Books on the topic 'Computer networks Computers Computer security'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 books for your research on the topic 'Computer networks Computers Computer security.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse books on a wide variety of disciplines and organise your bibliography correctly.
Computer security fundamentals. 2nd ed. Indianapolis, Ind: Pearson IT Certification, 2012.
Find full textJustin, Clarke, ed. Network security tools. Sebastopol, Calif: O'Reilly Media, 2005.
Find full textComputer security fundamentals. Upper Saddle River, N.J: Pearson Prentice Hall, 2006.
Find full textPer, Christoffersson, ed. Security mechanisms for computer networks. Chichester, West Sussex, England: Ellis Horwood, 1989.
Find full textVacca, John R. Computer forensics: Computer crime scene investigation. 3rd ed. Sudbury, Mass: Jones and Bartlett Publishers, 2010.
Find full textRaouf, Boutaba, ed. Intrusion detection networks: A key to collaborative security. Boca Raton, [Florida]: Taylor & Francis/CRC, 2014.
Find full textR, Panko Raymond, ed. Corporate computer security. 3rd ed. Boston: Prentice Hall, 2013.
Find full textBrenton, Chris. Mastering network security. 2nd ed. San Francisco, Calif: SYBEX, 2003.
Find full textThermos, Peter. Securing VoIP networks: Threats, vulnerabilities, and countermeasures. Boston, MA: Addison-Wesley, 2007.
Find full textAri, Takanen, ed. Securing VoIP networks: Threats, vulnerabilities, and countermeasures. Upper Saddle River, NJ: Addison-Wesley, 2008.
Find full textMcNab, Chris. Network security assessment. 2nd ed. Beijing: O'Reilly Media, Inc., 2008.
Find full textMcNab, Chris. Network security assessment. 2nd ed. Beijing: O'Reilly Media, Inc., 2008.
Find full textMcNab, Chris. Network security assessment. 2nd ed. Beijing: O'Reilly Media, Inc., 2008.
Find full textBrenton, Chris. MasteringNetwork Security. New York: John Wiley & Sons, Ltd., 2006.
Find full textComputer forensics: Computer crime scene investigation. 2nd ed. Hingham, Mass: Charles River Media, 2005.
Find full textAbrams, Marshall D. Tutorial computer and network security. Washington, D.C: IEEE Computer Society Press, 1987.
Find full textBrian, Hatch, ed. Building Linux Virtual Private Networks (VPNs). Indianapolis, Ind: New Riders, 2002.
Find full textA, Fisch Eric, and Pooch Udo W. 1944-, eds. Computer system and network security. Boca Raton: CRC Press, 1996.
Find full textComputer forensics: Computer crime scene investigation. Hingham, Mass: Charles River Media, 2002.
Find full textGreg, Kellogg, ed. Security monitoring with Cisco security MARS. Indianapolis, Ind: Cisco Press, 2007.
Find full textEdward, Witzke, ed. Implementing security for ATM networks. Boston: Artech House, 2002.
Find full textWilliam, Stallings. Computer security: Principles and practice. Upper Saddle River, N.J: Prentice Hall, 2008.
Find full textHiroshi, Yoshiura, ed. Advances in information and computer security: First International Workshop on Security, IWSEC 2006, Kyoto, Japan, October 23-24, 2006 : proceedings. Berlin: Springer, 2006.
Find full textservice), SpringerLink (Online, ed. Guide to Computer Network Security. 2nd ed. London: Springer London, 2013.
Find full textF, Hempelmann Christian, Raskin Victor, and Association for Computing Machinery. Special Interest Group on Security, Audit, and Control., eds. New Security Paradigms Workshop: Proceedings, September 23-26, 2002, Virginia Beach, VA. New York, N.Y: Association for Computing Machinery, 2002.
Find full textE, Silverman Richard, and Byrnes Robert G, eds. Linux Security Cookbook. Beijing: O'Reilly, 2003.
Find full textDebbabi, Mourad. Embedded Java security: Security for mobile devices. London: Springer, 2010.
Find full textBrown, Lawrie, and William Stallings. Computer Security. Pearson Education, Limited, 2018.
Find full textRak, Jacek, Krzysztof Szczypiorski, Igor Kotenko, John Bay, Leonard Popyack, and Victor Skormin. Computer Network Security. Springer, 2017.
Find full textIrwin, J. David, and Chwan-Hwa (John) Wu. Introduction to Computer Networks and Cybersecurity. Taylor & Francis Group, 2016.
Find full textIrwin, J. David, and Chwan-Hwa (John) Wu. Introduction to Computer Networks and Cybersecurity. Taylor & Francis Group, 2016.
Find full textIrwin, J. David, and Chwan-Hwa (John) Wu. Introduction to Computer Networks and Cybersecurity. Taylor & Francis Group, 2017.
Find full textIntroduction to Computer Networks and Cybersecurity. Taylor & Francis Group, 2013.
Find full textMerkow, Mark S., and Jim Breithaupt. Computer Security Assurance. Cengage Delmar Learning, 2004.
Find full textII, William (Chuck) Easttom. Computer Security Fundamentals. Pearson Education, Limited, 2019.
Find full textWilma, Caldwell, ed. Computer security sourcebook. Detroit, MI: Omnigraphics, 2003.
Find full textEasttom, William (Chuck) II. Computer Security Fundamentals. Pearson Education, Limited, 2013.
Find full text1961-, Hopkins Ronald D., and Tokere Wesley P, eds. Computer security: Intrusion, detection, and prevention. Hauppauge, NY: Nova Science Publishers, 2009.
Find full textDhanjani, Nitesh, and Justin Clarke. Network Security Tools: Writing, Hacking, and Modifying Security Tools. O'Reilly Media, Inc., 2005.
Find full textZeltser, Lenny, Scott Winters, Ronald W. Ritchey, Karen Fredrick, and Stephen Northcutt. Inside Network Perimeter Security: The Definitive Guide to Firewalls, Virtual Private Networks (VPNs), Routers, and Intrusion Detection Systems. Sams, 2002.
Find full textKrutz, Ronald L., James Conley, and Eric Cole. Network Security Bible. Wiley, 2005.
Find full text