Computer networks - Security measures.
Overview
Works: | 170 works in 83 publications in 83 languages |
---|
Titles
Home and small business guide to protecting your computer network, electronic assets, and privacy[electronic resource] /
by:
(Language materials, printed)
Cisco Pix firewalls[electronic resource] :configure, manage, & troubleshoot /
by:
(Language materials, printed)
Disappearing cryptography[electronic resource] :information hiding : steganography & watermarking /
by:
(Language materials, printed)
Developer's guide to web application security[electronic resource] /
by:
(Language materials, printed)
Integrated security systems design[electronic resource] :concepts, specifications, and implementation /
by:
(Language materials, printed)
Aspects of network and information security[electronic resource] /
by:
(Language materials, printed)
Google hacking for penetration testers.[electronic resource] /Volume 2
by:
(Language materials, printed)
Information assurance[electronic resource] :dependability and security in networked systems /
by:
(Language materials, printed)
Microsoft forefront security administration guide[electronic resource] /
by:
(Language materials, printed)
Designing an IAM framework with Oracle identity and access management suite /
by:
(Language materials, printed)
Hacking exposed :web applications : web application security secrets and solutions /
by:
(Language materials, printed)
Cisco router and switch forensics[electronic resource] :investigating and analyzing malicious network activity /
by:
(Language materials, printed)
Digital forensics for network, Internet, and cloud computing[electronic resource] :a forensic evidence guide for moving targets and data /
by:
(Language materials, printed)
Seven deadliest wireless technologies attacks[electronic resource] /
by:
(Language materials, printed)
Foundations and practice of security[electronic resource] :4th Canada-France MITACS Workshop, FPS 2011, Paris, France, May 12-13, 2011 : revised selected papers /
by:
(Language materials, printed)
Critical infrastructure protection[electronic resource] :information infrastructure models, analysis, and defense /
by:
(Language materials, printed)
Security-aware systems applications and software development methods[electronic resource] /
by:
(Language materials, printed)
Strategic and practical approaches for information security governance[electronic resource] :technologies and applied solutions /
by:
(Language materials, printed)
Optimizing information security and advancing privacy assurance[electronic resource] :new technologies /
by:
(Language materials, printed)
Situational awareness in computer network defense[electronic resource] :principles, methods and applications /
by:
(Language materials, printed)
Digital identity and access management[electronic resource] :technologies and frameworks /
by:
(Language materials, printed)
Information assurance and security technologies for risk assessment and threat management[electronic resource] :advances /
by:
(Language materials, printed)
Privacy, intrusion detection, and response[electronic resource] :technologies for protecting networks /
by:
(Language materials, printed)
Continuous authentication using biometrics[electronic resource] :data, models, and metrics /
by:
(Language materials, printed)
Formal models and techniques for analyzing security protocols[electronic resource] /
by:
(Language materials, printed)
Securing the cloud[electronic resource] :cloud computer security techniques and tactics /
by:
(Language materials, printed)
Digital privacy[electronic resource] :theory, technologies, and practices /
by:
(Language materials, printed)
Intrusion detection[electronic resource] :a machine learning approach /
by:
(Language materials, printed)
Digital security[electronic resource] :cyber terror and cyber security /
by:
(Language materials, printed)
Wars of disruption and resilience[electronic resource] :cybered conflict, power, and national security /
by:
(Language materials, printed)
Wiki at war[electronic resource] :conflict in a socially networked world /
by:
(Language materials, printed)
Privacy solutions and security frameworks in information protection[electronic resource] /
by:
(Language materials, printed)
Security engineering for cloud computing[electronic resource] :approaches and tools /
by:
(Language materials, printed)
Theory and practice of cryptography solutions for secure information systems[electronic resource] /
by:
(Language materials, printed)
Advanced persistent threat[electronic resource] :understanding the danger and how to protect your organization /
by:
(Language materials, printed)
Professional penetration testing[electronic resource] :creating and operating a formal hacking lab /
by:
(Language materials, printed)
Security risk management[electronic resource] :building an information security risk management program from the ground up /
by:
(Language materials, printed)
Hacking web apps[electronic resource] :detecting and preventing web application security problems /
by:
(Language materials, printed)
Next generation SSH2 implementation[electronic resource] :securing data in motion /
by:
(Language materials, printed)
Windows registry forensics[electronic resource] :advanced digital forensic analysis of the Windows registry /
by:
(Language materials, printed)
PCI compliance[electronic resource] :understand and implement effective PCI data security standard compliance /
by:
(Language materials, printed)
Network intrusion analysis[electronic resource] :methodologies, tools, and techniques for incident analysis and response /
by:
(Language materials, printed)
Integrating ISA Server 2006 with Microsoft Exchange 2007[electronic resource] /
by:
(Language materials, printed)
The basics of cyber warfare[electronic resource] :understanding the fundamentals of cyber warfare in theory and practice /
by:
(Language materials, printed)
The basics of information security[electronic resource] :understanding the fundamentals of InfoSec in theory and practice /
by:
(Language materials, printed)
Building an effective information security policy architecture[electronic resource] /
by:
(Language materials, printed)
Handbook of financial cryptography and security[electronic resource] /
by:
(Language materials, printed)
Advances in secure computing, internet services, and applications /
by:
(Language materials, printed)
Security risks in social media technologies [electronic resource]:safe practices in public service applications /
by:
(Language materials, printed)
The basics of web hacking[electronic resource] :tools and techniques to attack the Web /
by:
(Language materials, printed)
Cyber security and IT infrastructure protection[electronic resource] /
by:
(Language materials, printed)
Business continuity and disaster recovery planning for IT professionals[electronic resource] /
by:
(Language materials, printed)
The basics of IT audit[electronic resource] :purposes, processes, and practical information /
by:
(Language materials, printed)
Network and application security fundamentals and practices[electronic resource] /
by:
(Language materials, printed)
Defense against the black arts[electronic resource] :how hackers do what they do and how to protect against it /
by:
(Language materials, printed)
Cyberpatterns[electronic resource] :unifying design patterns with security and attack patterns /
by:
(Language materials, printed)
Engineering secure future internet services and systems[electronic resource] :current research /
by:
(Language materials, printed)
Architecting user-centric privacy-as-a-set-of-services[electronic resource] :digital identity-related privacy framework /
by:
(Language materials, printed)
Bio-inspiring cyber security and cloud services[electronic resource] :trends and innovations /
by:
(Language materials, printed)
Understanding network hacks[electronic resource] :attack and defense with Python /
by:
(Language materials, printed)
A practical guide to TPM 2.0[electronic resource] :using the new Trusted Platform Module in the new age of security /
by:
(Language materials, printed)
Developing and evaluating security-aware software systems[electronic resource] /
by:
(Language materials, printed)
Architectures and protocols for secure information technology infrastructures /
by:
(Language materials, printed)
Security, privacy, trust, and resource management in mobile and wireless communications /
by:
(Language materials, printed)
Multidisciplinary perspectives in cryptology and information security /
by:
(Language materials, printed)
Handbook of research on digital crime, cyberspace security, and information assurance /
by:
(Language materials, printed)
Handbook of research on threat detection and countermeasures in network security /
by:
(Language materials, printed)
Security, privacy and trust in cloud systems[electronic resource] /
by:
(Language materials, printed)
Distributed denial of service attack and defense[electronic resource] /
by:
(Language materials, printed)
Topics in cryptology - CT-RSA 2014[electronic resource] :the Cryptographer's track at the RSA Conference 2014, San Francisco, CA, USA, February 25-28, 2014 : proceedings /
by:
(Language materials, printed)
Networks and Network Analysis for Defence and Security[electronic resource] /
by:
(Language materials, printed)
Network hardening[electronic resource] :an automated approach to improving network security /
by:
(Language materials, printed)
Enabling secure and privacy preserving communications in smart grids[electronic resource] /
by:
(Language materials, printed)
The basics of information security[electronic resource] :understanding the fundamentals of InfoSec in theory and practice /
by:
(Language materials, printed)
Computational network science[electronic resource] :an algorithmic approach /
by:
(Language materials, printed)
Professional penetration testing[electronic resource] :creating and learning in a hacking lab /
by:
(Language materials, printed)
Cybersecurity for executives[electronic resource] :a practical guide /
by:
(Language materials, printed)
Introduction to cryptography[electronic resource] :principles and applications /
by:
(Language materials, printed)
Cyber operations[electronic resource] :building, defending, and attacking modern computer networks /
by:
(Language materials, printed)
Evolution of cyber technologies and operations to 2035[electronic resource] /
by:
(Language materials, printed)
Privacy-enhancing aggregation techniques for smart grid communications[electronic resource] /
by:
(Language materials, printed)
Recent advances in systems safety and security[electronic resource] /
by:
(Language materials, printed)
Network security attacks and countermeasures[electronic resource] /
by:
(Language materials, printed)
Exploring the security landscape[electronic resource] :non-traditional security challenges /
by:
(Language materials, printed)
Asset protection through security awareness[electronic resource] /
by:
(Language materials, printed)
Cyber threat![electronic resource] :how to manage the growing risk of cyber attacks /
by:
(Electronic resources)
Risk centric threat modeling[electronic resource] :process for attack simulation and threat analysis /
by:
(Electronic resources)
Security intelligence[electronic resource] :a practitioner's guide to solving enterprise security challenges /
by:
(Electronic resources)
The network security test lab[electronic resource] :a step-by-step guide /
by:
(Electronic resources)
Virtuality and capabilities in a world of ambient intelligence[electronic resource] :new challenges to privacy and data protection /
by:
(Electronic resources)
Implementing DirectAccess with Windows Server 2016[electronic resource] /
by:
(Electronic resources)
Cybersecurity for hospitals and healthcare facilities[electronic resource] :a guide to detection and prevention /
by:
(Electronic resources)
Physical layer security in random cellular networks[electronic resource] /
by:
(Electronic resources)
The second economy[electronic resource] :the race for trust, treasure and time in the cybersecurity war /
by:
(Electronic resources)
From hacking to report writing[electronic resource] :an introduction to security and penetration testing /
by:
(Language materials, printed)
Cybersecurity breaches and issues surrounding online threat protection[electronic resource] /
by:
(Language materials, printed)
Online banking security measures and data protection[electronic resource] /
by:
(Language materials, printed)
Security management in mobile cloud computing[electronic resource] /
by:
(Language materials, printed)
What every engineer should know about cyber security and digital forensics[electronic resource] /
by:
(Electronic resources)
A guide to the National Initiative for Cybersecurity Education (NICE) cybersecurity workforce framework (2.0)[electronic resource] /
by:
(Electronic resources)
Network anomaly detection[electronic resource] :a machine learning perspective /
by:
(Electronic resources)
The new era in U.S. national security[electronic resource] :an introduction to emerging threats and challenges /
by:
(Electronic resources)
Hacking web intelligence :open source intelligence and web reconnaissance concepts and techniques /
by:
(Electronic resources)
Contemporary identity and access management architectures[electronic resource] :emerging research and opportunities /
by:
(Electronic resources)
Security and privacy management, techniques, and protocols[electronic resource] /
by:
(Electronic resources)
Network Performance and Security[electronic resource] :Testing and Analyzing Using Open Source and Low-Cost Tools /
by:
(Language materials, printed)
The basics of digital privacy[electronic resource] :simple tools to protect your personal information and your identity online /
by:
(Language materials, printed)
Artificial intelligence and security challenges in emerging networks[electronic resource] /
by:
(Electronic resources)
Advanced methodologies and technologies in system security, information privacy, and forensics[electronic resource] /
by:
(Electronic resources)
Countering cyber attacks and preserving the integrity and availability of critical systems[electronic resource] /
by:
(Electronic resources)
Implementing computational intelligence techniques for security systems design[electronic resource] /
by:
(Electronic resources)
24 deadly sins of software security[electronic resource] :programming flaws and how to fix them /
by:
(Electronic resources)
Research anthology on artificial intelligence applications in security[electronic resource] /
by:
(Electronic resources)
Intelligent network management and control[electronic resource] :intelligent security, multi-criteria optimization, cloud computing, Internet of Vehicles, intelligent radio /
by:
(Electronic resources)
Handbook of research on machine and deep learning applications for cyber security[electronic resource] /
by:
(Electronic resources)
Applied approach to privacy and security for the Internet of things[electronic resource] /
by:
(Electronic resources)
Handbook of research on cybersecurity issues and challenges for business and FinTech applications[electronic resource] /
by:
(Electronic resources)
Artificial intelligence, cybersecurity and cyber defense[electronic resource] /
by:
(Electronic resources)
Fundamentals of information security[electronic resource] :a complete go-to guide for beginners to understand all the aspects of information security /
by:
(Electronic resources)
Seven elements of highly successful zero trust architecture :an architect's guide to the Zscaler Zero Trust Exchange /
by:
(Language materials, printed)
Foundations of information security based on ISO 27001 and ISO 27002 /
by:
(Language materials, printed)
Subjects