Showing 1 - 20 results of 2,956 for search '', query time: 0.10s Refine Results
  1. 1

    Cyberterrorism is the nation's critical infrastructure adequately protected? : hearing before the Subcommittee on Government Efficiency, Financial Management and Intergovernmental...

    Washington : U.S. G.P.O. : For sale by the Supt. of Docs., U.S. G.P.O. [Congressional Sales Office], 2003
    Format: Government Document Book


  2. 2
  3. 3

    Information security applications : 4th International Workshop, WISA 2003, Jeju Island, Korea, August 25-27, 2003 : revised papers

    New York : Springer-Verlag, 2004
    Format: Electronic Conference Proceeding eBook
  4. 4
  5. 5

    Informed P2P User Act : report (to accompany H.R. 1319) (including cost estimate of the Congressional Budget Office).

    [Washington, D.C.] : [U.S. G.P.O.], 2009
    Format: Government Document Book


  6. 6

    Your personal netspy : how you can access the facts and cover your tracks : using the Internet and online services.

    New York : Wolff New Media, 1996
    Format: Book


  7. 7

    Net Force attack protocol by Preisler, Jerome, Clancy, Tom, 1947-2013, Pieczenik, Steve R.

    [Don Mills, Ontario, Canada] : Harlequin Audio, 2020
    Unabridged.
    Format: Audio


  8. 8

    Myths and realities of cyber warfare : conflict in the digital realm by Sambaluk, Nicholas Michael

    Santa Barbara, California : Praeger, 2020
    Format: Book


  9. 9

    Protecting our nation's cyber space : educational awareness for the cyber citizen : hearing before the Subcommittee on Technology, Information Policy, Intergovernmental Relations,...

    Washington :; Washington : U.S. G.P.O. : For sale by the Supt. of Docs., U.S. G.P.O., 2004
    Format: Government Document eBook
  10. 10

    Complying with the CAN-SPAM Act and other critical business issues : staying out of trouble

    New York, NY : Practising Law Institute, 2004
    Format: Book


  11. 11

    Computer security

    Princeton, NJ : Films for the Humanities & Sciences, 2001
    Format: DVD


  12. 12

    Black hat Python : Python programming for hackers and pentesters by Seitz, Justin

    San Francisco : No Starch Press, 2015
    Format: Book


  13. 13

    Risky business : protect your business from being stalked, conned, or blackmailed on the Web by Janal, Daniel S.

    New York : Wiley, 1998
    Format: Book


  14. 14

    [Internal control weaknesses in Army safeguarding of computer equipment]

    Washington, D.C. : [Gaithersburg, Md.] (P.O. Box 6015, Gaithersburg 20884-6015) : The Office ; The Office [distributor], 1992
    Format: Government Document Book


  15. 15

    Innocent code : a security wake-up call for Web programmers by Huseby, Sverre H.

    New York : John Wiley & Sons, 2004
    Format: Book


  16. 16

    Black hats : misfits, criminals, and scammers in the Internet age by Biggs, John, 1975-

    Berkeley, CA : New York : Apress ; Distributed to the Book trade in the U.S. by Springer-Verlag, 2004
    Format: Book


  17. 17

    Guidelines to federal organizations on security assurance and acquisition/use of tested/evaluated products recommendations of the National Institute of Standards and Technology by Roback, Edward

    Gaithersburg, Md. : U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 2000
    Format: Government Document Book


  18. 18

    You've got mail, but is it secure? an examination of Internet vulnerabilities affecting businesses, governments and homes : hearing before the Committee on Government Reform, House...

    Washington : U.S. G.P.O. : For sale by the Supt. of Docs., U.S. G.P.O., 2004
    Format: Government Document Book


  19. 19

    CEH v11 certified ethical hacker : study guide by Messier, Ric

    Format: Book


  20. 20

    Hacking exposed 7 : network security secrets & solutions by McClure, Stuart

    New York : McGraw-Hill, 2012
    Format: Book