Explore: Computerbeveiliging
Discover books, insights, and more — all in one place.
Learn more about Computerbeveiliging with top reads curated from trusted sources — all in one place.
AI-Generated Overview About “computerbeveiliging”:
Books Results
Source: The Open Library
The Open Library Search Results
Search results from The Open Library
1Hacking exposed
By Stuart McClure, Joel Scambray and George Kurtz

“Hacking exposed” Metadata:
- Title: Hacking exposed
- Authors: Stuart McClureJoel ScambrayGeorge Kurtz
- Language: English
- Number of Pages: Median: 484
- Publisher: Computing Mcgraw-Hill
- Publish Date: 1999
“Hacking exposed” Subjects and Themes:
- Subjects: ➤ Computer security - Computer networks - Hacking - Computerbeveiliging - Security measures - Data protection - Computer fraud & hacking - Data security & data encryption - Network security - Reference works - Security measures - Computer security - Computer Data Security - Computers - Computers - Communications / Networking - Security - General - Computer Books And Software - Security - Networking - General - Computer Bks - Communications / Networking - Computer networks - Security measures
Edition Identifiers:
- The Open Library ID: OL7302141M - OL9256818M
- All ISBNs: 0072121270 - 9780072121278
Access and General Info:
- First Year Published: 1999
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Borrowable
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
- Borrowing from Open Library: Borrowing link
- Borrowing from Archive.org: Borrowing link
Online Marketplaces
Find Hacking exposed at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
2Hacking exposed
By Joel Scambray, Stuart McClure and George Kurtz

“Hacking exposed” Metadata:
- Title: Hacking exposed
- Authors: Joel ScambrayStuart McClureGeorge Kurtz
- Language: English
- Number of Pages: Median: 628
- Publisher: ➤ McGraw-Hill/OsborneMedia - Osborne/McGraw-Hill - McGraw-Hill/Osborne - McGraw-Hill Osborne Media
- Publish Date: ➤ 2000 - 2001 - 2002 - 2003 - 2006
- Publish Location: New York - Berkeley, Calif
“Hacking exposed” Subjects and Themes:
- Subjects: ➤ Computer networks - Computer security - Design - Microsoft Windows (Computer file) - Security measures - Web sites - Computernetwerken - Hacking - Computerbeveiliging - Microsoft windows (computer program) - Computer networks, security measures - Réseaux d'ordinateurs - Sécurité - Mesures - Sécurité informatique - COMPUTERS - Internet - Security - Networking - General - Literary collections
Edition Identifiers:
- The Open Library ID: ➤ OL9256905M - OL7302228M - OL7302492M - OL3319073M - OL6901297M - OL17840891M - OL3657306M
- Online Computer Library Center (OCLC) ID: 50055885 - 50557718 - 53968784
- Library of Congress Control Number (LCCN): 00712033 - 2004270118 - 2002512020
- All ISBNs: ➤ 9780072230611 - 9780072224382 - 0072127481 - 0072230614 - 007222438X - 9780072127485
First Setence:
"It's difficult to talk about any system in a vacuum, especially one that is so widely deployed in so many roles as Windows Server in all of its flavors."
Access and General Info:
- First Year Published: 2000
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Borrowable
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
- Borrowing from Open Library: Borrowing link
- Borrowing from Archive.org: Borrowing link
Online Marketplaces
Find Hacking exposed at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
3Building Internet Firewalls
By D. Brent Chapman and Elizabeth D. Zwicky

“Building Internet Firewalls” Metadata:
- Title: Building Internet Firewalls
- Authors: D. Brent ChapmanElizabeth D. Zwicky
- Language: English
- Number of Pages: Median: 517
- Publisher: ➤ O'Reilly - O'Reilly Media, Incorporated - O'Reilly & Associates
- Publish Date: 1995 - 2000
- Publish Location: ➤ Sebastopol, CA - Beijing - Cambridge, Mass - Cambridge, MA
“Building Internet Firewalls” Subjects and Themes:
- Subjects: ➤ Firewalls (Computer security) - Internet, security measures - Computer networks, security measures - Computer networks - Security measures - Internet - Réseaux d'ordinateurs - Sécurité - Mesures - Coupe-feu (Sécurité informatique) - COMPUTERS - Security - Computerbeveiliging - General - Viruses - Com060040 - Cs.cmp_sc.app_sw - Cs.cmp_sc.intrn_www - Cs.cmp_sc.secur
Edition Identifiers:
- The Open Library ID: ➤ OL6785816M - OL36706334M - OL36797489M - OL36777429M - OL551907M - OL17456506M
- Online Computer Library Center (OCLC) ID: 33212964 - 42922353 - 43864472
- Library of Congress Control Number (LCCN): 00039954 - 96133474
- All ISBNs: ➤ 9780596551889 - 1565921240 - 0596551886 - 9781565928718 - 9781565921245 - 0596515669 - 9780596515669 - 1565928717 - 9780596150167 - 0596150164
Access and General Info:
- First Year Published: 1995
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Borrowable
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
- Borrowing from Open Library: Borrowing link
- Borrowing from Archive.org: Borrowing link
Online Marketplaces
Find Building Internet Firewalls at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
4Rsa Security's Official Guide to Cryptography
By Steve Burnett

“Rsa Security's Official Guide to Cryptography” Metadata:
- Title: ➤ Rsa Security's Official Guide to Cryptography
- Author: Steve Burnett
- Language: English
- Number of Pages: Median: 460
- Publisher: ➤ McGraw-Hill/Osborne Media - Osborne/McGraw-Hill - McGraw-Hill Professional Publishing
- Publish Date: 2001 - 2004
- Publish Location: New York
“Rsa Security's Official Guide to Cryptography” Subjects and Themes:
- Subjects: ➤ Computer networks - Cryptography - Data encryption (Computer science) - Security measures - Computerbeveiliging - TCP/IP - Geheimschrift - Réseaux d'ordinateurs - Sécurité - Mesures - Chiffrement (Informatique) - Cryptographie - COMPUTERS - Security
Edition Identifiers:
- The Open Library ID: OL7302540M - OL3965904M - OL49513532M - OL9257217M - OL3580714M
- Online Computer Library Center (OCLC) ID: 46914596 - 50553557 - 50868319 - 60550801
- Library of Congress Control Number (LCCN): 2005275454 - 2002276640 - 2001270873
- All ISBNs: ➤ 0072254947 - 0072192259 - 9780072254945 - 0072194049 - 9780072131390 - 9780072194043 - 007213139X - 9780072192254
Access and General Info:
- First Year Published: 2001
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Borrowable
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
- Borrowing from Open Library: Borrowing link
- Borrowing from Archive.org: Borrowing link
Online Marketplaces
Find Rsa Security's Official Guide to Cryptography at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
5Computer crime
By David J. Icove, Karl Seger and William VonStorch

“Computer crime” Metadata:
- Title: Computer crime
- Authors: David J. IcoveKarl SegerWilliam VonStorch
- Language: English
- Number of Pages: Median: 451
- Publisher: ➤ O'Reilly & Associates - O'Reilly
- Publish Date: 1995
- Publish Location: Sebastopol, CA - Sebastopol
“Computer crime” Subjects and Themes:
- Subjects: ➤ Handbooks, manuals - Electronic data processing departments - Computer crimes - Security measures - Computer security - Law and legislation - Computers - Computer engineering - Sécurité informatique - Ordinateurs - Accès - Contrôle - Criminalité informatique - Législation - SOCIAL SCIENCE - Criminology - Computercriminaliteit - Computerbeveiliging - Programacao de computadores - Délits par ordinateurs - Systèmes informatiques - Mesures de sûreté - Données - Transmission - Protection de l'information (informatique) - Bekämpfung - Computerkriminalität
Edition Identifiers:
- The Open Library ID: OL8667173M - OL15377838M
- Online Computer Library Center (OCLC) ID: 44958902
- Library of Congress Control Number (LCCN): 96133472
- All ISBNs: 1565920864 - 9781565920866
Access and General Info:
- First Year Published: 1995
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Borrowable
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
- Borrowing from Open Library: Borrowing link
- Borrowing from Archive.org: Borrowing link
Online Marketplaces
Find Computer crime at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
6Data Privacy and Security
By David Salomon

“Data Privacy and Security” Metadata:
- Title: Data Privacy and Security
- Author: David Salomon
- Language: English
- Number of Pages: Median: 479
- Publisher: ➤ Springer London, Limited - Springer
- Publish Date: 2003 - 2011 - 2012
“Data Privacy and Security” Subjects and Themes:
- Subjects: ➤ Computer security - Data encryption (Computer science) - Data protection - Computerbeveiliging - Databescherming - Geheimschrift - Systemes informatiques - Securite? - Mesures - Chiffrement (Informatique) - Protection de l'information (Informatique)
Edition Identifiers:
- The Open Library ID: OL37240464M - OL7442332M - OL28002511M - OL27961282M
- Online Computer Library Center (OCLC) ID: 51210564
- Library of Congress Control Number (LCCN): 2002044524
- All ISBNs: ➤ 9781441918161 - 038721707X - 1441918167 - 1468495461 - 9780387217079 - 9781468495461 - 9780387003115 - 0387003118
First Setence:
"A cipher where each symbol is replaced by another symbol, where the replacement does not vary, is called a monoalphabetic substitution cipher."
Access and General Info:
- First Year Published: 2003
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Borrowable
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
- Borrowing from Open Library: Borrowing link
- Borrowing from Archive.org: Borrowing link
Online Marketplaces
Find Data Privacy and Security at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
7Maximum Linux security
a hacker's guide to protecting your Linux server and workstation
By Anonymous

“Maximum Linux security” Metadata:
- Title: Maximum Linux security
- Author: Anonymous
- Number of Pages: Median: 743
- Publisher: Sams
- Publish Date: 2000
- Publish Location: Indianapolis, Ind
“Maximum Linux security” Subjects and Themes:
- Subjects: ➤ Systèmes d'exploitation (Ordinateurs) - Mesures - Systèmes informatiques - Computer security - Linux - Computerbeveiliging - Linux (Système d'exploitation des ordinateurs) - Sécurité - Linux (computer operating system)
Edition Identifiers:
- The Open Library ID: OL24213643M
- Online Computer Library Center (OCLC) ID: 42769243
- Library of Congress Control Number (LCCN): 99061434
- All ISBNs: 9780672316708 - 0672316706
Author's Alternative Names:
"Anonymous Authors", "Anónimo Anonymous", "Anonyma.", "ANONYME", "(AU Anon", "ANONIMO", "Anonimasu Tokumeikibou", "Anonymes", "Anônimo", "Anonymus", "ANÓNIMO.-", "anonymous anonymous", "Anonymous (Writer)", "anonym anonym", ". Anon.", "anonyme anonyme", "Anon9780063221482", "Anonym", "Anon", "Anonymous Author", "Anonymous,", "anon.", ". Anon", "Anonymou s", "anon", "Anónimo (Anonymous)", "Anonimo", "Anonimo Anonimo", "Author anonymous.", "Anonymous (Author1)", "Anonyme.", "Unnamed Anonymous", "ANONYME COLLECT", "anonym", "Anon .", "Anonimos", "Anónimo", "Anonimo.", "ANon", "ANONYMOUS.", "Anonymus.", ". Anonymus", "Anonymo us", "Anonyme", "Autor Anónimo", ". Anonymous", "Anónimo (anonymous)", "ANON ANON", "Anonymous.", "Unknown anonymous", "Anonomous", "by anonymous", "Anômino Anônimo", "ANON", "A. Anonymous", "Anon.", "Anon/", "Anon`", "Anonymous Anonymous Author", "Anonymous (Author)", "Anon Anon", "anonymous", "anonymous author", "Anonymous Anon.", "Anónimo Anónimo", "anon`", "ANONYM", "Anonymous Anonymous", "Anonim", "Anonimas", "(Anon)", ""Anonymous".", "ANONIMO.", "Anonyme Anonyme", "anonyme", "Anonymo", "by Anonymous", "ANONYMOUS", "Author Anonymous",Access and General Info:
- First Year Published: 2000
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Borrowable
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
- Borrowing from Open Library: Borrowing link
- Borrowing from Archive.org: Borrowing link
Online Marketplaces
Find Maximum Linux security at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
8Network Security
By Fred Simonds

“Network Security” Metadata:
- Title: Network Security
- Author: Fred Simonds
- Language: English
- Number of Pages: Median: 395
- Publisher: ➤ Mcgraw-Hill (Tx) - McGraw-Hill Companies - Computing McGraw-Hill
- Publish Date: 1995
“Network Security” Subjects and Themes:
- Subjects: ➤ Computernetwerken - Computer security - Rechnernetz - Datensicherung - Computer networks - Computerbeveiliging - Security measures
Edition Identifiers:
- The Open Library ID: OL9251511M - OL7296807M - OL9796156M
- All ISBNs: 0070576343 - 0070576394 - 9780070576346 - 9780070576391
Access and General Info:
- First Year Published: 1995
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Borrowable
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
- Borrowing from Open Library: Borrowing link
- Borrowing from Archive.org: Borrowing link
Online Marketplaces
Find Network Security at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
9Net privacy
By Michael Erbschloe and John R. Vacca

“Net privacy” Metadata:
- Title: Net privacy
- Authors: Michael ErbschloeJohn R. Vacca
- Language: English
- Number of Pages: Median: 318
- Publisher: McGraw-Hill Companies
- Publish Date: 2001
“Net privacy” Subjects and Themes:
- Subjects: ➤ Electronic commerce - Security measures - Right of Privacy - Internet - Sécurité - Mesures - Droit à la vie privée - Commerce électronique - BUSINESS & ECONOMICS - Workplace Culture - Corporate Governance - Leadership - Organizational Development - Computerbeveiliging - Recht op privacy - E-business - Veiligheidsmaatregelen
Edition Identifiers:
- The Open Library ID: OL9253427M - OL7298750M
- Online Computer Library Center (OCLC) ID: 50553544
- Library of Congress Control Number (LCCN): 2001018037
- All ISBNs: 9780071370059 - 0071370056
First Setence:
"Maintaining the privacy of enterprise information is a meticulous process and requires coordination across all departments and functions within an organization."
Access and General Info:
- First Year Published: 2001
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Borrowable
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
- Borrowing from Open Library: Borrowing link
- Borrowing from Archive.org: Borrowing link
Online Marketplaces
Find Net privacy at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
10Securing PCs and data in libraries and schools
By Allen C. Benson

“Securing PCs and data in libraries and schools” Metadata:
- Title: ➤ Securing PCs and data in libraries and schools
- Author: Allen C. Benson
- Language: English
- Number of Pages: Median: 252
- Publisher: Neal-Schuman Publishers
- Publish Date: 1997 - 1998
- Publish Location: New York
“Securing PCs and data in libraries and schools” Subjects and Themes:
- Subjects: ➤ Computer security - Microcomputers - Access control - Data protection - Computer Security - Computerbeveiliging - Software - Library science, data processing - Library information networks
Edition Identifiers:
- The Open Library ID: OL350019M - OL8574775M
- Library of Congress Control Number (LCCN): 98009355
- All ISBNs: 9781555703219 - 1555703216
Access and General Info:
- First Year Published: 1997
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Borrowable
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
- Borrowing from Open Library: Borrowing link
- Borrowing from Archive.org: Borrowing link
Online Marketplaces
Find Securing PCs and data in libraries and schools at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
11Norway

“Norway” Metadata:
- Title: Norway
- Language: English
- Number of Pages: Median: 148
- Publisher: ➤ Organisation for Economic Co-operation and Development - OECD Publications and Information Center [distributor]
- Publish Date: 2006
- Publish Location: ➤ Washington, D.C - Paris, France
“Norway” Subjects and Themes:
- Subjects: ➤ Computer networks - Computer security - Security measures - Data protection - Information resources management - Computerbeveiliging - ICT - Falls (Accidents) - Government policy - Prevention - Older people - Care - Legal status, laws - Wounds and injuries - Safety - Risk Management - Epidemiologic Measurements - Risk - Organization and Administration - Public Policy - Accidents - Adult - Probability - Age Groups - Social Control Policies - Accident Prevention - Health Services Administration - Public Health - Delivery of Health Care - Statistics as Topic - Environment and Public Health - Formal Social Control - Persons - Policy - Health Care Evaluation Mechanisms - Sociology - Named Groups - Epidemiologic Methods - Health Care Economics and Organizations - Social Sciences - Anthropology, Education, Sociology and Social Phenomena - Quality of Health Care - Investigative Techniques - Diagnostic and Therapeutic Techniques and Equipment Analytical - Health Care Quality, Access, and Evaluation - Risk Assessment - Health Policy - Safety Management - Aged - Accidental Falls - Social Welfare & Social Work - Social Welfare & Social Work - General
- Places: Norway
Edition Identifiers:
- The Open Library ID: OL16305225M - OL19292436M
- Online Computer Library Center (OCLC) ID: 68918683
- Library of Congress Control Number (LCCN): 2006484563 - 2007399846
- All ISBNs: 9264025502 - 9789264025509
Access and General Info:
- First Year Published: 2006
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Borrowable
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
- Borrowing from Open Library: Borrowing link
- Borrowing from Archive.org: Borrowing link
Online Marketplaces
Find Norway at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
12Windows NT Security Handbook
By Tom Sheldon

“Windows NT Security Handbook” Metadata:
- Title: Windows NT Security Handbook
- Author: Tom Sheldon
- Language: English
- Number of Pages: Median: 679
- Publisher: Osborne Publishing
- Publish Date: 1996
“Windows NT Security Handbook” Subjects and Themes:
- Subjects: Computerbeveiliging - Operating systems (Computers) - Computer security - Microsoft Windows NT
Edition Identifiers:
- The Open Library ID: OL7310086M - OL9264745M
- Library of Congress Control Number (LCCN): 97138980
- All ISBNs: 0078822408 - 9780078822407
Access and General Info:
- First Year Published: 1996
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Borrowable
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
- Borrowing from Open Library: Borrowing link
- Borrowing from Archive.org: Borrowing link
Online Marketplaces
Find Windows NT Security Handbook at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
13Internet Trust
By James Essinger

“Internet Trust” Metadata:
- Title: Internet Trust
- Author: James Essinger
- Language: English
- Number of Pages: Median: 256
- Publisher: ➤ Addison-Wesley - Addison-Wesley Professional
- Publish Date: 2001
“Internet Trust” Subjects and Themes:
- Subjects: ➤ Electronic commerce - Internet marketing - Internet, security measures - Internet - Security measures - Business enterprises - Computer networks - Computerbeveiliging - Databescherming - Trustees - Logiciels - Commerce électronique - Dispositifs de sécurité - Protection de l'information (informatique)
Edition Identifiers:
- The Open Library ID: OL10169084M
- Online Computer Library Center (OCLC) ID: 47676546
- All ISBNs: 0201725894 - 9780201725896
Access and General Info:
- First Year Published: 2001
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Borrowable
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
- Borrowing from Open Library: Borrowing link
- Borrowing from Archive.org: Borrowing link
Online Marketplaces
Find Internet Trust at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
14PC security and virus protection
By Pamela Kane

“PC security and virus protection” Metadata:
- Title: ➤ PC security and virus protection
- Author: Pamela Kane
- Language: English
- Number of Pages: Median: 523
- Publisher: M&T Books
- Publish Date: 1994
- Publish Location: New York
“PC security and virus protection” Subjects and Themes:
- Subjects: ➤ Microcomputers - Computer viruses - Access control - COMPUTER VIRUSES - Securite informatique - Computerbeveiliging - Computervirussen - COMPUTER SECURITY - Protection des donnees
Edition Identifiers:
- The Open Library ID: OL1090012M
- Library of Congress Control Number (LCCN): 94014134
- All ISBNs: 1558513906 - 9781558513907
Access and General Info:
- First Year Published: 1994
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Borrowable
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
- Borrowing from Open Library: Borrowing link
- Borrowing from Archive.org: Borrowing link
Online Marketplaces
Find PC security and virus protection at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
15MCSE Windows 2000 Network Security Design
By Roberta Bragg

“MCSE Windows 2000 Network Security Design” Metadata:
- Title: ➤ MCSE Windows 2000 Network Security Design
- Author: Roberta Bragg
- Language: English
- Number of Pages: Median: 912
- Publisher: New Riders Publishing
- Publish Date: 2000
“MCSE Windows 2000 Network Security Design” Subjects and Themes:
- Subjects: ➤ Examinations - Computernetwerken - Certification - Computerbeveiliging - Microsoft Windows 2000 server - Computer security - Microsoft software - Study guides - Microsoft Windows 2000 - Electronic data processing personnel - Operating systems (computers) - Computer networks, security measures - Personal computing, operating systems
Edition Identifiers:
- The Open Library ID: OL7891405M
- Library of Congress Control Number (LCCN): 00100503
- All ISBNs: 9780735709843 - 073570984X
Access and General Info:
- First Year Published: 2000
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Borrowable
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
- Borrowing from Open Library: Borrowing link
- Borrowing from Archive.org: Borrowing link
Online Marketplaces
Find MCSE Windows 2000 Network Security Design at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
16The Art of Deception
By Kevin D. Mitnick and William L. Simon

“The Art of Deception” Metadata:
- Title: The Art of Deception
- Authors: Kevin D. MitnickWilliam L. Simon
- Language: English
- Number of Pages: Median: 352
- Publisher: ➤ Tantor and Blackstone Publishing - Wiley Publishing - Wiley - John Wiley & Sons, Ltd.
- Publish Date: ➤ 2001 - 2002 - 2003 - 2007 - 2021
- Publish Location: USA - New York
“The Art of Deception” Subjects and Themes:
- Subjects: ➤ Computer Technology - Nonfiction - Social aspects - Computer hackers - Computer security - Information technology - Deception - Hackers - Business and economics - Computer networks, security measures - Security systems - Internal security - Social Engineering - Sécurité informatique - Sûreté de l'État - COMPUTERS - Internet - Security - Networking - General - Dispositifs de sécurité - Facteurs humains - Aspects psychologiques - Désinformation - Computerbeveiliging - Computercriminaliteit - Psychologische aspecten
- People: Kevin Mitnick
Edition Identifiers:
- Google Books ID: vRG7QgAACAAJ
- The Open Library ID: ➤ OL51730261M - OL35272573M - OL7613854M - OL8042481M - OL24328570M - OL24321037M
- Online Computer Library Center (OCLC) ID: 50494246 - 51209751 - 428739808
- Library of Congress Control Number (LCCN): 2002512977
- All ISBNs: ➤ 9781665197052 - 9780471237129 - 0471237124 - 9780764542800 - 1665197056 - 076454280X - 0471432288 - 9780471432289
First Setence:
"a company may have purchased the best security technologies that money can buy, trained their people so well that they lock up all their secrets before going home at night, and hired building guards from the best security firm in the business."
Author's Alternative Names:
"Kevin David Mitnick", "Kevin Mitnick", "Kevim Mitnick", "Kevin D Mitnick", "Kevin MITNICK" and "KD Mitnick"Access and General Info:
- First Year Published: 2001
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find The Art of Deception at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
17Security Engineering
By Ross J. Anderson

“Security Engineering” Metadata:
- Title: Security Engineering
- Author: Ross J. Anderson
- Language: English
- Number of Pages: Median: 1000
- Publisher: ➤ Wiley Technology Pub. - Wiley Publishing - Wiley & Sons, Limited, John - Wiley & Sons, Incorporated, John - Wiley
- Publish Date: ➤ 2001 - 2008 - 2010 - 2020 - 2021
- Publish Location: ➤ Indianapolis, IN - Indianapolis - New York
“Security Engineering” Subjects and Themes:
- Subjects: ➤ Electronic data processing - Distributed processing - Computer security - Electronic data processing, distributed processing - Verteiltes System - Monitoring - Criptologia - Computabilidade e complexidade - Redes e comunicação de dados - Traitement réparti - Computerbeveiliging - Beveiliging - Computersicherheit - Sécurité informatique - Geheimschrift - Segurança - Mathematics - IT-säkerhet
Edition Identifiers:
- The Open Library ID: ➤ OL39891943M - OL39883567M - OL35836994M - OL29490753M - OL29509472M - OL29509478M - OL24930003M - OL7616327M - OL18632587M - OL18844972M - OL18893289M - OL31957243M - OL29057215M - OL29057030M - OL29057006M - OL9387958M
- Online Computer Library Center (OCLC) ID: 192045774 - 45393984
- Library of Congress Control Number (LCCN): 2008006392 - 00068486
- All ISBNs: ➤ 9780470068526 - 9781118008362 - 1118008375 - 0470068523 - 1119644682 - 1118008383 - 9780470313114 - 1119642787 - 9781119642831 - 1119642833 - 1282822942 - 0471389226 - 9781118008386 - 9781119642817 - 9780471389224 - 1118008367 - 0470313110 - 1119642817 - 9781118008379 - 9781119642787 - 9781119644682 - 9781282822948
First Setence:
"For generations, people have defined and protected their property and their privacy using locks, fences, signatures, seals, account books, and meters."
"Security engineering is about building systems to remain dependable in the face of malice, error, or mischance."
Author's Alternative Names:
"Ross John Anderson" and "Ross Anderson"Access and General Info:
- First Year Published: 2001
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Security Engineering at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
18Security in computing
By Charles P. Pfleeger, Charles P. Pfleeger, Shari Lawrence Pfleeger and Jonathan Margulies

“Security in computing” Metadata:
- Title: Security in computing
- Authors: Charles P. PfleegerCharles P. PfleegerShari Lawrence PfleegerJonathan Margulies
- Language: English
- Number of Pages: Median: 746
- Publisher: ➤ Prentice-Hall International - Prentice Hall PTR - Pearson Education, Limited - Prentice Hall
- Publish Date: ➤ 1989 - 1996 - 2002 - 2003 - 2006 - 2015
- Publish Location: ➤ [London] - Upper Saddle River, N.J - London - Upper Saddle River, NJ
“Security in computing” Subjects and Themes:
- Subjects: ➤ Computer security - Data protection - Right of Privacy - Rechnernetz - Datensicherung - Computerbeveiliging - Computers - Access control - Firewalls (Computer security) - Operating systems (Computers) - Linux - Privacy, Right of
Edition Identifiers:
- The Open Library ID: ➤ OL35566361M - OL9294548M - OL7339893M - OL25651390M - OL28953547M - OL9286053M - OL7331405M - OL16578902M - OL22148780M
- Online Computer Library Center (OCLC) ID: 50676236 - 71004261
- Library of Congress Control Number (LCCN): 2014043643 - 2006026798 - 2002034368 - 2014038579
- All ISBNs: ➤ 0137990162 - 9780132390774 - 9780130355485 - 0131857940 - 9780134085043 - 0134085051 - 0132390779 - 9780134085050 - 9780137990160 - 0134085043 - 0130355488 - 9780131857940
Author's Alternative Names:
"Shari Pfleeger"Access and General Info:
- First Year Published: 1989
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Security in computing at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
19Crypto
By Steven Levy

“Crypto” Metadata:
- Title: Crypto
- Author: Steven Levy
- Language: English
- Number of Pages: Median: 356
- Publisher: ➤ Penguin (Non-Classics) - Viking - Diane Pub Co
- Publish Date: 2001 - 2002 - 2003 - 2004
- Publish Location: New York
“Crypto” Subjects and Themes:
- Subjects: ➤ Geheimschrift - Computer security - Cryptography - Databescherming - Computerbeveiliging - Computercriminaliteit - Cryptographie
Edition Identifiers:
- The Open Library ID: OL7643220M - OL7996166M - OL7995954M - OL24745751M - OL7351092M
- Online Computer Library Center (OCLC) ID: 44818667 - 149222824 - 228062607
- Library of Congress Control Number (LCCN): 00043809
- All ISBNs: ➤ 0756757746 - 0140244328 - 9780140244328 - 0670859508 - 9780756757748 - 9780670859504 - 0756777887 - 9780756777883
First Setence:
"Mary Fisher loathed Whitfield Diffie on sight."
Access and General Info:
- First Year Published: 2001
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Crypto at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
20Guide to computer forensics and investigations
By Bill Nelson, Amelia Phillips, Frank Enfinger and Christopher Steuart

“Guide to computer forensics and investigations” Metadata:
- Title: ➤ Guide to computer forensics and investigations
- Authors: Bill NelsonAmelia PhillipsFrank EnfingerChristopher Steuart
- Language: English
- Number of Pages: Median: 693
- Publisher: ➤ Thomson Course Technology - Course Technology - Cengage Learning
- Publish Date: 2007 - 2008 - 2011 - 2015
- Publish Location: Boston, Mass
“Guide to computer forensics and investigations” Subjects and Themes:
- Subjects: ➤ Computer crimes - Investigation - Computer security - Data security & data encryption - Forensic Science - Computer Crime - Computer Data Security - Computers - Computers - Computer Security - Computer Books: General - Security - General - Computers / Security - Criminal investigation - Forensic sciences - Electronic evidence - Mobile device forensics - Informaticarecht - Criminalistiek - Computerbeveiliging - Law and legislation - Computer programs - Criminalité informatique - Enquêtes - Sécurité informatique - Logiciels - Preuve électronique - Computers & the internet - Networking
Edition Identifiers:
- The Open Library ID: OL28438254M - OL8465902M - OL28526723M - OL21894744M - OL20637523M
- Online Computer Library Center (OCLC) ID: 903192941 - 903667103
- Library of Congress Control Number (LCCN): 2008297931 - 2014958600
- All ISBNs: ➤ 1285060032 - 9781285060033 - 9781418067335 - 9781435498853 - 1418067334 - 1435498852
Access and General Info:
- First Year Published: 2007
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Guide to computer forensics and investigations at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
21Hack Attacks Denied
By John Chirillo

“Hack Attacks Denied” Metadata:
- Title: Hack Attacks Denied
- Author: John Chirillo
- Language: English
- Number of Pages: Median: 512
- Publisher: ➤ John Wiley & Sons - Wiley - John Wiley & Sons, Ltd.
- Publish Date: 2001 - 2002
- Publish Location: New York
“Hack Attacks Denied” Subjects and Themes:
- Subjects: ➤ Computer Technology - Computer networks - Computer security - Nonfiction - Security measures - Computer networks, security measures - Engineering and science, computer science and software development - Sécurité informatique - Réseaux d'ordinateurs - Sécurité - Mesures - COMPUTERS - Internet - Security - Networking - General - Computerbeveiliging - Hacking - Protocollen (informatica) - Veiligheidsmaatregelen - Mesures de sûreté - Sites Web - Systèmes informatiques
Edition Identifiers:
- The Open Library ID: OL24261121M - OL22456891M - OL7616961M - OL7613787M
- Online Computer Library Center (OCLC) ID: 45888785 - 49569583
- Library of Congress Control Number (LCCN): 2002727761 - 2001017829
- All ISBNs: ➤ 0471190519 - 9780471416258 - 9780471232834 - 0471232831 - 9780471190516 - 0471416258
First Setence:
"The purpose of this chapter is to introduce the techniques used to secure the most vuInerabIe ports from the list of well-known ports, which includes TCP and UDP services."
"Hack Attacks Revealed, Second Edition, the predecessor to this book, defined and described computer ports and their services, and explained what makes some of them potentially vulnerable."
Access and General Info:
- First Year Published: 2001
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Hack Attacks Denied at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
22Legal Regulations, Implications, and Issues Surrounding Digital Data
By Margaret Jackson and Marita Shelly

“Legal Regulations, Implications, and Issues Surrounding Digital Data” Metadata:
- Title: ➤ Legal Regulations, Implications, and Issues Surrounding Digital Data
- Authors: Margaret JacksonMarita Shelly
- Language: English
- Number of Pages: Median: 240
- Publisher: ➤ Information Science Reference - IGI Global
- Publish Date: 2020
“Legal Regulations, Implications, and Issues Surrounding Digital Data” Subjects and Themes:
- Subjects: ➤ Computer crimes - Information technology - Cyberbullying - Data protection - Blockchains (databases) - Privacy, right of - Law - Law and legislation - Criminal provisions - Security measures - Blockchains (Databases) - Right of Privacy - Technologie de l'information - Sécurité - Mesures - Wet-en regelgeving - Data-analyse - Computerbeveiliging
Edition Identifiers:
- The Open Library ID: OL28105316M - OL28104916M - OL28094724M - OL28105238M - OL28094723M
- Online Computer Library Center (OCLC) ID: 1125275411
- Library of Congress Control Number (LCCN): 2019048546
- All ISBNs: ➤ 1799831337 - 9781799831310 - 9781799831303 - 9781799831334 - 1799831310 - 1799831302 - 9781799853190 - 9781799831327 - 1799853195 - 1799831329
Access and General Info:
- First Year Published: 2020
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Legal Regulations, Implications, and Issues Surrounding Digital Data at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
23Enterprise security with EJB and CORBA
By Bret Hartman

“Enterprise security with EJB and CORBA” Metadata:
- Title: ➤ Enterprise security with EJB and CORBA
- Author: Bret Hartman
- Language: English
- Number of Pages: Median: 382
- Publisher: ➤ Wiley & Sons, Incorporated, John - J. Wiley & Sons
- Publish Date: 2001 - 2002 - 2007
- Publish Location: New York
“Enterprise security with EJB and CORBA” Subjects and Themes:
- Subjects: ➤ Business enterprises - CORBA (Computer architecture) - Computer networks - Electronic commerce - Java (Computer program language) - JavaBeans - Security measures - Computer security - Corba (computer architecture) - Commerce électronique - Sécurité - Mesures - Entreprises - Réseaux d'ordinateurs - Java (Langage de programmation) - CORBA (Architecture d'ordinateurs) - COMPUTERS - Internet - Security - Networking - General - Computerbeveiliging - E-commerce - Veiligheidsmaatregelen - Computernetwerken - Java (programmeertaal) - Corba - Composant JavaBeans
Edition Identifiers:
- The Open Library ID: OL15495231M - OL28950162M - OL39890308M - OL39905163M
- Online Computer Library Center (OCLC) ID: 46651505 - 48139652
- Library of Congress Control Number (LCCN): 2001017818
- All ISBNs: ➤ 0471150762 - 1280341297 - 9780471401315 - 9780470239124 - 0471401315 - 9780471150763 - 0470239123 - 9781280341298
Access and General Info:
- First Year Published: 2001
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Enterprise security with EJB and CORBA at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
24E-mail security
how to keep your electronic messages private
By Bruce Schneier

“E-mail security” Metadata:
- Title: E-mail security
- Author: Bruce Schneier
- Language: English
- Number of Pages: Median: 365
- Publisher: Wiley
- Publish Date: 1995
- Publish Location: New York
“E-mail security” Subjects and Themes:
- Subjects: ➤ Electronic mail systems - Elektronische post - Redes de computadores e tecnicas - PGP - Messageries électroniques - Computerbeveiliging - Systèmes informatiques - Sécurité informatique - Mesures de sûreté - Internet - Courrier électronique
Edition Identifiers:
- The Open Library ID: OL1107964M
- Library of Congress Control Number (LCCN): 94033251
- All ISBNs: 9780471053187 - 047105318X
Access and General Info:
- First Year Published: 1995
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find E-mail security at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
25Cyber Adversary Characterization
By Tom Parker, Marcus Sachs, Eric Shaw, Ed Stroz and Matthew G. Devost

“Cyber Adversary Characterization” Metadata:
- Title: ➤ Cyber Adversary Characterization
- Authors: Tom ParkerMarcus SachsEric ShawEd StrozMatthew G. Devost
- Language: English
- Number of Pages: Median: 356
- Publisher: Syngress
- Publish Date: 2004
“Cyber Adversary Characterization” Subjects and Themes:
- Subjects: ➤ Computer crimes - Crime prevention - Computer security - Computer networks - Security measures - COMPUTERS - Internet - Security - Networking - General - Computerbeveiliging - Computercriminaliteit
Edition Identifiers:
- The Open Library ID: OL8805341M
- All ISBNs: 1931836116 - 9781931836111
First Setence:
"When you picked this book from the shelf, chances are you did it for one of two reasons: from mere curiosity about the subject matter or because you felt that it will give you a better understanding of whom you are protecting your assets against and how y"
Access and General Info:
- First Year Published: 2004
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Cyber Adversary Characterization at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
26PC magazine fighting spyware, viruses, and malware
By Ed Tittel

“PC magazine fighting spyware, viruses, and malware” Metadata:
- Title: ➤ PC magazine fighting spyware, viruses, and malware
- Author: Ed Tittel
- Language: English
- Number of Pages: Median: 375
- Publisher: ➤ Wiley Pub. - Wiley - John Wiley & Sons
- Publish Date: 2004 - 2005
- Publish Location: Indianapolis, IN
“PC magazine fighting spyware, viruses, and malware” Subjects and Themes:
- Subjects: ➤ Computer viruses - Computer security - Spyware - Malware (Computer software) - Spyware (Computer software) - Computerbeveiliging - Computervirussen - Spyware (computer software) - Malware (computer software)
Edition Identifiers:
- The Open Library ID: OL8051687M - OL18395344M
- Online Computer Library Center (OCLC) ID: 56793814
- Library of Congress Control Number (LCCN): 2004024100
- All ISBNs: 0764577697 - 9780764577697
First Setence:
"To some extent, it's reasonable to view the Internet as "the ultimate jungle" of lore and story: deep, dark, and full of dangerous denizens."
Access and General Info:
- First Year Published: 2004
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find PC magazine fighting spyware, viruses, and malware at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
27Managing privacy
By H. Jeff Smith

“Managing privacy” Metadata:
- Title: Managing privacy
- Author: H. Jeff Smith
- Language: English
- Number of Pages: Median: 297
- Publisher: ➤ University of North Carolina Press
- Publish Date: 1994 - 2017
- Publish Location: Chapel Hill
“Managing privacy” Subjects and Themes:
- Subjects: ➤ Records - Computers - Right of Privacy - Access control - Personlichkeitsrecht - Computernetwerken - Computerbeveiliging - Datenschutz - Recht op privacy - Computers, access control - Privacy, right of
- Places: United States
Edition Identifiers:
- The Open Library ID: OL49782883M - OL1422904M
- Library of Congress Control Number (LCCN): 93033334
- All ISBNs: ➤ 0807821470 - 9780807844540 - 1469639890 - 0807844543 - 9781469639895 - 9780807821473
Access and General Info:
- First Year Published: 1994
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Managing privacy at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
28Information security management handbook
By Micki Krause Nozaki

“Information security management handbook” Metadata:
- Title: ➤ Information security management handbook
- Author: Micki Krause Nozaki
- Language: English
- Number of Pages: Median: 640
- Publisher: AUERBACH
- Publish Date: 2000
“Information security management handbook” Subjects and Themes:
- Subjects: ➤ Data security & data encryption - Reference works - Management Information Systems - Computer Data Security - Computers - Computers - General Information - Computer Books: General - Security - General - Reference - General - Information Management - Security - Computers / Security - Computer security - Data protection - Sécurité informatique - Protection de l'information (Informatique) - Computerbeveiliging - Databescherming - Informatietechnologie
Edition Identifiers:
- The Open Library ID: OL8258738M
- All ISBNs: 0849308003 - 9780849308000
Access and General Info:
- First Year Published: 2000
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Information security management handbook at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
29Internet security for business
By Carol A. Siegel

“Internet security for business” Metadata:
- Title: Internet security for business
- Author: Carol A. Siegel
- Language: English
- Number of Pages: Median: 452
- Publisher: Wiley
- Publish Date: 1996
- Publish Location: New York
“Internet security for business” Subjects and Themes:
- Subjects: ➤ World Wide Web - Computerbeveiliging - Electronic funds transfers - World wide web - Databescherming - Mesures de se cirite . - Computersicherheit - Business enterprises - Gestion - Internet - Informatique - Redes de computadores e tecnicas - Mesures de se curite . - Computer networks - Web - Monnaie e lectronique - Data encryption (Computer science) - Security measures - Computer security - Internet, security measures
Edition Identifiers:
- The Open Library ID: OL965988M
- Library of Congress Control Number (LCCN): 96002344
- All ISBNs: 9780471137528 - 0471137529
Access and General Info:
- First Year Published: 1996
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Internet security for business at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
30Mobile agents and security
By Giovanni Vigna

“Mobile agents and security” Metadata:
- Title: Mobile agents and security
- Author: Giovanni Vigna
- Language: English
- Number of Pages: Median: 256
- Publisher: ➤ Springer London, Limited - Springer
- Publish Date: 1998 - 2003
- Publish Location: New York - Berlin
“Mobile agents and security” Subjects and Themes:
- Subjects: ➤ Mobile agents (Computer software) - Computer security - Geheimschrift - Agents mobiles (logiciels) - Agents intelligents (logiciels) - Codage - Computerbeveiliging - Systèmes informatiques - Sécurité informatique - Mesures de sûreté - Agent mobile - Agentia - Computernetwerken - Authentification - Traitement réparti - Sécurité - Kryptologie - Mobiler Agent - Computer software - Computer science - Computer networks - Operating systems (Computers) - Data encryption (Computer science) - Artificial intelligence
Edition Identifiers:
- The Open Library ID: OL37229588M - OL374285M
- Online Computer Library Center (OCLC) ID: 39497922
- Library of Congress Control Number (LCCN): 98036069
- All ISBNs: 9783540647928 - 3540686711 - 9783540686712 - 3540647929
Access and General Info:
- First Year Published: 1998
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Mobile agents and security at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
31Computer security
By David K. Hsiao

“Computer security” Metadata:
- Title: Computer security
- Author: David K. Hsiao
- Language: English
- Number of Pages: Median: 299
- Publisher: Academic Press
- Publish Date: 1979
- Publish Location: New York
“Computer security” Subjects and Themes:
- Subjects: ➤ Computer security - Electronic data processing departments - Security measures - Surete - Computerbeveiliging - Computersicherheit - COMPUTER INFORMATION SECURITY - Sicherheitskontrolle - Controle - Centres de traitement de l'information - INFORMATION RETRIEVAL - Datenverarbeitung - DATA SYSTEMS - Acces - Mesures - Ordinateurs - MULTIPLE ACCESS - DATA STORAGE - Computers - Access control
Edition Identifiers:
- The Open Library ID: OL4410994M
- Online Computer Library Center (OCLC) ID: 4883723
- Library of Congress Control Number (LCCN): 79014503
- All ISBNs: 0123576504 - 9780123576507
Access and General Info:
- First Year Published: 1979
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Computer security at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
32Computer security
By European Symposium on Research in Computer Security (3rd 1994 Brighton, England)

“Computer security” Metadata:
- Title: Computer security
- Author: ➤ European Symposium on Research in Computer Security (3rd 1994 Brighton, England)
- Language: English
- Number of Pages: Median: 468
- Publisher: Springer-Verlag
- Publish Date: 1994
- Publish Location: Berlin - New York
“Computer security” Subjects and Themes:
- Subjects: ➤ Congresses - Computer security - Bases de données - Congrès - Sécurité - Mesures - Ordinateurs - Accès - Contrôle - Systèmes informatiques - Sécurité informatique - Computerbeveiliging - Computersicherheit - Kongress - Mesures de sûreté
Edition Identifiers:
- The Open Library ID: OL1112910M
- Online Computer Library Center (OCLC) ID: 31291146
- Library of Congress Control Number (LCCN): 94038794
- All ISBNs: 0387586180 - 9780387586182
Access and General Info:
- First Year Published: 1994
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Computer security at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
33Maximum security

“Maximum security” Metadata:
- Title: Maximum security
- Language: English
- Number of Pages: Median: 885
- Publisher: Sams.net
- Publish Date: 1997
- Publish Location: Indianapolis, Ind
“Maximum security” Subjects and Themes:
- Subjects: ➤ Computernetwerken - Computer security - Internet - Computer networks - Computerbeveiliging - Security measures
Edition Identifiers:
- The Open Library ID: OL1017670M
- Library of Congress Control Number (LCCN): 96071997
- All ISBNs: 9781575212685 - 1575212684
Access and General Info:
- First Year Published: 1997
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Maximum security at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
34Computer safety, reliability and security
By SAFECOMP 2001 (2001 Budapest, Hungary)

“Computer safety, reliability and security” Metadata:
- Title: ➤ Computer safety, reliability and security
- Author: ➤ SAFECOMP 2001 (2001 Budapest, Hungary)
- Language: English
- Number of Pages: Median: 248
- Publisher: Springer
- Publish Date: 2001
- Publish Location: Berlin - New York
“Computer safety, reliability and security” Subjects and Themes:
- Subjects: ➤ Congresses - Reliability - Electronic digital computers - Computer security - Industrial safety - Computer software - Securite informatique - Logiciels - Mensch-Maschine-Kommunikation - Computerbeveiliging - Technische Sicherheit - Systemes informatiques - Congres - Fiabilite - Securite du travail - Formale Methode - Mesures de surete - Kongress - Softwareentwicklung - Zuverlassigkeit - Ordinateurs - Systementwicklung - Computer software, reliability - Electronic digital computers, reliability
Edition Identifiers:
- The Open Library ID: OL15512530M
- Online Computer Library Center (OCLC) ID: 48013791
- Library of Congress Control Number (LCCN): 2001049763
- All ISBNs: 9783540426073 - 3540426078
Access and General Info:
- First Year Published: 2001
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Computer safety, reliability and security at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
35Firewalls complete
By Marcus Gonçalves

“Firewalls complete” Metadata:
- Title: Firewalls complete
- Author: Marcus Gonçalves
- Language: English
- Number of Pages: Median: 632
- Publisher: McGraw-Hill
- Publish Date: 1998
- Publish Location: New York
“Firewalls complete” Subjects and Themes:
- Subjects: ➤ Firewalls (Computer security) - Coupe-feu (Sécurité informatique) - COMPUTERS - Internet - Security - Networking - General - Coupe-feu (Securite informatique) - Client/server - Computerbeveiliging - Firewall - Programm - Redes e comunicação de dados - Gerência de redes
Edition Identifiers:
- The Open Library ID: OL698463M
- Online Computer Library Center (OCLC) ID: 42854637
- Library of Congress Control Number (LCCN): 97046058
- All ISBNs: 0070246459 - 9780070246454
Access and General Info:
- First Year Published: 1998
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Firewalls complete at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
36Computer security and industrial cryptography
By Bart Preneel

“Computer security and industrial cryptography” Metadata:
- Title: ➤ Computer security and industrial cryptography
- Author: Bart Preneel
- Language: English
- Number of Pages: Median: 275
- Publisher: Springer
- Publish Date: 1993
“Computer security and industrial cryptography” Subjects and Themes:
- Subjects: ➤ Geheimschrift - Sécurité ordinateur - Cryptographie - Cryptography - Authentification - Computerbeveiliging - Systèmes informatiques - Computersicherheit - Signature numérique - Sécurité informatique - Computer security - Mesures de sûreté - Kryptologie
- Places: Löwen <1991>
Edition Identifiers:
- The Open Library ID: OL12776842M
- Library of Congress Control Number (LCCN): 93032467
- All ISBNs: 3540573410 - 9783540573418
Access and General Info:
- First Year Published: 1993
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Computer security and industrial cryptography at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
37Public Key Infrastructure
By John R Vacca

“Public Key Infrastructure” Metadata:
- Title: Public Key Infrastructure
- Author: John R Vacca
- Language: English
- Publisher: Taylor and Francis
- Publish Date: 2004
- Publish Location: London
“Public Key Infrastructure” Subjects and Themes:
- Subjects: ➤ Computer Technology - Nonfiction - Computer security - Computer networks - Security measures - Public key infrastructure (Computer security) - Web services - Computer Security - Sécurité informatique - Réseaux d'ordinateurs - Sécurité - Mesures - Infrastructure à clé publique (Sécurité informatique) - Services Web - COMPUTERS - Internet - Security - Networking - General - Computerbeveiliging - Computernetwerken
Edition Identifiers:
- The Open Library ID: OL24304694M
- Online Computer Library Center (OCLC) ID: 85823689
- All ISBNs: 0203498151 - 9780203498156
Access and General Info:
- First Year Published: 2004
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Public Key Infrastructure at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
38Distributed Data Warehousing Using Web Technology
By R. A. Moeller

“Distributed Data Warehousing Using Web Technology” Metadata:
- Title: ➤ Distributed Data Warehousing Using Web Technology
- Author: R. A. Moeller
- Language: English
- Number of Pages: Median: 383
- Publisher: AMACOM
- Publish Date: 2000
“Distributed Data Warehousing Using Web Technology” Subjects and Themes:
- Subjects: ➤ Web databases - Data warehousing - Distributed databases - Electronic data processing - Distributed processing - World Wide Web - Internet - Entrepôts de données (Informatique) - Traitement réparti - Web - BUSINESS & ECONOMICS - Information Management - Knowledge Capital - Databanken - Dataprocessing - World wide web - Computerbeveiliging
Edition Identifiers:
- The Open Library ID: OL11353442M
- Online Computer Library Center (OCLC) ID: 49569085
- Library of Congress Control Number (LCCN): 00038984
- All ISBNs: 0814405886 - 9780814405888
Access and General Info:
- First Year Published: 2000
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Distributed Data Warehousing Using Web Technology at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
39Introduction to modern cryptography
By Jonathan Katz and Yehuda Lindell

“Introduction to modern cryptography” Metadata:
- Title: ➤ Introduction to modern cryptography
- Authors: Jonathan KatzYehuda Lindell
- Language: English
- Number of Pages: Median: 603
- Publisher: ➤ Taylor & Francis Group - CRC Press/Taylor & Francis - CRC Press LLC - CRC PRESS - CRC Press - Chapman and Hall/CRC - Chapman & Hall/CRC
- Publish Date: ➤ 2007 - 2008 - 2012 - 2014 - 2015 - 2020 - 2025
- Publish Location: Boca Raton
“Introduction to modern cryptography” Subjects and Themes:
- Subjects: ➤ Computer security - Cryptography - Data security & data encryption - Privacy & data protection - Computers - Computers - Computer Security - Computer Books: General - Security - General - Computers / Security - Combinatorics - Operating Systems - General - COMPUTERS / Operating Systems / General - COMPUTERS / Security / Cryptography - MATHEMATICS / Combinatorics - Sécurité informatique - Cryptographie - COMPUTERS / Cryptography - MATHEMATICS / General - Kryptologie - Computersicherheit - Datensicherung - Cryptografie - Databescherming - Computerbeveiliging - 0 Gesamtdarstellung - IT-säkerhet - Datakryptering - Operating Systems - General - Security - MATHEMATICS - Qa76.9.a25 k36 2015 - 005.8/2 - Com046000 com083000 mat036000 - Professional, career & trade -> computer science -> operating systems - Mathematics & statistics -> post-calculus -> combinatorics - Professional, career & trade -> computer science -> security - Scec3530 - Scma103020 - Scma105010 - Mathematics & statistics -> mathematics -> mathematics general - Qa76.9.a25 k36 2008 - 005.8
Edition Identifiers:
- The Open Library ID: ➤ OL57739808M - OL34636216M - OL33828933M - OL33828932M - OL33828930M - OL33828909M - OL33663114M - OL33542196M - OL33504012M - OL33412277M - OL26384970M - OL17256842M - OL29251749M - OL12313732M - OL17907388M
- Online Computer Library Center (OCLC) ID: 1202866342 - 137325053 - 893721520 - 1233181213
- Library of Congress Control Number (LCCN): 2014039042 - 2007017861 - 2024061363
- All ISBNs: ➤ 1351133020 - 0815354363 - 9781466570276 - 9781351133005 - 1584885513 - 9781466542839 - 9781351133012 - 9781032496795 - 1351133039 - 9781420010756 - 1032496797 - 1466570261 - 146657027X - 9780429101489 - 1351133004 - 1466570288 - 9781466570283 - 9781584885511 - 1351133012 - 9780815354369 - 0429101481 - 9781466570269 - 9781351133036 - 1466542837 - 1420010751 - 9781351133029
Author's Alternative Names:
"Jonathan Katz,Moti Yung"Access and General Info:
- First Year Published: 2007
- Is Full Text Available: Yes
- Is The Book Public: Yes
- Access Status: Public
Online Access
Online Borrowing:
- Borrowing from Open Library: Borrowing link
- Borrowing from Archive.org: Borrowing link
Online Marketplaces
Find Introduction to modern cryptography at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.