Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks
- Data encryption (Computer science)
- Computer science 539
- Information storage and retrieval systems 397
- Data protection 374
- Computer software 249
- Security measures 167
- Cryptography 160
- Data structures (Computer science) 121
- Coding theory 119
- Application software 107
- Computer security 106
- Software engineering 103
- Operating systems (Computers) 95
- Computational complexity 79
- Computer engineering 62
- Information theory 59
- Computers 57
- Computer network architectures 46
- Artificial intelligence 34
- Computer networks—Security measures 33
- Database management 27
- Telecommunication 27
- Computer systems 26
- Access control 25
- Web sites 23
- Computer architecture 14
- Computer system performance 14
- Computer vision 13
- Computers, Special purpose 13
-
1
Hacking point of sale : payment application secrets, threats, and solutions / Slava Gomzin.
Published 2014Full text (Wentworth users only)
Electronic eBook -
2
-
3
Implementing SSL/TLS using cryptography and PKI / Joshua Davies.
Published 2011Full text (Wentworth users only)
Electronic eBook -
4
Security : secrets, intruders and ID tags.
Published 2003Full text (Wentworth users only)
Electronic eBook -
5
Rebuilding trust between Silicon Valley and Washington / Adam Segal.
Published 2017Full text (Wentworth users only)
Electronic eBook -
6
Implementing SSH : strategies for optimizing the Secure Shell / Himanshu Dwivedi.
Published 2004Full text (Wentworth users only)
Electronic eBook -
7
ExamWise for CIW security professional : exam 1D0-470 / Chad M. Bayer.
Published 2003Full text (Wentworth users only)
Electronic eBook -
8
-
9
Security, Privacy and Reliability in Computer Communications and Networks
Published 2017Full text (Wentworth users only)
Electronic eBook -
10
-
11
Outsourcing information security / C. Warren Axelrod.
Published 2004Full text (Wentworth users only)
Electronic eBook -
12
-
13
-
14
-
15
Trusted Execution Environments by Carlton Shepherd, Konstantinos Markantonakis.
Published 2024Full text (Wentworth users only)
Electronic eBook -
16
-
17
-
18
Cryptography and network security / S. Bose, P. Vijayakumar.
Published 2017Full text (Wentworth users only)
Electronic eBook -
19
Use HashiCorp Vault to manage access to your secrets / Prachi Jain.
Published 2024Full text (Wentworth users only)
Electronic eBook -
20
Manage machine access to secrets with AppRole in HashiCorp Vault / Prachi Jain.
Published 2024Full text (Wentworth users only)
Electronic eBook