Computer security.
Overview
Works: | 258 works in 159 publications in 159 languages |
---|
Titles
Home and small business guide to protecting your computer network, electronic assets, and privacy[electronic resource] /
by:
(Language materials, printed)
Click, click, who's there?[electronic resource] :a family-based non-technical approach to help parents protect their children online /
by:
(Language materials, printed)
Developer's guide to web application security[electronic resource] /
by:
(Language materials, printed)
Essential computer security[electronic resource] :everyone's guide to e-mail, Internet, and wireless security /
by:
(Language materials, printed)
Hack proofing Linux[electronic resource] :a guide to open source security /
by:
(Language materials, printed)
Microsoft Vista for IT security professionals[electronic resource] /
by:
(Language materials, printed)
The best damn IT security management book period[electronic resource] /
by:
(Language materials, printed)
Information security[electronic resource] :a manager's guide to thwarting data thieves and hackers /
by:
(Language materials, printed)
Applied Oracle security :developing secure database and middleware environments /
by:
(Language materials, printed)
Google hacking for penetration testers.[electronic resource] /Volume 2
by:
(Language materials, printed)
Information assurance[electronic resource] :dependability and security in networked systems /
by:
(Language materials, printed)
Microsoft forefront security administration guide[electronic resource] /
by:
(Language materials, printed)
Securing Windows server 2008[electronic resource] :prevent attacks from outside and inside your organization.
by:
(Language materials, printed)
No tech hacking[electronic resource] :a guide to social engineering, dumpster diving, and shoulder surfing /
by:
(Language materials, printed)
Hacking exposed :web applications : web application security secrets and solutions /
by:
(Language materials, printed)
A guide to kernel exploitation[electronic resource] :attacking the core /
by:
(Language materials, printed)
Cyber attacks[electronic resource] :protecting national infrastructure /
by:
(Language materials, printed)
Digital forensics for network, Internet, and cloud computing[electronic resource] :a forensic evidence guide for moving targets and data /
by:
(Language materials, printed)
Multimedia security technologies for digital rights management[electronic resource] /
by:
(Language materials, printed)
Seven deadliest wireless technologies attacks[electronic resource] /
by:
(Language materials, printed)
Virtualization and forensics[electronic resource] :a digital forensic investigator's guide to virtual environments /
by:
(Language materials, printed)
Malware analyst's cookbook and DVD :tools and techniques for fighting malicious code /
by:
(Language materials, printed)
Introduction to hardware security and trust[electronic resource] /
by:
(Language materials, printed)
Computational intelligence for privacy and security[electronic resource] /
by:
(Language materials, printed)
Cryptography and security[electronic resource] :from theory to applications : essays dedicated to Jean-Jacques Quisquater on the Occasion of His 65th Birthday /
by:
(Language materials, printed)
Security-aware systems applications and software development methods[electronic resource] /
by:
(Language materials, printed)
Anonymous security systems and applications[electronic resource] :requirements and solutions /
by:
(Language materials, printed)
Optimizing information security and advancing privacy assurance[electronic resource] :new technologies /
by:
(Language materials, printed)
Situational awareness in computer network defense[electronic resource] :principles, methods and applications /
by:
(Language materials, printed)
Digital identity and access management[electronic resource] :technologies and frameworks /
by:
(Language materials, printed)
Privacy protection measures and technologies in business organizations[electronic resource] :aspects and standards /
by:
(Language materials, printed)
Information assurance and security technologies for risk assessment and threat management[electronic resource] :advances /
by:
(Language materials, printed)
Formal models and techniques for analyzing security protocols[electronic resource] /
by:
(Language materials, printed)
Securing the cloud[electronic resource] :cloud computer security techniques and tactics /
by:
(Language materials, printed)
Information security management metrics[electronic resource] :a definitive guide to effective security monitoring and measurement /
by:
(Language materials, printed)
Digital privacy[electronic resource] :theory, technologies, and practices /
by:
(Language materials, printed)
Risk analysis and security countermeasure selection[electronic resource] /
by:
(Language materials, printed)
Intrusion detection[electronic resource] :a machine learning approach /
by:
(Language materials, printed)
Advances in artificial intelligence for privacy protection and security[electronic resource] /
by:
(Language materials, printed)
Moodle security[electronic resource] :learn how to install and configure Moodle in the most secure way possible /
by:
(Language materials, printed)
Digital security[electronic resource] :cyber terror and cyber security /
by:
(Language materials, printed)
Hashing in computer science[electronic resource] :fifty years of slicing and dicing /
by:
(Language materials, printed)
Security engineering for cloud computing[electronic resource] :approaches and tools /
by:
(Language materials, printed)
Theory and practice of cryptography solutions for secure information systems[electronic resource] /
by:
(Language materials, printed)
Advanced persistent threat[electronic resource] :understanding the danger and how to protect your organization /
by:
(Language materials, printed)
Data hiding[electronic resource] :exposing concealed data in multimedia, operating systems, mobile devices, and network protocols /
by:
(Language materials, printed)
Industrial network security[electronic resource] :securing critical infrastructure networks for Smart Grid, SCADA , and other industrial control systems /
by:
(Language materials, printed)
Web application obfuscation[electronic resource] :-/WAFs..Evasion..Filters//alert (/Obfuscation/)- /
by:
(Language materials, printed)
Hacking web apps[electronic resource] :detecting and preventing web application security problems /
by:
(Language materials, printed)
Ninja hacking[electronic resource] :unconventional penetration testing tactics and techniques /
by:
(Language materials, printed)
Next generation SSH2 implementation[electronic resource] :securing data in motion /
by:
(Language materials, printed)
Windows registry forensics[electronic resource] :advanced digital forensic analysis of the Windows registry /
by:
(Language materials, printed)
Managed code rootkits[electronic resource] :hooking into runtime environments /
by:
(Language materials, printed)
Network intrusion analysis[electronic resource] :methodologies, tools, and techniques for incident analysis and response /
by:
(Language materials, printed)
Securing SQL server[electronic resource] :protecting your database from attackers /
by:
(Language materials, printed)
The basics of information security[electronic resource] :understanding the fundamentals of InfoSec in theory and practice /
by:
(Language materials, printed)
Building an effective information security policy architecture[electronic resource] /
by:
(Language materials, printed)
Data protection[electronic resource] :governance, risk management, and compliance /
by:
(Language materials, printed)
Advances in secure computing, internet services, and applications /
by:
(Language materials, printed)
Social media security[electronic resource] :leveraging social networking while mitigating risk /
by:
(Language materials, printed)
Cyber security and IT infrastructure protection[electronic resource] /
by:
(Language materials, printed)
The basics of IT audit[electronic resource] :purposes, processes, and practical information /
by:
(Language materials, printed)
Network and application security fundamentals and practices[electronic resource] /
by:
(Language materials, printed)
Security de-engineering[electronic resource] :solving the problems in information risk management /
by:
(Language materials, printed)
Data mining and machine learning in cybersecurity[electronic resource] /
by:
(Language materials, printed)
Defense against the black arts[electronic resource] :how hackers do what they do and how to protect against it /
by:
(Language materials, printed)
Trustworthy reconfigurable systems[electronic resource] :enhancing the security capabilities of reconfigurable hardware architectures /
by:
(Language materials, printed)
Platform embedded security technology revealed[electronic resource] :safeguarding the future of computing with intel embedded security and management engine /
by:
(Language materials, printed)
Advanced API security[electronic resource] :securing APIs with OAuth 2.0, OpenID Connect, JWS, and JWE /
by:
(Language materials, printed)
Architecting user-centric privacy-as-a-set-of-services[electronic resource] :digital identity-related privacy framework /
by:
(Language materials, printed)
Understanding network hacks[electronic resource] :attack and defense with Python /
by:
(Language materials, printed)
A practical guide to TPM 2.0[electronic resource] :using the new Trusted Platform Module in the new age of security /
by:
(Language materials, printed)
Developing and evaluating security-aware software systems[electronic resource] /
by:
(Language materials, printed)
Handbook of research on digital crime, cyberspace security, and information assurance /
by:
(Language materials, printed)
Security for wireless sensor networks using identity-based cryptography[electronic resource] /
by:
(Language materials, printed)
Secure smart embedded devices, platforms and applications[electronic resource] /
by:
(Language materials, printed)
Security, privacy and trust in cloud systems[electronic resource] /
by:
(Language materials, printed)
Confidentiality and integrity in crowdsourcing systems[electronic resource] /
by:
(Language materials, printed)
Distributed denial of service attack and defense[electronic resource] /
by:
(Language materials, printed)
What is computer science?[electronic resource] :an information security perspective /
by:
(Language materials, printed)
Security and privacy for implantable medical devices[electronic resource] /
by:
(Language materials, printed)
The privacy engineer's manifesto[electronic resource] :getting from policy to code to QA to value /
by:
(Language materials, printed)
Collaboration with cloud computing[electronic resource] :security, social media, and unified communications /
by:
(Language materials, printed)
Applied network security monitoring[electronic resource] :collection, detection, and analysis /
by:
(Language materials, printed)
CSA guide to cloud computing[electronic resource] :implementing cloud privacy and security /
by:
(Language materials, printed)
The basics of information security[electronic resource] :understanding the fundamentals of InfoSec in theory and practice /
by:
(Language materials, printed)
Computational network science[electronic resource] :an algorithmic approach /
by:
(Language materials, printed)
Advances in intelligence and security informatics[electronic resource] /
by:
(Language materials, printed)
Simple steps to data encryption[electronic resource] :a practical guide to secure computing /
by:
(Language materials, printed)
Cyber security[electronic resource] :analytics, technology and automation /
by:
(Electronic resources)
Enterprise cybersecurity[electronic resource] :how to build a successful cyberdefense program against advanced threats /
by:
(Electronic resources)
Privacy in a digital, networked world[electronic resource] :technologies, implications and solutions /
by:
(Language materials, printed)
Smart TV security[electronic resource] :media playback and digital video broadcast /
by:
(Language materials, printed)
International Conference on Security and Privacy in Communication Networks[electronic resource] :10th International ICST Conference, SecureComm 2014, Beijing, China, September 24-26, 2014 : revised selected papers.Part I /
by:
(Language materials, printed)
Advances in Digital Forensics XI[electronic resource] :11th IFIP WG 11.9 International Conference, Orlando, FL, USA, January 26-28, 2015 : revised selected papers /
by:
(Language materials, printed)
Cyber denial, deception and counter deception[electronic resource] :a framework for supporting active cyber defense /
by:
(Language materials, printed)
Cyber security and privacy[electronic resource] :4th Cyber Security and Privacy Innovation Forum, CSP Innovation Forum 2015, Brussels, Belgium April 28-29, 2015 : revised selected papers /
by:
(Language materials, printed)
Digital forensics and cyber crime[electronic resource] :7th International Conference, ICDF2C 2015, Seoul, South Korea, October 6-8, 2015 : revised selected papers /
by:
(Language materials, printed)
Critical infrastructure protection IX[electronic resource] :9th IFIP 11.10 International Conference, ICCIP 2015, Arlington, VA, USA, March 16-18, 2015 : revised selected papers /
by:
(Language materials, printed)
E-Democracy - citizen rights in the world of the new computing paradigms[electronic resource] :6th International Conference, E-Democracy 2015, Athens, Greece, December 10-11, 2015 : proceedings /
by:
(Language materials, printed)
Introduction to cryptography[electronic resource] :principles and applications /
by:
(Language materials, printed)
Applications and techniques in information security[electronic resource] :6th International Conference, ATIS 2015, Beijing, China, November 4-6, 2015 : proceedings /
by:
(Language materials, printed)
Computer security - ESORICS 2015[electronic resource] :20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015 : proceedings.Part II /
by:
(Language materials, printed)
Technology and practice of passwords[electronic resource] :International Conference on Passwords, PASSWORDS'14, Trondheim, Norway, December 8-10, 2014 : revised selected papers /
by:
(Language materials, printed)
Decision and game theory for security[electronic resource] :6th International Conference, GameSec 2015, London, UK, November 4-5, 2015 : proceedings /
by:
(Language materials, printed)
Network and system security[electronic resource] :9th International Conference, NSS 2015, New York, NY, USA, November 3-5, 2015 : proceedings /
by:
(Language materials, printed)
Mobile, secure, and programmable networking[electronic resource] :first International Conference, MSPN 2015, Paris, France, June 15-17, 2015 : selected papers /
by:
(Language materials, printed)
Advanced concepts for intelligent vision systems[electronic resource] :16th International Conference, ACIVS 2015, Catania, Italy, October 26-29, 2015 : proceedings /
by:
(Language materials, printed)
Provable security[electronic resource] :9th International Conference, ProvSec 2015, Kanazawa, Japan, November 24-26, 2015 : proceedings /
by:
(Language materials, printed)
Security protocols XXIII[electronic resource] :23rd International Workshop, Cambridge, UK, March 31 - April 2, 2015 : revised selected papers /
by:
(Language materials, printed)
Future data and security engineering[electronic resource] :second International Conference, FDSE 2015, Ho Chi Minh City, Vietnam, November 23-25, 2015 : proceedings /
by:
(Language materials, printed)
Risk assessment and risk-driven testing[electronic resource] :third International Workshop, RISK 2015, Berlin, Germany, June 15, 2015 : revised selected papers /
by:
(Language materials, printed)
Secure IT systems[electronic resource] :20th Nordic Conference, NordSec 2015, Stockholm, Sweden, October 19-21, 2015 : proceedings /
by:
(Language materials, printed)
Progress in cryptology - INDOCRYPT 2015[electronic resource] :16th International Conference on Cryptology in India, Bangalore, India, December 6-9, 2015 : proceedings /
by:
(Language materials, printed)
Cryptology and network security[electronic resource] :14th International Conference, CANS 2015, Marrakesh, Morocco, December 10-12, 2015 : proceedings /
by:
(Language materials, printed)
Internet of vehicles - safe and intelligent mobility[electronic resource] :second International Conference, IOV 2015, Chengdu, China, December 19-21, 2015 : proceedings /
by:
(Language materials, printed)
Advances in cryptology - ASIACRYPT 2015[electronic resource] :21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29 - December 3, 2015 : proceedings.Part I /
by:
(Language materials, printed)
Advances in cryptology - ASIACRYPT 2015[electronic resource] :21st International Conference on the Theory and Application of Cryptology and Information Security Auckland, New Zealand, November 29 - December 3, 2015 : proceedings.Part II /
by:
(Language materials, printed)
Cyber operations[electronic resource] :building, defending, and attacking modern computer networks /
by:
(Language materials, printed)
Evolution of cyber technologies and operations to 2035[electronic resource] /
by:
(Language materials, printed)
Building secure defenses against code-reuse attacks[electronic resource] /
by:
(Language materials, printed)
Cryptography and coding[electronic resource] :15th IMA International Conference, IMACC 2015, Oxford, UK, December 15-17, 2015 : proceedings /
by:
(Language materials, printed)
Smart card research and advanced applications[electronic resource] :14th International Conference, CARDIS 2015, Bochum, Germany, November 4-6, 2015 : revised selected papers /
by:
(Language materials, printed)
Moving target defense for distributed systems[electronic resource] /
by:
(Language materials, printed)
Dynamic SQL[electronic resource] :applications, performance, and security /
by:
(Language materials, printed)
Recent advances in systems safety and security[electronic resource] /
by:
(Language materials, printed)
Cyber security, cyber crime and cyber forensics[electronic resource] :applications and perspectives /
by:
(Language materials, printed)
Secure system design and trustable computing[electronic resource] /
by:
(Language materials, printed)
Physical and data-link security techniques for future communication systems[electronic resource] /
by:
(Language materials, printed)
Transactions on computational science XXVI[electronic resource] :special issue on cyberworlds and cybersecurity /
by:
(Language materials, printed)
Cybersecurity in the European Union[electronic resource] :resilience and adaptability in governance policy /
by:
(Language materials, printed)
Advanced information systems engineering workshops[electronic resource] :CAiSE 2016 International Workshops, Ljubljana, Slovenia, June 13-17, 2016 : proceedings /
by:
(Electronic resources)
Cyber-physical attack recovery procedures[electronic resource] :a step-by-step preparation and response guide /
by:
(Electronic resources)
Cyber threat![electronic resource] :how to manage the growing risk of cyber attacks /
by:
(Electronic resources)
Investigative computer forensics[electronic resource] :the practical guide for lawyers, accountants, investigators, and business executives /
by:
(Electronic resources)
Risk centric threat modeling[electronic resource] :process for attack simulation and threat analysis /
by:
(Electronic resources)
Security intelligence[electronic resource] :a practitioner's guide to solving enterprise security challenges /
by:
(Electronic resources)
Safeguarding critical e-documents[electronic resource] :implementing a program for securing confidential information assets /
by:
(Electronic resources)
Cyber deception[electronic resource] :building the scientific foundation /
by:
(Electronic resources)
Cyber-security of SCADA and other industrial control systems[electronic resource] /
by:
(Electronic resources)
Preserving privacy against side-channel leaks[electronic resource] :from data publishing to web applications /
by:
(Electronic resources)
IT security risk control management[electronic resource] :an audit preparation plan /
by:
(Electronic resources)
Cybersecurity for hospitals and healthcare facilities[electronic resource] :a guide to detection and prevention /
by:
(Electronic resources)
Subjective logic[electronic resource] :a formalism for reasoning under uncertainty /
by:
(Electronic resources)
Decision and game theory for security[electronic resource] :7th International Conference, GameSec 2016, New York, NY, USA, November 2-4, 2016 : proceedings /
by:
(Electronic resources)
Cryptology and network security[electronic resource] :15th International Conference, CANS 2016, Milan, Italy, November 14-16, 2016 : proceedings /
by:
(Electronic resources)
The second economy[electronic resource] :the race for trust, treasure and time in the cybersecurity war /
by:
(Electronic resources)
From hacking to report writing[electronic resource] :an introduction to security and penetration testing /
by:
(Language materials, printed)
Online banking security measures and data protection[electronic resource] /
by:
(Language materials, printed)
Security solutions for hyperconnectivity and the Internet of things[electronic resource] /
by:
(Language materials, printed)
Innovative solutions for access control management[electronic resource] /
by:
(Language materials, printed)
Computer security literacy[electronic resource] :staying safe in a digital world /
by:
(Electronic resources)
What every engineer should know about cyber security and digital forensics[electronic resource] /
by:
(Electronic resources)
Role mining in business[electronic resource] :taming role-based access control administration /
by:
(Electronic resources)
A guide to the National Initiative for Cybersecurity Education (NICE) cybersecurity workforce framework (2.0)[electronic resource] /
by:
(Electronic resources)
Adopting biometric technology[electronic resource] :challenges and solutions /
by:
(Electronic resources)
Discrete dynamical systems and chaotic machines[electronic resource] :theory and applications /
by:
(Electronic resources)
FinTech[electronic resource] :the technology driving disruption in the financial services industry /
by:
(Electronic resources)
Smart grid security[electronic resource] :innovative solutions for a modernized grid /
by:
(Electronic resources)
Information technology risk management and compliance in modern organizations[electronic resource] /
by:
(Electronic resources)
Building a corporate culture of security[electronic resource] :strategies for strengthening organizational resiliency /
by:
(Language materials, printed)
The basics of digital privacy[electronic resource] :simple tools to protect your personal information and your identity online /
by:
(Language materials, printed)
Network security and its impact on business strategy[electronic resource] /
by:
(Electronic resources)
Information security in diverse computing environments[electronic resource] /
by:
(Electronic resources)
Advanced methodologies and technologies in system security, information privacy, and forensics[electronic resource] /
by:
(Electronic resources)
Countering cyber attacks and preserving the integrity and availability of critical systems[electronic resource] /
by:
(Electronic resources)
Developments in information security and cybernetic wars[electronic resource] /
by:
(Electronic resources)
24 deadly sins of software security[electronic resource] :programming flaws and how to fix them /
by:
(Electronic resources)
Applied Oracle security[electronic resource] :developing secure database and middleware environments /
by:
(Electronic resources)
Hacking exposed malware & rootkits[electronic resource] :malware & rootkits security secrets & solutions /
by:
(Electronic resources)
You can stop stupid[electronic resource] :stopping losses from accidental and malicious actions /
by:
(Electronic resources)
Intelligent security systems[electronic resource] :how artificial intelligence, machine learning and data science work for and against computer security /
by:
(Electronic resources)
Cybersecurity and decision makers[electronic resource] :data security and digital trust /
by:
(Electronic resources)
Strategy, leadership, and AI in the cyber ecosystem[electronic resource] :the role of digital societies in information governance and decision making /
by:
(Electronic resources)
Improving information security practices through computational intelligence[electronic resource] /
by:
(Electronic resources)
New methods and tools for intelligent data processing and information security systems[electronic resource] /
by:
(Electronic resources)
Handbook of research on cyber crime and information privacy[electronic resource] /
by:
(Electronic resources)
Tribe of hackers, security leaders[electronic resource] :tribal knowledge from the best in cybersecurity leadership /
by:
(Electronic resources)
Fraud prevention, confidentiality, and data security for modern businesses[electronic resource] /
by:
(Electronic resources)
Handbook of research on cybersecurity issues and challenges for business and FinTech applications[electronic resource] /
by:
(Electronic resources)
Applications of machine learning and deep learning for privacy and cybersecurity[electronic resource] /
by:
(Electronic resources)
Artificial intelligence, cybersecurity and cyber defense[electronic resource] /
by:
(Electronic resources)
Fundamentals of information security[electronic resource] :a complete go-to guide for beginners to understand all the aspects of information security /
by:
(Electronic resources)
Modern cybersecurity strategies for enterprises[electronic resource] :protect and secure your enterprise networks, digital business assets, and endpoint security with tested and proven methods /
by:
(Electronic resources)
Seven elements of highly successful zero trust architecture :an architect's guide to the Zscaler Zero Trust Exchange /
by:
(Language materials, printed)
Artificial intelligence (AI) governance and cyber-security :a beginner's guide to governing and securing AI /
by:
(Language materials, printed)
NIST cyber security framework V1 :2 in 1 information security & policy /
by:
(Language materials, printed)
Mastering data security and governance :[a comprehensive guide to learn data security and governance] /
by:
(Language materials, printed)
Foundations of information security based on ISO 27001 and ISO 27002 /
by:
(Language materials, printed)
Subjects