Virus informático /
Saved in:
| Main Author: | Nombela, Juan José |
|---|---|
| Other Authors: | Pino González, javier del, Pino González, Luis M. del |
| Format: | Book |
| Language: | Spanish |
| Published: |
Madrid :
Paraninfo,
1991.
|
| Edition: | 2a. edición |
| Subjects: | |
| Notas Contenido: |
|
Similar Items
Virus informáticos :.
Published: (1992.)
Published: (1992.)
Virus informáticos :
by: Levin, Richard B.
Published: (c1991.)
by: Levin, Richard B.
Published: (c1991.)
Virus informáticos :
by: Harley, David
Published: (c2002.)
by: Harley, David
Published: (c2002.)
Guía de campo de los virus informáticos. /
by: Rodao, Jesús de Marcelo
Published: (c1995.)
by: Rodao, Jesús de Marcelo
Published: (c1995.)
Guía de campo de los virus informáticos /
by: Rodao, Jesús de Marcelo
Published: (1997.)
by: Rodao, Jesús de Marcelo
Published: (1997.)
Virus :
by: Ferreyra Cortés, Gonzalo,
Published: (c1995.)
by: Ferreyra Cortés, Gonzalo,
Published: (c1995.)
Virus en las computadoras. /
by: Ferreyra Cortes, Gonzalo,
Published: (c1991.)
by: Ferreyra Cortes, Gonzalo,
Published: (c1991.)
Diversos tipos y formas de virus informáticos. Formas de protegerse de estas amenazas. /
by: Pérez Martínez, José Raúl.
Published: (2018.)
by: Pérez Martínez, José Raúl.
Published: (2018.)
Seguridad en equipos informáticos /
by: Gómez Vieites, Alvaro
by: Gómez Vieites, Alvaro
Curso abreviado de virus en computación /
by: COHEN, Frederic B.
Published: (1994.)
by: COHEN, Frederic B.
Published: (1994.)
Viruscop :
Published: ([1995?].)
Published: ([1995?].)
Seguridad en informática :
by: Castellanos H., Luis R.
Published: (©2014.)
by: Castellanos H., Luis R.
Published: (©2014.)
Firewalls y la seguridad en Internet /
by: Siyan, Karanjit,
Published: (©1997.)
by: Siyan, Karanjit,
Published: (©1997.)
Auditoría de seguridad informática /
by: Gómez Vieites, Álvaro
Published: (2013.)
by: Gómez Vieites, Álvaro
Published: (2013.)
Seguridad en informática :
by: Catellanos H, Luis R.
Published: (©2012.)
by: Catellanos H, Luis R.
Published: (©2012.)
Destripa la red /
Published: (2011.)
Published: (2011.)
Hacking y seguridad en internet /
Published: (2013.)
Published: (2013.)
Enciclopedia de la seguridad informática /
by: Gómez Vieites, Álvaro
Published: (c2007.)
by: Gómez Vieites, Álvaro
Published: (c2007.)
Enciclopedia de la seguridad informática /
by: Gómez Vieites, Álvaro
Published: (c2011.)
by: Gómez Vieites, Álvaro
Published: (c2011.)
Virus :
by: Shors, Teri
Published: (2009.)
by: Shors, Teri
Published: (2009.)
Virus de los computadores.
by: Ferreyra Cortes, Gonzalo,
Published: (1990.)
by: Ferreyra Cortes, Gonzalo,
Published: (1990.)
Curso práctico sobre mantenimiento, reparación, actualización e instalación de computadoras :
Published: (c1997.)
Published: (c1997.)
Informática :
by: Castellanos Casas, Ricardo
Published: (c2000.)
by: Castellanos Casas, Ricardo
Published: (c2000.)
Biología molecular de virus :
by: Peñaranda
by: Peñaranda
Pirateo legal :
Hacker : /
Published: (2009.)
Published: (2009.)
MS-DOS 6.2 /
by: Ramalho, José A.
Published: (1994.)
by: Ramalho, José A.
Published: (1994.)
Los virus /
by: Pizarro-Suárez y Gamba, Enriqueta
Published: (1980.)
by: Pizarro-Suárez y Gamba, Enriqueta
Published: (1980.)
Células, virus y cáncer /
by: MEDRANO, Leandro
Published: (1975.)
by: MEDRANO, Leandro
Published: (1975.)
La seguridad de la información /
Published: (c2007.)
Published: (c2007.)
Los delitos del futuro :
by: Goodman, Marc
Published: (©2016.)
by: Goodman, Marc
Published: (©2016.)
Fraude en la red :
by: Guerrero, Diego
Published: (©2012.)
by: Guerrero, Diego
Published: (©2012.)
Cibercrimen :
by: Medina, Manel
by: Medina, Manel
Auditoría en informática /
by: Echenique García, José Antonio
Published: (1990.)
by: Echenique García, José Antonio
Published: (1990.)
Seguridad en equipos informáticos /
by: Giménez Albacete, José Francisco
Published: (©2014.)
by: Giménez Albacete, José Francisco
Published: (©2014.)
Protege tus datos de virus y hackers /
Published: (2006.)
Published: (2006.)
Protección de activos informáticos /
by: Labodía Bonastre, José Antonio
Published: (©1994.)
by: Labodía Bonastre, José Antonio
Published: (©1994.)
Planificación de la seguridad informática en la empresa /
by: Villada Romero, José Luis
Published: (©2019.)
by: Villada Romero, José Luis
Published: (©2019.)
Formulación y evaluación de proyectos informáticos /
by: Baca Urbina, Gabriel
Published: (c2006.)
by: Baca Urbina, Gabriel
Published: (c2006.)
CEH, certified ethical hacker :
by: Walker, Matthew
Published: (2019.)
by: Walker, Matthew
Published: (2019.)
Similar Items
-
Virus informáticos :.
Published: (1992.) -
Virus informáticos :
by: Levin, Richard B.
Published: (c1991.) -
Virus informáticos :
by: Harley, David
Published: (c2002.) -
Guía de campo de los virus informáticos. /
by: Rodao, Jesús de Marcelo
Published: (c1995.) -
Guía de campo de los virus informáticos /
by: Rodao, Jesús de Marcelo
Published: (1997.)