Last searches
Results for *
Displaying results 26 to 50 of 92.
-
Stealing the network
how to own the box -
Zero day exploit
countdown to darkness -
Digital fortress
-
Human Aspects of IT for the Aged Population. Applications in Health, Assistance, and Entertainment
4th International Conference, ITAP 2018, Held as Part of HCI International 2018, Las Vegas, NV, USA, July 15–20, 2018, Proceedings, Part II -
Enterprise Java security
building secure J2EE applications -
Vulnerability management
-
Core security patterns
best practices and strategies for J2EE, web services and identity management -
Core security patterns
best practices and strategies for J2EE, web services and identity management -
Futureproof
security aesthetics and the management of life -
Information warfare in business
strategies of control and resistance in the network society -
Collaboration with cloud computing
security, social media, and unified communications -
IT audit, control, and security
-
IT audit, control, and security
-
Zero day exploit
countdown to darkness -
Stealing the network
how to own a shadow -
Information warfare in business
strategies of control and resistance in the network society -
Implementing the OECD "privacy guidelines" in the electronic environment
focus on the Internet -
Core security patterns
best practices and strategies for J2EE(TM), Web services, and identity management -
Collaboration with cloud computing
security, social media, and unified communications -
Stealing the network
the complete series collector's edition -
Visualization of time-oriented data
-
Futureproof
security aesthetics and the management of life -
La fortaleza digital
-
Understanding new security threats
-
J2EE security for servlets, EJBs and web services
applying theory and standards to practice