Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks
- Data protection
- Computer science 387
- Data encryption (Computer science) 374
- Information storage and retrieval systems 285
- Security measures 242
- Computer software 164
- Computer security 129
- Computer engineering 106
- Information technology 104
- Software engineering 101
- Cryptography 100
- Application software 98
- Management 94
- Artificial intelligence 84
- Data structures (Computer science) 69
- Computers 54
- Computational complexity 53
- Coding theory 43
- Computer systems 42
- Business enterprises 32
- Computer vision 31
- Computer network architectures 30
- Database management 29
- Operating systems (Computers) 27
- Computer networks—Security measures 26
- Law and legislation 22
- Data mining 20
- Information theory 20
- Telecommunication 19
-
1
ISO 27001 ISMS Foundation Training Course. produced by IT Governance Publishing.
Published 2018Full text (Wentworth users only)
Electronic Video -
2
ISO 27001 ISMS Foundation Training Course. produced by IT Governance Publishing.
Published 2018Full text (Wentworth users only)
Electronic Video -
3
ISO 27001 ISMS Foundation Training Course. produced by IT Governance Publishing.
Published 2018Full text (Wentworth users only)
Electronic Video -
4
ISO 27001 ISMS Foundation Training Course. produced by IT Governance Publishing.
Published 2018Full text (Wentworth users only)
Electronic Video -
5
Kali Linux Cookbook - Second Edition.
Published 2016Full text (Wentworth users only)
Electronic eBook -
6
Mastering Active Directory / Dishan Francis.
Published 2017Full text (Wentworth users only)
Electronic eBook -
7
PCI DSS : a Practical Guide to implementing and Maintaining Compliance.
Published 2011Full text (Wentworth users only)
Electronic eBook -
8
Interception of electronic communications in the Czech Republic and Slovakia / Radim Polčák et al.
Published 2016Full text (Wentworth users only)
Electronic eBook -
9
Security Automation with Ansible 2 / Akula, Madhu.
Published 2017Full text (Wentworth users only)
Electronic eBook -
10
Auditing Cloud Computing : a Security and Privacy Guide.
Published 2011Full text (Wentworth users only)
Electronic eBook -
11
-
12
-
13
-
14
-
15
Managing information risk : a director's guide / Stewart Mitchell.
Published 2009Full text (Wentworth users only)
Electronic eBook -
16
The Definitive Guide to the C & A Transformation Process.
Published 2009Full text (Wentworth users only)
Electronic eBook -
17
Use of risk analysis in computer-aided persuasion / edited by Ekrem Duman and Amir F. Atiya.
Published 2011Full text (Wentworth users only)
Electronic Conference Proceeding eBook -
18
-
19
-
20