Computer security.
概要
作品: | 258 作品在 159 项出版品 159 种语言 |
---|
书目信息
Home and small business guide to protecting your computer network, electronic assets, and privacy[electronic resource] /
by:
(书目-语言数据,印刷品)
Click, click, who's there?[electronic resource] :a family-based non-technical approach to help parents protect their children online /
by:
(书目-语言数据,印刷品)
Essential computer security[electronic resource] :everyone's guide to e-mail, Internet, and wireless security /
by:
(书目-语言数据,印刷品)
Information security[electronic resource] :a manager's guide to thwarting data thieves and hackers /
by:
(书目-语言数据,印刷品)
Information assurance[electronic resource] :dependability and security in networked systems /
by:
(书目-语言数据,印刷品)
Securing Windows server 2008[electronic resource] :prevent attacks from outside and inside your organization.
by:
(书目-语言数据,印刷品)
No tech hacking[electronic resource] :a guide to social engineering, dumpster diving, and shoulder surfing /
by:
(书目-语言数据,印刷品)
Hacking exposed :web applications : web application security secrets and solutions /
by:
(书目-语言数据,印刷品)
Digital forensics for network, Internet, and cloud computing[electronic resource] :a forensic evidence guide for moving targets and data /
by:
(书目-语言数据,印刷品)
Multimedia security technologies for digital rights management[electronic resource] /
by:
(书目-语言数据,印刷品)
Virtualization and forensics[electronic resource] :a digital forensic investigator's guide to virtual environments /
by:
(书目-语言数据,印刷品)
Malware analyst's cookbook and DVD :tools and techniques for fighting malicious code /
by:
(书目-语言数据,印刷品)
Cryptography and security[electronic resource] :from theory to applications : essays dedicated to Jean-Jacques Quisquater on the Occasion of His 65th Birthday /
by:
(书目-语言数据,印刷品)
Security-aware systems applications and software development methods[electronic resource] /
by:
(书目-语言数据,印刷品)
Anonymous security systems and applications[electronic resource] :requirements and solutions /
by:
(书目-语言数据,印刷品)
Optimizing information security and advancing privacy assurance[electronic resource] :new technologies /
by:
(书目-语言数据,印刷品)
Situational awareness in computer network defense[electronic resource] :principles, methods and applications /
by:
(书目-语言数据,印刷品)
Digital identity and access management[electronic resource] :technologies and frameworks /
by:
(书目-语言数据,印刷品)
Privacy protection measures and technologies in business organizations[electronic resource] :aspects and standards /
by:
(书目-语言数据,印刷品)
Information assurance and security technologies for risk assessment and threat management[electronic resource] :advances /
by:
(书目-语言数据,印刷品)
Formal models and techniques for analyzing security protocols[electronic resource] /
by:
(书目-语言数据,印刷品)
Securing the cloud[electronic resource] :cloud computer security techniques and tactics /
by:
(书目-语言数据,印刷品)
Information security management metrics[electronic resource] :a definitive guide to effective security monitoring and measurement /
by:
(书目-语言数据,印刷品)
Advances in artificial intelligence for privacy protection and security[electronic resource] /
by:
(书目-语言数据,印刷品)
Moodle security[electronic resource] :learn how to install and configure Moodle in the most secure way possible /
by:
(书目-语言数据,印刷品)
Hashing in computer science[electronic resource] :fifty years of slicing and dicing /
by:
(书目-语言数据,印刷品)
Security engineering for cloud computing[electronic resource] :approaches and tools /
by:
(书目-语言数据,印刷品)
Theory and practice of cryptography solutions for secure information systems[electronic resource] /
by:
(书目-语言数据,印刷品)
Advanced persistent threat[electronic resource] :understanding the danger and how to protect your organization /
by:
(书目-语言数据,印刷品)
Data hiding[electronic resource] :exposing concealed data in multimedia, operating systems, mobile devices, and network protocols /
by:
(书目-语言数据,印刷品)
Industrial network security[electronic resource] :securing critical infrastructure networks for Smart Grid, SCADA , and other industrial control systems /
by:
(书目-语言数据,印刷品)
Web application obfuscation[electronic resource] :-/WAFs..Evasion..Filters//alert (/Obfuscation/)- /
by:
(书目-语言数据,印刷品)
Hacking web apps[electronic resource] :detecting and preventing web application security problems /
by:
(书目-语言数据,印刷品)
Ninja hacking[electronic resource] :unconventional penetration testing tactics and techniques /
by:
(书目-语言数据,印刷品)
Next generation SSH2 implementation[electronic resource] :securing data in motion /
by:
(书目-语言数据,印刷品)
Windows registry forensics[electronic resource] :advanced digital forensic analysis of the Windows registry /
by:
(书目-语言数据,印刷品)
Network intrusion analysis[electronic resource] :methodologies, tools, and techniques for incident analysis and response /
by:
(书目-语言数据,印刷品)
Securing SQL server[electronic resource] :protecting your database from attackers /
by:
(书目-语言数据,印刷品)
The basics of information security[electronic resource] :understanding the fundamentals of InfoSec in theory and practice /
by:
(书目-语言数据,印刷品)
Building an effective information security policy architecture[electronic resource] /
by:
(书目-语言数据,印刷品)
Data protection[electronic resource] :governance, risk management, and compliance /
by:
(书目-语言数据,印刷品)
Social media security[electronic resource] :leveraging social networking while mitigating risk /
by:
(书目-语言数据,印刷品)
The basics of IT audit[electronic resource] :purposes, processes, and practical information /
by:
(书目-语言数据,印刷品)
Network and application security fundamentals and practices[electronic resource] /
by:
(书目-语言数据,印刷品)
Security de-engineering[electronic resource] :solving the problems in information risk management /
by:
(书目-语言数据,印刷品)
Defense against the black arts[electronic resource] :how hackers do what they do and how to protect against it /
by:
(书目-语言数据,印刷品)
Trustworthy reconfigurable systems[electronic resource] :enhancing the security capabilities of reconfigurable hardware architectures /
by:
(书目-语言数据,印刷品)
Platform embedded security technology revealed[electronic resource] :safeguarding the future of computing with intel embedded security and management engine /
by:
(书目-语言数据,印刷品)
Advanced API security[electronic resource] :securing APIs with OAuth 2.0, OpenID Connect, JWS, and JWE /
by:
(书目-语言数据,印刷品)
Architecting user-centric privacy-as-a-set-of-services[electronic resource] :digital identity-related privacy framework /
by:
(书目-语言数据,印刷品)
Understanding network hacks[electronic resource] :attack and defense with Python /
by:
(书目-语言数据,印刷品)
A practical guide to TPM 2.0[electronic resource] :using the new Trusted Platform Module in the new age of security /
by:
(书目-语言数据,印刷品)
Handbook of research on digital crime, cyberspace security, and information assurance /
by:
(书目-语言数据,印刷品)
Security for wireless sensor networks using identity-based cryptography[electronic resource] /
by:
(书目-语言数据,印刷品)
What is computer science?[electronic resource] :an information security perspective /
by:
(书目-语言数据,印刷品)
The privacy engineer's manifesto[electronic resource] :getting from policy to code to QA to value /
by:
(书目-语言数据,印刷品)
Collaboration with cloud computing[electronic resource] :security, social media, and unified communications /
by:
(书目-语言数据,印刷品)
Applied network security monitoring[electronic resource] :collection, detection, and analysis /
by:
(书目-语言数据,印刷品)
CSA guide to cloud computing[electronic resource] :implementing cloud privacy and security /
by:
(书目-语言数据,印刷品)
The basics of information security[electronic resource] :understanding the fundamentals of InfoSec in theory and practice /
by:
(书目-语言数据,印刷品)
Simple steps to data encryption[electronic resource] :a practical guide to secure computing /
by:
(书目-语言数据,印刷品)
Enterprise cybersecurity[electronic resource] :how to build a successful cyberdefense program against advanced threats /
by:
(书目-电子资源)
Privacy in a digital, networked world[electronic resource] :technologies, implications and solutions /
by:
(书目-语言数据,印刷品)
Smart TV security[electronic resource] :media playback and digital video broadcast /
by:
(书目-语言数据,印刷品)
Cyber denial, deception and counter deception[electronic resource] :a framework for supporting active cyber defense /
by:
(书目-语言数据,印刷品)
Decision and game theory for security[electronic resource] :6th International Conference, GameSec 2015, London, UK, November 4-5, 2015 : proceedings /
by:
(书目-语言数据,印刷品)
Network and system security[electronic resource] :9th International Conference, NSS 2015, New York, NY, USA, November 3-5, 2015 : proceedings /
by:
(书目-语言数据,印刷品)
Mobile, secure, and programmable networking[electronic resource] :first International Conference, MSPN 2015, Paris, France, June 15-17, 2015 : selected papers /
by:
(书目-语言数据,印刷品)
Provable security[electronic resource] :9th International Conference, ProvSec 2015, Kanazawa, Japan, November 24-26, 2015 : proceedings /
by:
(书目-语言数据,印刷品)
Security protocols XXIII[electronic resource] :23rd International Workshop, Cambridge, UK, March 31 - April 2, 2015 : revised selected papers /
by:
(书目-语言数据,印刷品)
Risk assessment and risk-driven testing[electronic resource] :third International Workshop, RISK 2015, Berlin, Germany, June 15, 2015 : revised selected papers /
by:
(书目-语言数据,印刷品)
Secure IT systems[electronic resource] :20th Nordic Conference, NordSec 2015, Stockholm, Sweden, October 19-21, 2015 : proceedings /
by:
(书目-语言数据,印刷品)
Cryptology and network security[electronic resource] :14th International Conference, CANS 2015, Marrakesh, Morocco, December 10-12, 2015 : proceedings /
by:
(书目-语言数据,印刷品)
Cyber operations[electronic resource] :building, defending, and attacking modern computer networks /
by:
(书目-语言数据,印刷品)
Cryptography and coding[electronic resource] :15th IMA International Conference, IMACC 2015, Oxford, UK, December 15-17, 2015 : proceedings /
by:
(书目-语言数据,印刷品)
Cyber security, cyber crime and cyber forensics[electronic resource] :applications and perspectives /
by:
(书目-语言数据,印刷品)
Physical and data-link security techniques for future communication systems[electronic resource] /
by:
(书目-语言数据,印刷品)
Transactions on computational science XXVI[electronic resource] :special issue on cyberworlds and cybersecurity /
by:
(书目-语言数据,印刷品)
Cybersecurity in the European Union[electronic resource] :resilience and adaptability in governance policy /
by:
(书目-语言数据,印刷品)
Cyber-physical attack recovery procedures[electronic resource] :a step-by-step preparation and response guide /
by:
(书目-电子资源)
Risk centric threat modeling[electronic resource] :process for attack simulation and threat analysis /
by:
(书目-电子资源)
Security intelligence[electronic resource] :a practitioner's guide to solving enterprise security challenges /
by:
(书目-电子资源)
Safeguarding critical e-documents[electronic resource] :implementing a program for securing confidential information assets /
by:
(书目-电子资源)
Preserving privacy against side-channel leaks[electronic resource] :from data publishing to web applications /
by:
(书目-电子资源)
Cybersecurity for hospitals and healthcare facilities[electronic resource] :a guide to detection and prevention /
by:
(书目-电子资源)
The second economy[electronic resource] :the race for trust, treasure and time in the cybersecurity war /
by:
(书目-电子资源)
From hacking to report writing[electronic resource] :an introduction to security and penetration testing /
by:
(书目-语言数据,印刷品)
Security solutions for hyperconnectivity and the Internet of things[electronic resource] /
by:
(书目-语言数据,印刷品)
What every engineer should know about cyber security and digital forensics[electronic resource] /
by:
(书目-电子资源)
Role mining in business[electronic resource] :taming role-based access control administration /
by:
(书目-电子资源)
Discrete dynamical systems and chaotic machines[electronic resource] :theory and applications /
by:
(书目-电子资源)
FinTech[electronic resource] :the technology driving disruption in the financial services industry /
by:
(书目-电子资源)
Smart grid security[electronic resource] :innovative solutions for a modernized grid /
by:
(书目-电子资源)
Information technology risk management and compliance in modern organizations[electronic resource] /
by:
(书目-电子资源)
Building a corporate culture of security[electronic resource] :strategies for strengthening organizational resiliency /
by:
(书目-语言数据,印刷品)
The basics of digital privacy[electronic resource] :simple tools to protect your personal information and your identity online /
by:
(书目-语言数据,印刷品)
Advanced methodologies and technologies in system security, information privacy, and forensics[electronic resource] /
by:
(书目-电子资源)
Countering cyber attacks and preserving the integrity and availability of critical systems[electronic resource] /
by:
(书目-电子资源)
24 deadly sins of software security[electronic resource] :programming flaws and how to fix them /
by:
(书目-电子资源)
Applied Oracle security[electronic resource] :developing secure database and middleware environments /
by:
(书目-电子资源)
Hacking exposed malware & rootkits[electronic resource] :malware & rootkits security secrets & solutions /
by:
(书目-电子资源)
You can stop stupid[electronic resource] :stopping losses from accidental and malicious actions /
by:
(书目-电子资源)
Cybersecurity and decision makers[electronic resource] :data security and digital trust /
by:
(书目-电子资源)
Improving information security practices through computational intelligence[electronic resource] /
by:
(书目-电子资源)
New methods and tools for intelligent data processing and information security systems[electronic resource] /
by:
(书目-电子资源)
Tribe of hackers, security leaders[electronic resource] :tribal knowledge from the best in cybersecurity leadership /
by:
(书目-电子资源)
Fraud prevention, confidentiality, and data security for modern businesses[electronic resource] /
by:
(书目-电子资源)
Handbook of research on cybersecurity issues and challenges for business and FinTech applications[electronic resource] /
by:
(书目-电子资源)
Applications of machine learning and deep learning for privacy and cybersecurity[electronic resource] /
by:
(书目-电子资源)
Seven elements of highly successful zero trust architecture :an architect's guide to the Zscaler Zero Trust Exchange /
by:
(书目-语言数据,印刷品)
Artificial intelligence (AI) governance and cyber-security :a beginner's guide to governing and securing AI /
by:
(书目-语言数据,印刷品)
主题