註記  
Computer networks -- Security measures -- Developing countries : Zoughbi, Saleem,   
      Securing government information and data in developing countries [electronic resource] / Saleem Zough 網際網路  2017
Computer networks -- Security measures -- Dictionaries  
      The information security dictionary [electronic resource] : defining the terms that define security f 網際網路  c2004
      Internet security dictionary / Vir V. Phoha 林口分館密集書庫  c2002
      Internet security dictionary [electronic resource] / Vir V. Phoha 網際網路  c2002
Computer networks -- Security measures -- Economic aspects -- India : Parker, Philip M   
      Information security (IS) equipment and services in India [electronic resource] : a strategic referen 網際網路  c2007
Computer networks -- Security measures -- European Union countries  
      Privacy, data protection and cybersecurity in Europe / edited by Wolf J. Schunemann, Max-Otto Baumann 網際網路  2017
      Security and privacy in the Internet of things [electronic resource] : challenges and solutions / edi 網際網路  2020
Computer networks -- Security measures -- Evaluation : Singh, Abhishek   
      Vulnerability Analysis and Defense for the Internet [electronic resource] / edited by Abhishek Singh, 網際網路  2008
Computer networks -- Security measures -- Examinations -- Study guides  
      70 tips and tricks for mastering the CISSP exam / by R. Sarma Danturthi 網際網路  2020
      Aws certified cloud practitioner study guide [electronic resource] : clf-c01 exam / Ben Piper, David 網際網路  c2019
      The CEH prep guide : the comprehensive guide to certified ethical hacking / Ronald L. Krutz, Russell 總館  c2008
      Certified Ethical Hacker (CEH) preparation guide : lesson-based review of ethical hacking and penetra 網際網路  2021
10 其他項目  
Computer networks -- Security measures. : Oxley, Alan   
      Security risks in social media technologies [electronic resource]: safe practices in public service 網際網路  2013
Computer networks -- Security measures.  
      Advanced persistent security [electronic resource] : a cyberwarfare approach to implementing adaptive 網際網路  2017
      Computer and information security handbook [electronic resource] / edited by John R. Vacca 網際網路  2017
      Cyber guerilla [electronic resource] / Jelle van Haaster, Rickey Gevers, Martijn Sprengers 網際網路  2016
      Data breach preparation and response [electronic resource] : breaches are certain, impact is not / Ke 網際網路  2016
3 其他項目  
Computer networks -- Security measures -- Forecasting : Warren, Paul   
      ICT futures [electronic resource] : delivering pervasive, real-time and secure services / edited by P 網際網路  c2008
Computer networks -- Security measures -- Government policy  
      Cybersecurity [electronic resource] : public sector threats and responses / [edited by] Kim J. Andrea 網際網路  c2012
      The quest to cyber superiority : cybersecurity regulations, frameworks, and strategies of major econo 網際網路  2016
Computer networks -- Security measures -- Handbooks, manuals, etc  
      The antivirus hacker's handbook [electronic resource] / Joxean Koret, Elias Bachaalany 網際網路  c2015
      Cyber warfare [electronic resource] : techniques, tactics and tools for security practitioners / Jaso 網際網路  c2011
      Cyber warfare [electronic resource] : techniques, tactics and tools for security practitioners / Jaso 網際網路  2014
      GFI network security and PCI compliance power tools [electronic resource] / Brien Posey ; Troy Thomps 網際網路  c2009
2 其他項目  
Computer networks -- Security measures -- Computer programs. : Tari, Zahir,   
      Data exfiltration threats and prevention techniques : machine learning and memory-based data security 網際網路  2023
no.

Go to Top