9780072121278
Access and General Info:
- First Year Published: 1999
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Borrowable
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
- Borrowing from Open Library: Borrowing link
- Borrowing from Archive.org: Borrowing link
Online Marketplaces
Find Hacking exposed at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
3Windows Internet security
By Seth Fogie and Cyrus Peikari

“Windows Internet security” Metadata:
- Title: Windows Internet security
- Authors: Seth FogieCyrus Peikari
- Language: English
- Number of Pages: Median: 400
- Publisher: Prentice Hall PTR
- Publish Date: 2001
“Windows Internet security” Subjects and Themes:
- Subjects: ➤ Sicherheit - Computer security - Internet - Security systems - Computer networks - Microsoft Windows (Computer file) - Windows 2000 - Security measures - Data security & data encryption - Internet - Network security - Microsoft Windows (Computer fi - Computers - Computer Data Security - Microcomputer Operating Environments - Operating Systems - Windows 2000 - Computers - Operating Systems - Textbooks - Computer Books: General - Internet - Security - Operating Systems - Windows - Computers / Security - Security - General - Security measures - Computer networks - Computer security - Windows (computer programs) - Internet, security measures
Edition Identifiers:
- The Open Library ID: OL7331776M - OL9286424M
- Library of Congress Control Number (LCCN): 2001059146
- All ISBNs: 0130428310 - 9780130428318
Access and General Info:
- First Year Published: 2001
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Borrowable
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
- Borrowing from Open Library: Borrowing link
- Borrowing from Archive.org: Borrowing link
Online Marketplaces
Find Windows Internet security at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
4Maximum wireless security
By Cyrus Peikari and Seth Fogie

“Maximum wireless security” Metadata:
- Title: Maximum wireless security
- Authors: Cyrus PeikariSeth Fogie
- Language: English
- Number of Pages: Median: 399
- Publisher: Pearson Education - Sams
- Publish Date: 2002 - 2003 - 2005
- Publish Location: ➤ [Great Britain] - Upper Saddle River - Indianapolis, Ind
“Maximum wireless security” Subjects and Themes:
- Subjects: ➤ Computer Technology - Nonfiction - Security measures - Wireless LANs - Data security & data encryption - Network security - Data Transmission Systems - General - Computer Data Security - Data Transmission Standards And Protocols - Computers - Computers - Computer Security - Computer Books: General - Security - General - Networking - General - Computers / Data Transmission Systems / General - Networking - Network Protocols - Wireless communication systems - Computer security
Edition Identifiers:
- The Open Library ID: OL7668524M - OL22039678M - OL24260021M
- Library of Congress Control Number (LCCN): 2002115240
- All ISBNs: 0768663261 - 9780672324888 - 9780768663266 - 0672324881
Access and General Info:
- First Year Published: 2002
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Borrowable
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
- Borrowing from Open Library: Borrowing link
- Borrowing from Archive.org: Borrowing link
Online Marketplaces
Find Maximum wireless security at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
5Mapping security
By Tom Patterson and Scott Gleeson Blue

“Mapping security” Metadata:
- Title: Mapping security
- Authors: Tom PattersonScott Gleeson Blue
- Language: English
- Number of Pages: Median: 419
- Publisher: ➤ Addison-Wesley Professional - Addison-Wesley
- Publish Date: 2004 - 2005
- Publish Location: London - Boston
“Mapping security” Subjects and Themes:
- Subjects: ➤ Data security & data encryption - Network security - Computer Data Security - International Business Administration - Computers - Computers - Computer Security - Computer Books: General - Security - General - Computers / Internet / Security - International - General - Computer networks - Electronic commerce - International business enterprises - Internet - Security measures - Computer security - Corporate planning
Edition Identifiers:
- The Open Library ID: OL9554400M - OL22156643M
- Online Computer Library Center (OCLC) ID: 57550889
- Library of Congress Control Number (LCCN): 2004113324
- All ISBNs: 0321304527 - 9780321304520
Access and General Info:
- First Year Published: 2004
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Borrowable
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
- Borrowing from Open Library: Borrowing link
- Borrowing from Archive.org: Borrowing link
Online Marketplaces
Find Mapping security at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
6Hunting Security Bugs
By Tom; Jeffries, Bryan; Landauer, Lawrence Gallagher, Tom Gallagher, Lawrence Landauer and Bryan Jeffries

“Hunting Security Bugs” Metadata:
- Title: Hunting Security Bugs
- Authors: ➤ Tom; Jeffries, Bryan; Landauer, Lawrence GallagherTom GallagherLawrence LandauerBryan Jeffries
- Language: English
- Number of Pages: Median: 592
- Publisher: Microsoft Press
- Publish Date: 2006
- Publish Location: Redmond
“Hunting Security Bugs” Subjects and Themes:
- Subjects: ➤ Computer Technology - Nonfiction - Computer networks - Testing - Security measures - Computer security - Computer software - Data security & data encryption - General - Computer Data Security - Computers - Computers - General Information - Computer Books: Internet General - Internet - Security - Computers / General - Security - General - Computersicherheit - Softwareentwicklung - Testen
Edition Identifiers:
- The Open Library ID: OL24302146M - OL7891194M
- Online Computer Library Center (OCLC) ID: 85789106
- Library of Congress Control Number (LCCN): 2006927197
- All ISBNs: 073562187X - 9780735621879
Access and General Info:
- First Year Published: 2006
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Borrowable
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
- Borrowing from Open Library: Borrowing link
- Borrowing from Archive.org: Borrowing link
Online Marketplaces
Find Hunting Security Bugs at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
7The security development lifecycle
By Michael Howard, Michael Howard and Steve Lipner

“The security development lifecycle” Metadata:
- Title: ➤ The security development lifecycle
- Authors: Michael HowardMichael HowardSteve Lipner
- Language: English
- Number of Pages: Median: 336
- Publisher: Microsoft Press
- Publish Date: 2006
- Publish Location: Redmond, Wash
“The security development lifecycle” Subjects and Themes:
- Subjects: ➤ Computer software - Development - Reliability - Computer security - Data security & data encryption - Network security - Computers - Computer Data Security - Computers - Computer Security - Computer Books: General - Security - General - Computers / General
Edition Identifiers:
- The Open Library ID: OL17205823M - OL7891206M
- Online Computer Library Center (OCLC) ID: 73814382
- Library of Congress Control Number (LCCN): 2006924466
- All ISBNs: 0735622140 - 9780735622142
First Setence:
"The adage "Necessity is the mother of invention" sums up the birth of the Security Development Lifecycle (SDL) at Microsoft."
Access and General Info:
- First Year Published: 2006
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Borrowable
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
- Borrowing from Open Library: Borrowing link
- Borrowing from Archive.org: Borrowing link
Online Marketplaces
Find The security development lifecycle at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
8The backup book
By Dorian J. Cougias, Dorian Cougias, E. L. Heiberger and Karsten Koop

“The backup book” Metadata:
- Title: The backup book
- Authors: Dorian J. CougiasDorian CougiasE. L. HeibergerKarsten Koop
- Language: English
- Number of Pages: Median: 740
- Publisher: ➤ Schaser-Vartan Books - SV Books
- Publish Date: 2003
- Publish Location: Lecanto, FL
“The backup book” Subjects and Themes:
- Subjects: ➤ Data recovery (Computer science) - Backup processing alternatives - Electronic data processing - Data security & data encryption - Databases & data structures - Information technology industries - Computer security - Computer Data Security - Computers - Computers - Computer Security - Disaster Recovery - Computer Books: General - Security - General - Computers / Data Recovery
Edition Identifiers:
- The Open Library ID: OL8579747M - OL22141518M
- Library of Congress Control Number (LCCN): 2001274299
- All ISBNs: 9780972903905 - 0972903909
First Setence:
"Let's break down the above sentence into its constituent parts."
Access and General Info:
- First Year Published: 2003
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Borrowable
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
- Borrowing from Open Library: Borrowing link
- Borrowing from Archive.org: Borrowing link
Online Marketplaces
Find The backup book at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
9IPSec
By Naganand Doraswamy and Dan Harkins

“IPSec” Metadata:
- Title: IPSec
- Authors: Naganand DoraswamyDan Harkins
- Language: English
- Number of Pages: Median: 216
- Publisher: Prentice Hall PTR
- Publish Date: 1999
“IPSec” Subjects and Themes:
- Subjects: ➤ Extranets (Computer networks) - Intranets (Computer networks) - Internet - Computer networks - Security measures - IPSec (Computer network protocol) - Data security & data encryption - Network security - Security - IPSec (Computer network protocol) - Computer Data Security - Security measures - Computers - Computer - Internet - Networking - General - Computer Books: General - Intranets (Computer networks) - Internet - Internet - Security - Security - General - Computer Bks - Internet - Internet, security measures - Intranets (computer networks) - Computer security - Extranets (computer networks)
Edition Identifiers:
- The Open Library ID: OL9284526M - OL7329878M
- Library of Congress Control Number (LCCN): 99023833
- All ISBNs: 0130118982 - 9780130118981
Access and General Info:
- First Year Published: 1999
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Borrowable
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
- Borrowing from Open Library: Borrowing link
- Borrowing from Archive.org: Borrowing link
Online Marketplaces
Find IPSec at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
10Developing trust
By Matt Curtin and Peter G. Neumann

“Developing trust” Metadata:
- Title: Developing trust
- Authors: Matt CurtinPeter G. Neumann
- Language: English
- Number of Pages: Median: 293
- Publisher: ➤ Apress - Distributed to the book trade in the United States by Springer-Verlag New York
- Publish Date: 2001 - 2002
- Publish Location: New York, NY - Berkeley, CA
“Developing trust” Subjects and Themes:
- Subjects: ➤ Computer networks - Computer security - Right of Privacy - Security measures - Databases & data structures - Network security - Security - General - Computer Data Security - Computers - Computer - Internet - Computer Books: Database - Networking - General - Internet - Security - Internet, security measures - Computer Security - Réseaux d'ordinateurs - Sécurité - Mesures - Sécurité informatique - Computersicherheit - Internet
Edition Identifiers:
- The Open Library ID: OL22466534M - OL8720765M
- Online Computer Library Center (OCLC) ID: 48916376
- All ISBNs: 9781893115729 - 1893115720
Access and General Info:
- First Year Published: 2001
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Borrowable
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
- Borrowing from Open Library: Borrowing link
- Borrowing from Archive.org: Borrowing link
Online Marketplaces
Find Developing trust at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
11TICSA TruSecure ICSA certified security associate
By Mike Chapple, Debra Littlejohn Shinder and Shawn Porter

“TICSA TruSecure ICSA certified security associate” Metadata:
- Title: ➤ TICSA TruSecure ICSA certified security associate
- Authors: Mike ChappleDebra Littlejohn ShinderShawn Porter
- Language: English
- Number of Pages: Median: 558
- Publisher: Pearson Education - Que
- Publish Date: 2002 - 2003 - 2005
- Publish Location: ➤ Upper Saddle River - [Indianapolis, Ind.]
“TICSA TruSecure ICSA certified security associate” Subjects and Themes:
- Subjects: ➤ Certification - Computer Technology - Computer security - Electronic data processing personnel - Examinations - Nonfiction - Study guides - Data security & data encryption - Network security - Social & Legal Aspects of Computing - Computer Data Security - Computers - Computers - Computer Security - Computer Books: General - Electronic data processing per - Certification Guides - General - Security - General - Tests - Computers / Technical Skills - Computer science
Edition Identifiers:
- The Open Library ID: OL8157549M - OL24246985M - OL3571407M
- Online Computer Library Center (OCLC) ID: 50766859
- Library of Congress Control Number (LCCN): 2002091627
- All ISBNs: 9780789727831 - 9780768661026 - 0768661021 - 0789727838
Author's Alternative Names:
"Debra LittleJohn Shinder"Access and General Info:
- First Year Published: 2002
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Borrowable
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
- Borrowing from Open Library: Borrowing link
- Borrowing from Archive.org: Borrowing link
Online Marketplaces
Find TICSA TruSecure ICSA certified security associate at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
12Internet site security
By Erik S. Schetina, Erik Schetina, Ken Green and Jacob Carlson

“Internet site security” Metadata:
- Title: Internet site security
- Authors: Erik S. SchetinaErik SchetinaKen GreenJacob Carlson
- Language: English
- Number of Pages: Median: 425
- Publisher: ➤ Pearson Education - Addison-Wesley
- Publish Date: 2002
- Publish Location: Boston, Mass - London
“Internet site security” Subjects and Themes:
- Subjects: ➤ Access control - Internet - Security measures - Computer Communications & Networking - Data security & data encryption - Computer Data Security - Computers - Computer - Internet - Computer Books: General - Internet - Security - Networking - General - Security - Computers / Security - Internet - General - Security - General - Computer Networks - Web sites - Internet, security measures - Computer networks
Edition Identifiers:
- The Open Library ID: OL22103532M - OL11078880M
- Library of Congress Control Number (LCCN): 2001094222
- All ISBNs: 0672323060 - 9780672323065
Access and General Info:
- First Year Published: 2002
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Borrowable
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
- Borrowing from Open Library: Borrowing link
- Borrowing from Archive.org: Borrowing link
Online Marketplaces
Find Internet site security at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
13Voice and data security
By David Dicenso, Dwayne Williams, Travis Good, Kevin Archer, Gregory White, Chuck Cothren and Roger Davis

“Voice and data security” Metadata:
- Title: Voice and data security
- Authors: ➤ David DicensoDwayne WilliamsTravis GoodKevin ArcherGregory WhiteChuck CothrenRoger Davis
- Language: English
- Number of Pages: Median: 494
- Publisher: SAMS - Sams
- Publish Date: 2001
- Publish Location: Indianapolis, Ind
“Voice and data security” Subjects and Themes:
- Subjects: ➤ Computer networks - Computer security - Security measures - Telephone systems - Data security & data encryption - Network security - Telecommunications - Data Processing - Speech & Audio Processing - Telephone Engineering - Computer Data Security - Security - Computers - Computers - Communications / Networking - Computers - Computer Security - Computer Books: General - Networking - General - Security - General - Data protection
Edition Identifiers:
- The Open Library ID: OL24223133M - OL7668339M
- Online Computer Library Center (OCLC) ID: 46944809
- Library of Congress Control Number (LCCN): 01067595 - 2001087595
- All ISBNs: 9780672321504 - 0672321505
Access and General Info:
- First Year Published: 2001
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Borrowable
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
- Borrowing from Open Library: Borrowing link
- Borrowing from Archive.org: Borrowing link
Online Marketplaces
Find Voice and data security at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
14Implementing security for ATM networks
By Thomas D. Tarman and Edward L. Witzke

“Implementing security for ATM networks” Metadata:
- Title: ➤ Implementing security for ATM networks
- Authors: Thomas D. TarmanEdward L. Witzke
- Language: English
- Number of Pages: Median: 306
- Publisher: ➤ Artech House Publishers - Artech House
- Publish Date: 2001 - 2002
- Publish Location: Boston
“Implementing security for ATM networks” Subjects and Themes:
- Subjects: ➤ Asynchronous transfer mode - Computer networks - Security measures - Network security - Networking - General - Computers - Computer Data Security - Integrated Services Digital Networks (Isdn) - Computers - Computer Security - Computer Books: Database - Data Transmission Systems - General - Security - General - Computer Bks - Communications / Networking - Data Transmission Systems - Broadband - ATM - Netzwerk - Sicherheit
Edition Identifiers:
- The Open Library ID: OL18481571M - OL8780180M
- Library of Congress Control Number (LCCN): 2001053535
- All ISBNs: 1580532934 - 9781580532938
First Setence:
"A general discussion of network security is in order before describing security approaches and mechanisms specific to asynchronous transfer mode(ATM) networks."
Access and General Info:
- First Year Published: 2001
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Borrowable
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
- Borrowing from Open Library: Borrowing link
- Borrowing from Archive.org: Borrowing link
Online Marketplaces
Find Implementing security for ATM networks at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
15Cisco Networking Academy Program
By Cisco Systems, Inc, Cisco Systems Inc. and Cisco Networking Academy Program

“Cisco Networking Academy Program” Metadata:
- Title: ➤ Cisco Networking Academy Program
- Authors: ➤ Cisco Systems, IncCisco Systems Inc.Cisco Networking Academy Program
- Language: English
- Number of Pages: Median: 851
- Publisher: Cisco Press
- Publish Date: 2003 - 2004
- Publish Location: Indianapolis, Ind
“Cisco Networking Academy Program” Subjects and Themes:
- Subjects: ➤ Textbooks - Computer networks - Problems, exercises - Security measures - Network security - Networking - General - Computer Data Security - Microcomputer Networks - Computers - Computers - Computer Security - Computer Books And Software - Security - General - Computers / Networking / General - Computer security
Edition Identifiers:
- The Open Library ID: OL8822329M - OL3698958M
- Online Computer Library Center (OCLC) ID: 53068115
- Library of Congress Control Number (LCCN): 2003114381
- All ISBNs: 9781587131226 - 1587131226
Access and General Info:
- First Year Published: 2003
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Borrowable
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
- Borrowing from Open Library: Borrowing link
- Borrowing from Archive.org: Borrowing link
Online Marketplaces
Find Cisco Networking Academy Program at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
16Microsoft Windows security for Windows XP and Windows 2000
By Ed Bott and Carl Siechert

“Microsoft Windows security for Windows XP and Windows 2000” Metadata:
- Title: ➤ Microsoft Windows security for Windows XP and Windows 2000
- Authors: Ed BottCarl Siechert
- Language: English
- Number of Pages: Median: 782
- Publisher: Microsoft - Microsoft Press
- Publish Date: 2002 - 2003
- Publish Location: Redmond, Wash
“Microsoft Windows security for Windows XP and Windows 2000” Subjects and Themes:
- Subjects: ➤ Microsoft Windows (Computer file) - Computer security - Microsoft Windows - Operating Systems - Windows 2000 - Computers - Operating Systems - Computer Data Security - Microcomputer Operating Environments - Security - Computers - Computers - Computer Security - Operating Systems - Windows - Computer Books And Software - Microsoft Windows (Computer fi - Operating Systems - Windows XP - Security - General - Computers / General - COMPUTERS - General - Computersicherheit - Datensicherung - Rechnernetz - Windows 2000 - Windows XP
Edition Identifiers:
- The Open Library ID: OL7890961M - OL22858157M
- Library of Congress Control Number (LCCN): 2002067794
- All ISBNs: 9780735616325 - 0735616329
Access and General Info:
- First Year Published: 2002
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Borrowable
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
- Borrowing from Open Library: Borrowing link
- Borrowing from Archive.org: Borrowing link
Online Marketplaces
Find Microsoft Windows security for Windows XP and Windows 2000 at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
17Microsoft Windows XP networking and security inside out
By Ed Bott and Carl Siechert

“Microsoft Windows XP networking and security inside out” Metadata:
- Title: ➤ Microsoft Windows XP networking and security inside out
- Authors: Ed BottCarl Siechert
- Language: English
- Number of Pages: Median: 847
- Publisher: Microsoft Press
- Publish Date: 2005 - 2006
- Publish Location: Redmond, WA
“Microsoft Windows XP networking and security inside out” Subjects and Themes:
- Subjects: ➤ Microsoft Windows (Computer file) - Operating systems (Computers) - Computer security - Microsoft Windows - Security - Computers - Operating Systems - Computer Data Security - Microcomputer Operating Environments - Security measures - Computers - Operating Systems - Windows XP - Computer Books: Operating Systems - Operating Systems - Windows - Networking - General - Security - General - Computers / General - Computer networks
Edition Identifiers:
- The Open Library ID: OL7891143M - OL24000119M
- Online Computer Library Center (OCLC) ID: 73814398
- Library of Congress Control Number (LCCN): 2005920808
- All ISBNs: 9780735620421 - 0735620423
First Setence:
"Setting up a computer network is easy, even for an amateur."
Access and General Info:
- First Year Published: 2005
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Borrowable
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
- Borrowing from Open Library: Borrowing link
- Borrowing from Archive.org: Borrowing link
Online Marketplaces
Find Microsoft Windows XP networking and security inside out at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
18MCSE Self-Paced Training Kit (Exam 70-298): Designing Security for a Microsoft Windows Server(TM) 2003 Network (Training Kit)
By Roberta Bragg

“MCSE Self-Paced Training Kit (Exam 70-298): Designing Security for a Microsoft Windows Server(TM) 2003 Network (Training Kit)” Metadata:
- Title: ➤ MCSE Self-Paced Training Kit (Exam 70-298): Designing Security for a Microsoft Windows Server(TM) 2003 Network (Training Kit)
- Author: Roberta Bragg
- Language: English
- Number of Pages: Median: 700
- Publisher: Microsoft Press
- Publish Date: 2004
“MCSE Self-Paced Training Kit (Exam 70-298): Designing Security for a Microsoft Windows Server(TM) 2003 Network (Training Kit)” Subjects and Themes:
- Subjects: ➤ Microsoft Windows server - Computer networks - Security measures - Operating Systems - Windows - Computers - Computers - Certification - Networking - Security - Certification Guides - Msce - Home Computing - Computers / General - Computer Bks - General Information - Security - General - Certification Guides - General - Data security & data encryption - Microsoft Windows - Computer Data Security - Microcomputer Operating Environments - Computer Books And Software
Edition Identifiers:
- The Open Library ID: OL7891117M
- Library of Congress Control Number (LCCN): 2003065183
- All ISBNs: 9780735619692 - 0735619697
First Setence:
"Creating the conceptual design for network infrastructure security by gathering and analyzing business and technical requirements."
Access and General Info:
- First Year Published: 2004
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Borrowable
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
- Borrowing from Open Library: Borrowing link
- Borrowing from Archive.org: Borrowing link
Online Marketplaces
Find MCSE Self-Paced Training Kit (Exam 70-298): Designing Security for a Microsoft Windows Server(TM) 2003 Network (Training Kit) at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
19Deploying virtual private networks with Microsoft Windows Server 2003
By Joseph Davies

“Deploying virtual private networks with Microsoft Windows Server 2003” Metadata:
- Title: ➤ Deploying virtual private networks with Microsoft Windows Server 2003
- Author: Joseph Davies
- Language: English
- Number of Pages: Median: 453
- Publisher: Microsoft Press
- Publish Date: 2003
“Deploying virtual private networks with Microsoft Windows Server 2003” Subjects and Themes:
- Subjects: ➤ Microsoft Windows server - Extranets (Computer networks) - Operating Systems - Windows - Computers - Communications / Networking - Networking - General - Hardware - Personal Computers - General - Client-Server Computing - Windows - Computers / General - Computer Books And Software - Security - General - Data security & data encryption - Network security - Computer Data Security - Microcomputer Application Software - Computers
Edition Identifiers:
- The Open Library ID: OL7890947M
- Library of Congress Control Number (LCCN): 2003042174
- All ISBNs: 9780735615762 - 0735615764
First Setence:
"Welcome to Deploying Virtual Private Networks with Microsoft Windows Server 2003, your complete source for the information you need to design and deploy Virtual Private Networks (VPNs) using Windows Server 2003 and all of the Windows Client operating systems."
Access and General Info:
- First Year Published: 2003
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Borrowable
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
- Borrowing from Open Library: Borrowing link
- Borrowing from Archive.org: Borrowing link
Online Marketplaces
Find Deploying virtual private networks with Microsoft Windows Server 2003 at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
20CISSP for dummies
By Lawrence H. Miller, Peter H. Gregory, Lawrence Miller, Lawrence C. Miller, Peter H., CISA, CISSP Gregory and Peter Gregory

“CISSP for dummies” Metadata:
- Title: CISSP for dummies
- Authors: ➤ Lawrence H. MillerPeter H. GregoryLawrence MillerLawrence C. MillerPeter H., CISA, CISSP GregoryPeter Gregory
- Language: English
- Number of Pages: Median: 560
- Publisher: ➤ John Wiley & Sons - For Dummies - Wiley & Sons Canada, Limited, John - Wiley & Sons, Limited, John - Wiley Pub. - Wiley & Sons, Incorporated, John - Wiley
- Publish Date: ➤ 2002 - 2007 - 2009 - 2012 - 2016 - 2018 - 2022 - 2024
- Publish Location: ➤ Indianapolis, IN - Hoboken, N.J - New York, NY
“CISSP for dummies” Subjects and Themes:
- Subjects: ➤ Study guides - Examinations - Computer security - Computer networks - Electronic data processing personnel, certification - Electronic data processing personnel - Certification - Data security & data encryption - Privacy & data protection - Computers - Computer Data Security - Data Transmission Standards And Protocols - Networking - Network Protocols - Computers - Certification - Electronic data processing per - Computer Books: General - Data processing - Certification Guides - General - Security - General - Computers / Technical Skills - Professional - General - Computer security equipment industry
Edition Identifiers:
- The Open Library ID: ➤ OL50651092M - OL21423310M - OL33843065M - OL39856686M - OL29122315M - OL39989294M - OL29373864M - OL50622253M - OL34532997M - OL39860036M - OL50634638M - OL21422329M - OL29373868M - OL23112555M - OL33855384M - OL31105833M - OL29013224M - OL48648732M - OL39990733M - OL33855408M - OL20753399M - OL34532996M - OL42989393M - OL7596349M - OL29122311M - OL8041858M
- Online Computer Library Center (OCLC) ID: 852428668 - 496966518 - 50843987
- Library of Congress Control Number (LCCN): 2012942107 - 2006939502 - 2002110297
- All ISBNs: ➤ 0764516701 - 9781119806899 - 9780470124260 - 9781118362396 - 0470599464 - 1282134531 - 9781118467558 - 1119210259 - 1119506093 - 1119506107 - 1394261780 - 0470124261 - 9781394261772 - 9780470599907 - 9781394261796 - 9780470599914 - 9781118417102 - 9781282134539 - 9780764516702 - 9781119505815 - 9781118463963 - 0470599901 - 9781119210252 - 1118417100 - 1394261799 - 9781119210245 - 9781394261789 - 111836239X - 1118420373 - 1394261772 - 111846396X - 047059991X - 1119210240 - 9781119506102 - 1119806909 - 1119806895 - 9781119506096 - 9781118420379 - 1118467558 - 111950581X - 9780470599464 - 9781119806905 - 9781119806820 - 1119806828
First Setence:
"Some say that the Certified Information System Security Professional (CISSP) candidate requires a breadth of knowledge 50 miles across and 2 inches deep."
Access and General Info:
- First Year Published: 2002
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find CISSP for dummies at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
21Guide to computer forensics and investigations
By Bill Nelson, Amelia Phillips, Frank Enfinger and Christopher Steuart

“Guide to computer forensics and investigations” Metadata:
- Title: ➤ Guide to computer forensics and investigations
- Authors: Bill NelsonAmelia PhillipsFrank EnfingerChristopher Steuart
- Language: English
- Number of Pages: Median: 693
- Publisher: ➤ Thomson Course Technology - Course Technology - Cengage Learning
- Publish Date: 2007 - 2008 - 2011 - 2015
- Publish Location: Boston, Mass
“Guide to computer forensics and investigations” Subjects and Themes:
- Subjects: ➤ Computer crimes - Investigation - Computer security - Data security & data encryption - Forensic Science - Computer Crime - Computer Data Security - Computers - Computers - Computer Security - Computer Books: General - Security - General - Computers / Security - Criminal investigation - Forensic sciences - Electronic evidence - Mobile device forensics - Informaticarecht - Criminalistiek - Computerbeveiliging - Law and legislation - Computer programs - Criminalité informatique - Enquêtes - Sécurité informatique - Logiciels - Preuve électronique - Computers & the internet - Networking
Edition Identifiers:
- The Open Library ID: OL28438254M - OL8465902M - OL28526723M - OL21894744M - OL20637523M
- Online Computer Library Center (OCLC) ID: 903192941 - 903667103
- Library of Congress Control Number (LCCN): 2008297931 - 2014958600
- All ISBNs: ➤ 1285060032 - 9781285060033 - 9781418067335 - 9781435498853 - 1418067334 - 1435498852
Access and General Info:
- First Year Published: 2007
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Guide to computer forensics and investigations at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
22Mastering network security
By Chris Brenton and Cameron Hunt

“Mastering network security” Metadata:
- Title: Mastering network security
- Authors: Chris BrentonCameron Hunt
- Language: English
- Number of Pages: Median: 672
- Publisher: ➤ SYBEX - John Wiley & Sons, Ltd. - Sybex - Network - Wiley & Sons, Incorporated, John
- Publish Date: 1998 - 2002 - 2003 - 2006
- Publish Location: ➤ New York - London - San Francisco, Calif
“Mastering network security” Subjects and Themes:
- Subjects: ➤ Computer Technology - Computer networks - Computer security - Data protection - Nonfiction - Security measures - Networking - COMPUTERS - General - Internet - Security - Data security & data encryption - Network security - Computers - Computer Security - Computer Data Security - Microcomputer Networks - Computer Books: General - Security - General - Networking - General - Computers / Security - Computer networks, security measures
Edition Identifiers:
- The Open Library ID: OL24265867M - OL39884225M - OL8096564M - OL398234M - OL22445777M
- Online Computer Library Center (OCLC) ID: 745061767 - 40647147
- Library of Congress Control Number (LCCN): 98087201 - 2002108077
- All ISBNs: ➤ 0782151485 - 0782141420 - 9781280650055 - 9780782151480 - 9780782141429 - 0782123430 - 9780782123432 - 1280650052
First Setence:
"WE ALL PROBABLY HAVE an idea about what the word system means."
Access and General Info:
- First Year Published: 1998
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Mastering network security at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
23The shellcoder's handbook
By Jack Koziol, David Litchfield, Dave Aitel, Chris Anley, Sinan "noir" Eren, Neel Mehta and Riley Hassell

“The shellcoder's handbook” Metadata:
- Title: The shellcoder's handbook
- Authors: ➤ Jack KoziolDavid LitchfieldDave AitelChris AnleySinan "noir" ErenNeel MehtaRiley Hassell
- Language: English
- Number of Pages: Median: 698
- Publisher: ➤ Wiley & Sons, Incorporated, John - Wiley Pub. - Wiley
- Publish Date: 2004 - 2007 - 2011
- Publish Location: Indianapolis, IN
“The shellcoder's handbook” Subjects and Themes:
- Subjects: ➤ Computer security - Data protection - Risk assessment - Network security - Computers - Computer Security - Computer Bks - General Information - Computer Data Security - Computers - Computer Books And Software - Computer Books: General - Security - General - Computers / Security
Edition Identifiers:
- The Open Library ID: OL39894690M - OL29074249M - OL29074231M - OL8042591M - OL15551212M
- Online Computer Library Center (OCLC) ID: 53993005 - 699852680
- Library of Congress Control Number (LCCN): 2003027629
- All ISBNs: ➤ 9780764544682 - 9781118080450 - 9781118079126 - 0764544683 - 1280935472 - 9781280935473 - 1118079124 - 1118080459
First Setence:
"In order to understand the content of this book, you need a well-developed understanding of computer languages, operating systems, and architectures."
Access and General Info:
- First Year Published: 2004
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find The shellcoder's handbook at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
24Disseminating security updates at Internet scale
By Jun Li, Jun Li, Peter Reiher and Gerald J. Popek

“Disseminating security updates at Internet scale” Metadata:
- Title: ➤ Disseminating security updates at Internet scale
- Authors: Jun LiJun LiPeter ReiherGerald J. Popek
- Language: English
- Number of Pages: Median: 174
- Publisher: ➤ Kluwer Academic Publishers - Springer
- Publish Date: 2002 - 2003 - 2012
- Publish Location: Boston
“Disseminating security updates at Internet scale” Subjects and Themes:
- Subjects: ➤ Security measures - Computer networks - Internet - Push technology (Computer networks) - Computer security - Data security & data encryption - Network security - Internet - General - Security - General - Computer Data Security - Computers - Computers - Computer Security - Computer Books: General - General - Computers / Computer Science - Push technology (Computer netw - Computer Bks - General Information - Computer networks, security measures - Internet, security measures - Push technology (computer networks)
Edition Identifiers:
- The Open Library ID: OL8372538M - OL19288818M - OL28136147M
- Library of Congress Control Number (LCCN): 2002035710
- All ISBNs: 9781461353553 - 1461353556 - 1402073054 - 9781402073052
First Setence:
"Over the years the Internet has been seriously challenged by various threats: break-ins, attacks, hoaxes, vulnerabilities, and other malicious subversion efforts."
Access and General Info:
- First Year Published: 2002
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Disseminating security updates at Internet scale at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
25Cisco Asa
By Frahim, Jazib/ Santos, Omar, Omar Santos and Jazib Frahim

“Cisco Asa” Metadata:
- Title: Cisco Asa
- Authors: Frahim, Jazib/ Santos, OmarOmar SantosJazib Frahim
- Language: English
- Number of Pages: Median: 1044
- Publisher: ➤ Pearson Education, Limited - Cisco Press - Macmillan Technical Pub
- Publish Date: 2005 - 2006 - 2014
“Cisco Asa” Subjects and Themes:
- Subjects: ➤ Data security & data encryption - Internet - Network security - Computers - Computer Data Security - Computer Network Management - Computer - Internet - Computer Books: General - Security - General - Internet - Security - Certification Guides - Cisco - Computers / Internet / Security - Networking - General - Computer networks, security measures - Computer networks - Security measures - Firewalls (Computer security)
Edition Identifiers:
- The Open Library ID: OL54048783M - OL35518959M - OL8822253M - OL23091021M
- Library of Congress Control Number (LCCN): 2004108505
- All ISBNs: ➤ 1587140985 - 9780132954419 - 9781587052095 - 9781587140983 - 0132954419 - 1587052091
Access and General Info:
- First Year Published: 2005
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Cisco Asa at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
26Security matters
By Brian Chess and Jacob West

“Security matters” Metadata:
- Title: Security matters
- Authors: Brian ChessJacob West
- Language: English
- Number of Pages: Median: 624
- Publisher: ➤ Addison-Wesley - Addison-Wesley Professional
- Publish Date: 2007
- Publish Location: Upper Saddle River, NJ
“Security matters” Subjects and Themes:
- Subjects: ➤ Computer security - Computer software - Debugging in computer science - Quality control - Data security & data encryption - Other software packages - Software engineering - Computer Data Security - Computer Programs Debugging - Computers - Computers - Computer Security - Computer Books: General - Programming - Software Development - Security - General - Computers / Security - Programming - Systems Analysis & Design - Computer software, quality control
Edition Identifiers:
- The Open Library ID: OL9522605M - OL17179747M
- Online Computer Library Center (OCLC) ID: 154684660
- Library of Congress Control Number (LCCN): 2007010226
- All ISBNs: 9780321424778 - 0321424778
Access and General Info:
- First Year Published: 2007
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Security matters at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
27Mastering system center Data protection manager 2007
By Devin L. Ganger and Ryan Femling

“Mastering system center Data protection manager 2007” Metadata:
- Title: ➤ Mastering system center Data protection manager 2007
- Authors: Devin L. GangerRyan Femling
- Language: English
- Number of Pages: Median: 504
- Publisher: ➤ Wiley & Sons, Incorporated, John - Wiley Pub. - Sybex
- Publish Date: 2008 - 2009
- Publish Location: Indianapolis, Ind
“Mastering system center Data protection manager 2007” Subjects and Themes:
- Subjects: ➤ Computer networks - Computer security - Data protection - Data protection manager - Data recovery (Computer science) - IBM computers - Security measures - Computer Communications & Networking - Computer Data Security - Computers - Computers - Communications / Networking - Computer Books: General - Networking - General - Security - General - Computers / Networking / General
Edition Identifiers:
- The Open Library ID: OL10294472M - OL18293584M - OL39897149M
- Online Computer Library Center (OCLC) ID: 354466125
- Library of Congress Control Number (LCCN): 2007043568
- All ISBNs: 9780470368244 - 0470368241 - 9780470181522 - 0470181524
Access and General Info:
- First Year Published: 2008
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Mastering system center Data protection manager 2007 at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
28Trusted recovery and defensive information warfare
By Peng Liu and Sushil Jajodia

“Trusted recovery and defensive information warfare” Metadata:
- Title: ➤ Trusted recovery and defensive information warfare
- Authors: Peng LiuSushil Jajodia
- Language: English
- Number of Pages: Median: 143
- Publisher: Kluwer Academic - Springer
- Publish Date: 2001 - 2002
- Publish Location: Boston
“Trusted recovery and defensive information warfare” Subjects and Themes:
- Subjects: ➤ Defensive (Military science) - Computer security - Information warfare - Computer networks - Security measures - Data recovery (Computer science) - Computer architecture & logic design - Data security & data encryption - General - Computers - General Information - Security - General - Computer Data Security - Computers - Computers - Computer Security - Computer Books: General - Database Management - General - Data recovery (Computer scienc - Computers / Computer Science - Computers / Security - Computers : Database Management - General - Medical : General - United States - Data recovery (computer science) - Defensive (military science) - Computer networks, security measures
- Places: United States
Edition Identifiers:
- The Open Library ID: OL7809758M - OL20644392M
- Online Computer Library Center (OCLC) ID: 48628796
- Library of Congress Control Number (LCCN): 2001050335
- All ISBNs: 9780792375722 - 0792375726
First Setence:
"Recent exploits by hackers have drawn tremendous attention to the issue of defending against potential information warfare (IW) [whi. 2000]."
Access and General Info:
- First Year Published: 2001
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Trusted recovery and defensive information warfare at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
29Real 802.11 security
By Jon Edney and William A. Arbaugh

“Real 802.11 security” Metadata:
- Title: Real 802.11 security
- Authors: Jon EdneyWilliam A. Arbaugh
- Language: English
- Number of Pages: Median: 480
- Publisher: ➤ Addison-Wesley - Addison-Wesley Professional
- Publish Date: 2003 - 2004
- Publish Location: Boston, MA
“Real 802.11 security” Subjects and Themes:
- Subjects: ➤ IEEE 802.11 (Standard) - Security measures - Wireless LANs - Communications engineering / telecommunications - Network security - Networking standards & protocols - Computer Data Security - Computers - Computers - Computer Security - Computer Books: General - Security - General - Computers / Internet / Security - Internet - General - Networking - Local Area Networks (LANs) - Lokales Netz - Sicherheit - Computer security
Edition Identifiers:
- The Open Library ID: OL3686297M - OL9561244M
- Library of Congress Control Number (LCCN): 2003049595
- All ISBNs: 0321136209 - 9780321136206
First Setence:
"Broadcast radio and, later, broadcast TV have defined wireless for two generations."
Access and General Info:
- First Year Published: 2003
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Real 802.11 security at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
30Intrusion signatures and analysis
By Stephen Northcutt, Mark Cooper, Matt Fearnow and Karen Frederick

“Intrusion signatures and analysis” Metadata:
- Title: ➤ Intrusion signatures and analysis
- Authors: Stephen NorthcuttMark CooperMatt FearnowKaren Frederick
- Language: English
- Number of Pages: Median: 379
- Publisher: New Riders - Sams
- Publish Date: 2001
- Publish Location: Indianapolis, Ind
“Intrusion signatures and analysis” Subjects and Themes:
- Subjects: ➤ Computer networks - Security measures - Computer security - Data security & data encryption - Security - General - Computer Data Security - Computers - Computers - Computer Security - Networking - General - Computer Books: General - Internet - Security - Computers / Internet / Security - Access control - Computers, access control
Edition Identifiers:
- The Open Library ID: OL7891435M - OL15495553M
- Online Computer Library Center (OCLC) ID: 46312517
- Library of Congress Control Number (LCCN): 00108786
- All ISBNs: 9780735710634 - 0735710635
First Setence:
"DID YOU EVER WATCH THE OLD cowboy-and-Indian movies on Saturday afternoon television when you were growing up?"
Access and General Info:
- First Year Published: 2001
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Intrusion signatures and analysis at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
31Business object design and implementation
By OOPSLA (Conference) (1995 Austin, Tex.), J. Sutherland, D. Patel, C Casanave, G Hollowell and J Miller

“Business object design and implementation” Metadata:
- Title: ➤ Business object design and implementation
- Authors: ➤ OOPSLA (Conference) (1995 Austin, Tex.)J. SutherlandD. PatelC CasanaveG HollowellJ Miller
- Language: English
- Number of Pages: Median: 165
- Publisher: ➤ Springer - Springer-Verlag Telos
- Publish Date: 1997
- Publish Location: New York - London
“Business object design and implementation” Subjects and Themes:
- Subjects: ➤ Congresses - Computer security - Object-oriented methods (Computer science) - Business - Data processing - Computer architecture & logic design - Object-oriented programming (OOP) - Spreadsheet software - Programming - Object Oriented Programming - Computer Data Security - Science/Mathematics - Object-Oriented Programming - Computers - Computers - Languages / Programming - Security - General - Information Technology - Security - Object-oriented methods (Compu - Business, data processing - Object-oriented methods (computer science)
Edition Identifiers:
- The Open Library ID: OL9063723M - OL1005299M
- Library of Congress Control Number (LCCN): 96045077
- All ISBNs: 9783540760962 - 3540760962
Access and General Info:
- First Year Published: 1997
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Business object design and implementation at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
32Computer crime
By Geoffrey H. Wold and Robert F. Shriver
“Computer crime” Metadata:
- Title: Computer crime
- Authors: Geoffrey H. WoldRobert F. Shriver
- Language: English
- Number of Pages: Median: 250
- Publisher: ➤ McGraw-Hill Education - Bankers Pub. Co. - McGraw-Hill
- Publish Date: 1989 - 1991
- Publish Location: Rolling Meadows, Ill
“Computer crime” Subjects and Themes:
- Subjects: ➤ Access control - Computer crimes - Computers - Prevention - Banking - Data security & data encryption - Bank Management - Computer Data Security - Business & Economics - Business / Economics / Finance - Business/Economics - Business & Economics / General - General - Banks and banking, data processing
Edition Identifiers:
- The Open Library ID: OL17971263M - OL12023405M
- Online Computer Library Center (OCLC) ID: 21122317
- Library of Congress Control Number (LCCN): 89083318
- All ISBNs: 155520161X - 9781555201616
Access and General Info:
- First Year Published: 1989
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Computer crime at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
33Tutorial computer and network security
By Marshall D. Abrams and Harold J. Podell

“Tutorial computer and network security” Metadata:
- Title: ➤ Tutorial computer and network security
- Authors: Marshall D. AbramsHarold J. Podell
- Language: English
- Number of Pages: Median: 439
- Publisher: ➤ Ieee Computer Society - IEEE Computer Society Press - Order from IEEE Computer Society
- Publish Date: 1986 - 1987
- Publish Location: ➤ Washington, D.C - Los Angeles, CA
“Tutorial computer and network security” Subjects and Themes:
- Subjects: ➤ Computer networks - Computer security - Security measures - Data security & data encryption - Privacy & data protection - Security - Computer Data Security - Computers - General Information
Edition Identifiers:
- The Open Library ID: OL2741177M - OL11389104M
- Online Computer Library Center (OCLC) ID: 16406323
- Library of Congress Control Number (LCCN): 86046217
- All ISBNs: 0818607564 - 9780818607561
Access and General Info:
- First Year Published: 1986
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Tutorial computer and network security at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
34Microsoft Windows server 2003 security administrator's companion
By Mike Danseglio and Roberta Bragg

“Microsoft Windows server 2003 security administrator's companion” Metadata:
- Title: ➤ Microsoft Windows server 2003 security administrator's companion
- Authors: Mike DanseglioRoberta Bragg
- Language: English
- Number of Pages: Median: 500
- Publisher: Microsoft Press
- Publish Date: 2003 - 2004
- Publish Location: Redmond, Wash
“Microsoft Windows server 2003 security administrator's companion” Subjects and Themes:
- Subjects: ➤ Computer security - Microsoft Windows server - Operating systems (Computers) - Microsoft Windows - Network security - Security - Hardware - Personal Computers - General - Computer Data Security - Microcomputer Application Software - Computers - Computers - General Information - Computer Books: General - Operating Systems - Windows - Client-Server Computing - General - Computers / General - Security - General
Edition Identifiers:
- The Open Library ID: OL3683677M - OL7890946M
- Online Computer Library Center (OCLC) ID: 51653201
- Library of Congress Control Number (LCCN): 2003043644
- All ISBNs: 0735615748 - 9780735615748
Access and General Info:
- First Year Published: 2003
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Microsoft Windows server 2003 security administrator's companion at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
35Inside network perimeter security
By Stephen Northcutt, Mark T. Edmead, Lenny Zeltser, Scott Winters, Karen Fredrick and Ronald W. Ritchey

“Inside network perimeter security” Metadata:
- Title: ➤ Inside network perimeter security
- Authors: ➤ Stephen NorthcuttMark T. EdmeadLenny ZeltserScott WintersKaren FredrickRonald W. Ritchey
- Language: English
- Number of Pages: Median: 664
- Publisher: New Riders - Sams
- Publish Date: 2002 - 2003
- Publish Location: Indianapolis, Ind
“Inside network perimeter security” Subjects and Themes:
- Subjects: ➤ Computer networks - Security measures - Network security - Networking - General - Computer Data Security - Computers - Computers - Communications / Networking - Computers - Computer Security - Computer Books: General - Computer security - Security - General - Computers / Internet / Security - Firewall - Firewalls (Computer security) - Virtual Private Network (VPN)
Edition Identifiers:
- The Open Library ID: OL7891514M - OL18210683M
- Library of Congress Control Number (LCCN): 2001096722
- All ISBNs: 0735712328 - 9780735712324
Access and General Info:
- First Year Published: 2002
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Inside network perimeter security at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
361998 IEEE Symposium on Security and Privacy
By IEEE Symposium on Security and Privacy (19th 1998 Oakland, Calif.), IEEE Computer Society and Institute of Electrical and Electronics Engineers

“1998 IEEE Symposium on Security and Privacy” Metadata:
- Title: ➤ 1998 IEEE Symposium on Security and Privacy
- Authors: ➤ IEEE Symposium on Security and Privacy (19th 1998 Oakland, Calif.)IEEE Computer SocietyInstitute of Electrical and Electronics Engineers
- Language: English
- Number of Pages: Median: 238
- Publisher: ➤ Institute of Electrical & Electronics Enginee - IEEE Computer Society
- Publish Date: 1998
- Publish Location: Los Alamitos, Calif
“1998 IEEE Symposium on Security and Privacy” Subjects and Themes:
- Subjects: ➤ Access control - Computers - Congresses - Data protection - Privacy, Right of - Right of Privacy - Security measures - Telecommunication - Computer fraud & hacking - Data security & data encryption - Privacy & data protection - Computer Data Security - Technology - Computers - Computer Security - Science/Mathematics - Security - General - General
Edition Identifiers:
- The Open Library ID: OL21047933M - OL11390568M
- Online Computer Library Center (OCLC) ID: 39218672
- All ISBNs: ➤ 9780818683886 - 9780780349940 - 0818683880 - 0818683864 - 9780818683862 - 0780349946
Author's Alternative Names:
"IEEE", "Ieee", "IEEE Computer Soc", "Computer Society Staff Ieee", "Computer Society Ieee", "Institute of Electrical & Electronics En", "Ieee Computer Society" and "Institute of Electrical and Electronics Engineers"Access and General Info:
- First Year Published: 1998
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find 1998 IEEE Symposium on Security and Privacy at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
37Data protection law
By Lee A Bygrave

“Data protection law” Metadata:
- Title: Data protection law
- Author: Lee A Bygrave
- Language: English
- Number of Pages: Median: 437
- Publisher: ➤ Springer - Kluwer Law International
- Publish Date: 2002
- Publish Location: The Hague - New York
“Data protection law” Subjects and Themes:
- Subjects: ➤ Data protection - Law and legislation - Constitutional & administrative law - Intellectual property, copyright & patents - Law Of Intellectual Property - Computer Data Security - Law - Legal Reference / Law Profession - Computer Books: General - Security - General - Constitutional - Law / Commercial - Intellectual Property - General
Edition Identifiers:
- The Open Library ID: OL9456030M - OL17056377M
- Library of Congress Control Number (LCCN): 2002023977
- All ISBNs: 9041198709 - 9789041198709
First Setence:
"This book deals with a class of laws that commonly go by the name of data projection law."
Access and General Info:
- First Year Published: 2002
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Data protection law at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
3812th IEEE Computer Security Foundations Workshop
By Computer Security Foundations Workshop (12th 1999 Mordano, Italy), IEEE Computer Society and Institute of Electrical and Electronics Engineers

“12th IEEE Computer Security Foundations Workshop” Metadata:
- Title: ➤ 12th IEEE Computer Security Foundations Workshop
- Authors: ➤ Computer Security Foundations Workshop (12th 1999 Mordano, Italy)IEEE Computer SocietyInstitute of Electrical and Electronics Engineers
- Language: English
- Number of Pages: Median: 239
- Publisher: ➤ IEEE Computer Society Press - Institute of Electrical & Electronics Enginee
- Publish Date: 1999
- Publish Location: Los Alamitos, California
“12th IEEE Computer Security Foundations Workshop” Subjects and Themes:
- Subjects: ➤ Congresses - Computer security - Computer Hardware & Operating Systems - Data security & data encryption - Privacy & data protection - Networking - General - Computer Data Security - Computers - Computers - Computer Security - Computers - General Information - Computer Books: General - Security - Security - General
Edition Identifiers:
- The Open Library ID: OL21930257M - OL9610482M
- Online Computer Library Center (OCLC) ID: 41669873
- All ISBNs: ➤ 0769502016 - 0769502024 - 0769502032 - 9780769502014 - 9780769502021 - 9780769502038
Author's Alternative Names:
"IEEE", "Computer Society Ieee", "Ieee Computer Society", "Computer Society Staff Ieee", "Ieee", "Institute of Electrical and Electronics Engineers", "Institute of Electrical & Electronics En" and "IEEE Computer Soc"Access and General Info:
- First Year Published: 1999
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find 12th IEEE Computer Security Foundations Workshop at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
39CCSP
By Wade Edwards, Tom Lancaster, Eric Quinn, Jason Rohm, Bryant Tow, Wade Edwards and Tom Lancaster

“CCSP” Metadata:
- Title: CCSP
- Authors: ➤ Wade EdwardsTom LancasterEric QuinnJason RohmBryant TowWade Edwards Tom Lancaster
- Language: English
- Number of Pages: Median: 655
- Publisher: SYBEX - Sybex
- Publish Date: 2003 - 2004
- Publish Location: San Francisco, Calif
“CCSP” Subjects and Themes:
- Subjects: ➤ Extranets (Computer networks) - Certification - Study guides - Examinations - Firewalls (Computer security) - Electronic data processing personnel - Network security - Study Aids - Networking - General - Computer Books: Operating Systems - Computer Data Security - Data Transmission Standards And Protocols - Security - General - Computers - Computers - Communications / Networking - Certification Guides - Cisco - Computers / Technical Skills - Networking - Network Protocols - Tests - Computer security - Extranets (computer networks) - Electronic data processing personnel, certification
Edition Identifiers:
- The Open Library ID: OL17920755M - OL8096636M
- Library of Congress Control Number (LCCN): 2003109126
- All ISBNs: 9780782142877 - 0782142877
First Setence:
"This chapter begins our detailed look at Cisco's firewall solutions, laying the groundwork for all the information you need to know for the Cisco Secure PIX Firewall Advanced (CSPFA) exam."
Access and General Info:
- First Year Published: 2003
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find CCSP at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
40EDI
By Ian Walden, A. Braganza and I. Walden
“EDI” Metadata:
- Title: EDI
- Authors: Ian WaldenA. BraganzaI. Walden
- Language: English
- Number of Pages: Median: 266
- Publisher: Blackwell Pub - NCC Blackwell
- Publish Date: 1993
- Publish Location: Manchester
“EDI” Subjects and Themes:
- Subjects: ➤ Auditing - Electronic data interchange - Data processing - EDI (electronic data interchange) - Management accounting - Media, information & communication industries - Computer Books: General - Computer Data Security - Auditing, data processing
Edition Identifiers:
- The Open Library ID: OL8993529M - OL1137502M
- Online Computer Library Center (OCLC) ID: 29669124
- Library of Congress Control Number (LCCN): 94105208
- All ISBNs: 1855542080 - 9781855542082
Author's Alternative Names:
"Ashley Braganza"Access and General Info:
- First Year Published: 1993
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find EDI at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
41Citrix CCA
By Todd W. Mathers, Todd Mathers and Elias Khnaser

“Citrix CCA” Metadata:
- Title: Citrix CCA
- Authors: Todd W. MathersTodd MathersElias Khnaser
- Language: English
- Number of Pages: Median: 653
- Publisher: Que
- Publish Date: 2005
- Publish Location: Indianapolis, Ind
“Citrix CCA” Subjects and Themes:
- Subjects: ➤ Certification - Citrix MetaFrame (Computer file) - Client/server computing - Electronic data processing personnel - Examinations - Study guides - Operating systems & graphical user interfaces (GUIs) - Test Prep - Computer Data Security - Computers - Certification - Tests - Certification Guides - General - Study Aids - Computers / Technical Skills - Computer Bks - Certification - Citrix metaframe - Electronic data processing personnel, certification
Edition Identifiers:
- The Open Library ID: OL8157737M - OL17930108M
- Online Computer Library Center (OCLC) ID: 64549905
- Library of Congress Control Number (LCCN): 2004108925
- All ISBNs: 9780789732460 - 0789732467
First Setence:
"In preparing for the MetaFrame Presentation Server 3.0, Enterprise Edition (MPS/EE) exam, you must clearly understand the role that the main components of the software play in the overall function of the MetaFrame environment."
Access and General Info:
- First Year Published: 2005
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Citrix CCA at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
42Security, rights, and liabilities in e-commerce
By Jeffrey H. Matsuura and Jeffrey, H. Matsuura

“Security, rights, and liabilities in e-commerce” Metadata:
- Title: ➤ Security, rights, and liabilities in e-commerce
- Authors: Jeffrey H. MatsuuraJeffrey, H. Matsuura
- Language: English
- Number of Pages: Median: 260
- Publisher: ➤ Artech House Publishers - Artech House
- Publish Date: 2001 - 2002
- Publish Location: Boston
“Security, rights, and liabilities in e-commerce” Subjects and Themes:
- Subjects: ➤ Data protection - Database security - Electronic commerce - Law and legislation - Security (Law) - Business & Management - Internet - Privacy & data protection - Taxation - United States - Computer Data Security - Regulation Of Industry - Business & Economics - Legal Reference / Law Profession - Business/Economics - Artificial Intelligence - General - Telecommunications - Computers-Artificial Intelligence - General - Law / Taxation - Technology-Telecommunications - E-Commerce - General
- Places: United States
Edition Identifiers:
- The Open Library ID: OL21504092M - OL8780184M
- Online Computer Library Center (OCLC) ID: 47790496
- Library of Congress Control Number (LCCN): 2001045737
- All ISBNs: 9781580532983 - 1580532985
First Setence:
"This book examines some of the fundamental legal rights and liabilities associated with electronic commerce security."
Access and General Info:
- First Year Published: 2001
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Security, rights, and liabilities in e-commerce at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
43Information security management handbook
By Micki Krause Nozaki

“Information security management handbook” Metadata:
- Title: ➤ Information security management handbook
- Author: Micki Krause Nozaki
- Language: English
- Number of Pages: Median: 640
- Publisher: AUERBACH
- Publish Date: 2000
“Information security management handbook” Subjects and Themes:
- Subjects: ➤ Data security & data encryption - Reference works - Management Information Systems - Computer Data Security - Computers - Computers - General Information - Computer Books: General - Security - General - Reference - General - Information Management - Security - Computers / Security - Computer security - Data protection - Sécurité informatique - Protection de l'information (Informatique) - Computerbeveiliging - Databescherming - Informatietechnologie
Edition Identifiers:
- The Open Library ID: OL8258738M
- All ISBNs: 0849308003 - 9780849308000
Access and General Info:
- First Year Published: 2000
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Information security management handbook at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
44Essential Computer Security
By Tony Bradley

“Essential Computer Security” Metadata:
- Title: Essential Computer Security
- Author: Tony Bradley
- Language: English
- Number of Pages: Median: 360
- Publisher: Syngress
- Publish Date: 2006
“Essential Computer Security” Subjects and Themes:
- Subjects: ➤ Passwords - Access control - Electronic mail systems - Computers - Spam filtering (Electronic mail) - Firewalls (Computer security) - Spyware (Computer software) - Computer security - Internet - Security measures - Data security & data encryption - Security - General - Computer Data Security - Computers - Computer Security - Computer Books: General - Computers / Computer Security - Computers / Security - Wireless communication systems - security, computer security, wireless, wireless security, viruses, email, phishing, hoaxes, adware, Internet security, network security, passwords, password security - Internet - Security - Networking - Security - Computer networks - Electronic mail messages
Edition Identifiers:
- The Open Library ID: OL8894052M
- All ISBNs: 9781597491143 - 1597491144
Access and General Info:
- First Year Published: 2006
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Essential Computer Security at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.