Skip to content
Toggle navigation
VuFind
0
Items in e-Shelf
(Full)
History
User Account
Logout
User Account
Help
English
Deutsch
Books & more
Articles & more
JuSER
All Fields
Title
Journal Title
Name
Institution
Subject
Classification
Shelf Classification
Table of Contents
DOI
ISBN/ISSN
Call number
Report Number
Barcode
Full Texts (available in selection)
Find
Advanced
Reset Filters
Computer networks
Reset Filters
Show filters (1)
Computer networks
Ask a Librarian
Books & more
: Hits
141 - 160
of
346
sort by
Relevance
Year (descending)
Year (ascending)
Call Number
Author
Title
Select all titles on this page
Email
Export
Print
Save
Add to e-Shelf
Select result number 141
141
E-Book
Security risk management : building an information security risk management program from the ground up [E-Book] /
Wheeler, Evan.
2011
Full text
Favorites
Saved in:
QR Code
Select result number 142
142
E-Book
Divining a digital future : mess and mythology in ubiquitous computing [E-Book] /
Dourish, Paul.
2011
Full text
Favorites
Saved in:
QR Code
Select result number 143
143
E-Book
Building successful online communities : evidence-based social design [E-Book] /
Kraut, Robert E.
2011
Full text
Favorites
Saved in:
QR Code
Select result number 144
144
E-Book
Internet of things : global technological and societal trends [E-Book] /
Vermesan, Ovidiu
2011
Full text
Favorites
Saved in:
QR Code
Select result number 145
145
E-Book
Computer Forensics jumpstart / [E-Book]
Solomon, Michael R.
2011
Full text
Favorites
Saved in:
QR Code
Select result number 146
146
E-Book
CompTIA security+ deluxe study guide / [E-Book]
Dulaney, Emmett A.
2011
Full text
Favorites
Saved in:
QR Code
Select result number 147
147
E-Book
PCI DSS : a practical guide to implementing and maintaining compliance [E-Book] /
Wright, Steve.
2011
Full text
Favorites
Saved in:
QR Code
Select result number 148
148
E-Book
Securing the cloud : cloud computer security techniques and tactics [E-Book] /
Winkler, J. R.
2011
Full text
Favorites
Saved in:
QR Code
Select result number 149
149
E-Book
Zenoss core 3.x network and system monitoring : a step-by-step guide to configuring, using, and adapting this free Open Source network monitoring system [E-Book] /
Badger, Michael
2011
Full text
Favorites
Saved in:
QR Code
Select result number 150
150
E-Book
Use of risk analysis in computer-aided persuasion [E-Book]/
Duman, Ekrem
2011
Full text
Favorites
Saved in:
QR Code
Select result number 151
151
E-Book
Zabbix 1.8 network monitoring : monitor your network's hardware, servers, and Web performance effectively and efficiently [E-Book] /
Olups, Rihards.
2010
Full text
Favorites
Saved in:
QR Code
Select result number 152
152
E-Book
Security in ad hoc and sensor networks / [E-Book]
Beyah, Raheem
2010
Full text
Favorites
Saved in:
QR Code
Select result number 153
153
E-Book
China's cyberwarfare capability / [E-Book]
Marvel, Elisabette M.
2010
Full text
Favorites
Saved in:
QR Code
Select result number 154
154
E-Book
Managing information security / [E-Book]
Vacca, John R.
2010
Full text
Favorites
Saved in:
QR Code
Select result number 155
155
E-Book
Proceedings of the 2009 International Conference on Computer and Network Technology, Chennai, India, 24-26 July 2009 / [E-Book]
Mahadevan, V.
2010
Full text
Favorites
Saved in:
QR Code
Select result number 156
156
E-Book
Mac security bible / [E-Book]
Kissell, Joe.
2010
Full text
Favorites
Saved in:
QR Code
Select result number 157
157
E-Book
CEH : certified ethical hacker study guide [E-Book] /
Graves, Kimberly
2010
Full text
Favorites
Saved in:
QR Code
Select result number 158
158
E-Book
IT audit, control, and security / [E-Book]
Moeller, Robert R.
2010
Full text
Favorites
Saved in:
QR Code
Select result number 159
159
E-Book
Dot com mantra : social computing in the Central Himalayas [E-Book] /
Arora, Payal
2010
Full text
Favorites
Saved in:
QR Code
Select result number 160
160
E-Book
CCNA certification all-in-one for dummies / [E-Book]
Angelescu, Silviu
2010
Full text
Favorites
Saved in:
QR Code
Select all titles on this page
Email
Export
Print
Save
Add to e-Shelf
[1]
Prev
3
4
5
6
7
8
9
10
11
12
13
Next
[18]
/* Narrow Search Options */ ?>
Back
Narrow Search Results
Available as
Electronic Edition
346
Material Type
Book
346
Type of Literature
Handbook, Textbook
13
Conference Publication
10
Year of Publication
From:
To:
Location
ZB
346
Name
Lammle, Todd.
5
Vacca, John R.
5
Catura-Houser, Tim.
4
Lin, Herbert.
4
O'Boyle, Helen.
4
Shimonski, Robert.
4
more ...
Cross, Michael.
3
Dohi, Tadashi.
3
Foster, James C.
3
Gregg, Michael
3
Hunter, Laura E.
3
Khnaser, Elias N.
3
Shinder, Debra Littlejohn.
3
Shinder, Thomas W.
3
Simpson, Patrick.
3
Stewart, James Michael.
3
Yun, Won Young.
3
Bayer, Chad M.
2
Beale, Jay.
2
Brock-Soldavini, Jada.
2
Burnett, Mark
2
Bücker, Axel.
2
Canavan, Tom.
2
Chandramouli, Ramaswamy.
2
Chapple, Mike.
2
Chellis, James.
2
Erickson, Jon
2
Ferraiolo, David.
2
Gibson, Darril.
2
Grasdal, Martin.
2
see all ...
less ...
Subject
Computer networks
Computer security.
77
Electronic data processing personnel
33
Computer security
32
Internet
23
Firewalls (Computer security)
12
more ...
Information technology
12
Computer crimes
11
Computer hackers.
11
Computers
11
Computer network protocols.
9
Penetration testing (Computer security)
9
Client/server computing.
8
Cyberspace
8
Cyberterrorism
8
Microsoft software
8
Wireless communication systems
8
Electronic data processing
7
Telecommunication
7
Web sites
7
Data encryption (Computer science)
6
Data protection.
5
Business enterprises
4
Information warfare
4
Network performance (Telecommunication)
4
Operating systems (Computers)
4
Reliability (Engineering)
4
World Wide Web
4
Application software
3
Client/server computing
3
see all ...
less ...
Language
English
345
German
1
/* End Narrow Search Options */ ?>
×
Loading...