Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks
- Computer science 3,009
- Artificial intelligence 2,087
- Information storage and retrieval systems 1,660
- Security measures 1,586
- Software engineering 1,497
- Application software 1,102
- Computer engineering 992
- Computer security 925
- Computer software 848
- Data encryption (Computer science) 828
- Data protection 804
- Computers 626
- Computer vision 561
- Telecommunication 552
- Management 491
- Database management 479
- Data mining 416
- Data structures (Computer science) 409
- Operating systems (Computers) 374
- Information theory 337
- Computers, Special purpose 312
- Examinations 311
- Information technology 305
- Computer network architectures 297
- Engineering 295
- Business enterprises 291
- Electrical engineering 283
- Data processing 281
- Computer systems 277
-
1
-
2
ISO 27001 ISMS Foundation Training Course. produced by IT Governance Publishing.
Published 2018Full text (Wentworth users only)
Electronic Video -
3
What are the new risks in ransomware? / produced by Wall Street Journal.
Published 2020Full text (Wentworth users only)
Electronic Video -
4
ISO 27001 ISMS Foundation Training Course. produced by IT Governance Publishing.
Published 2018Full text (Wentworth users only)
Electronic Video -
5
ISO 27001 ISMS Foundation Training Course. produced by IT Governance Publishing.
Published 2018Full text (Wentworth users only)
Electronic Video -
6
ISO 27001 ISMS Foundation Training Course. produced by IT Governance Publishing.
Published 2018Full text (Wentworth users only)
Electronic Video -
7
Nokia network security : solutions handbook / Doug Maxwell, Cherie Amon.
Published 2002Full text (Wentworth users only)
Electronic eBook -
8
-
9
Advanced reliability modeling : part II / guest editors, Tadashi Dohi, Naoto Kaio and Won Young Yun.
Published 2006Full text (Wentworth users only)
Electronic eBook -
10
-
11
Metasploit Penetration Testing Cookbook.
Published 2012Full text (Wentworth users only)
Electronic eBook -
12
Hacking point of sale : payment application secrets, threats, and solutions / Slava Gomzin.
Published 2014Full text (Wentworth users only)
Electronic eBook -
13
Threat modeling : designing for security / Adam Shostack.
Published 2014Full text (Wentworth users only)
Electronic eBook -
14
Mastering System Center 2012 Operations Manager / Bob Cornelissen [and others].
Published 2013Full text (Wentworth users only)
Electronic eBook -
15
Trust and Security in Collaborative Computing.
Published 2008Full text (Wentworth users only)
Electronic eBook -
16
Next generation intelligent networks / Johan Zuidweg.
Published 2002Full text (Wentworth users only)
Electronic eBook -
17
-
18
Joint Optimization of Maintenance and Production Policies.
Published 2014Full text (Wentworth users only)
Electronic eBook -
19
The war on learning : gaining ground in the digital university / Elizabeth Losh.
Published 2014Full text (Wentworth users only)
Electronic eBook -
20