Computer security.
概要
作品: | 770 作品在 499 項出版品 499 種語言 |
---|
書目資訊
Information security architecture :an integrated approach to security in the organization /
by:
(書目-語言資料,印刷品)
Cryptography for Internet and database applications :developing secret and public key techniques with Java /
by:
(書目-語言資料,印刷品)
Security in fixed and wireless networks :an introduction to securing data communications /
by:
(書目-語言資料,印刷品)
Computer privacy annoyances :how to avoid the most annoying invasions of your personal and online privacy /
by:
(書目-語言資料,印刷品)
Information security architecture :an integrated approach to security in the organization /
by:
(書目-語言資料,印刷品)
Enterprise security :IT security solutions : concepts, practical experiences, technologies /
by:
(書目-語言資料,印刷品)
Multimedia security :steganography and digital watermarking techniques for protection of intellectual property /
by:
(書目-語言資料,印刷品)
Information hiding :steganography and watermarking : attacks and countermeasures /
by:
(書目-語言資料,印刷品)
The art of intrusion :the real stories behind the exploits of hackers, intruders & deceivers /
by:
(書目-語言資料,印刷品)
Security in fixed and wireless networks an introduction to securing data communications /
by:
(書目-電子資源)
Phishing and countermeasures :understanding the increasing problem of electronic identity theft /
by:
(書目-語言資料,印刷品)
Machine learning and data mining for computer security :methods and applications /
by:
(書目-語言資料,印刷品)
Web service security :scenarios, patterns, and implementation guidance for Web services enhancements (WSE) 3.0 /
by:
(書目-語言資料,印刷品)
Enterprise information systems assurance and system security :managerial and technical issues /
by:
(書目-語言資料,印刷品)
Phishing and countermeasures :understanding the increasing problem of electronic identity theft /
by:
(書目-電子資源)
Information warfare in businessstrategies of control and resistance in the network society /
by:
(書目-電子資源)
Database and applications securityintegrating information security and data management /
by:
(書目-電子資源)
Information security architecturean integrated approach to security in the organization /
by:
(書目-電子資源)
The secure online business handbooka practical guide to risk management and business continuity /
by:
(書目-電子資源)
Hack the stackusing Snort and Ethereal to master the 8 layers of an insecure network /
by:
(書目-電子資源)
Visualization for Computer Security5th International Workshop, VizSec 2008, Cambridge, MA, USA, September 15, 2008. Proceedings /
by:
(書目-語言資料,印刷品)
Securing Windows server 2008prevent attacks from outside and inside your organization.
by:
(書目-電子資源)
Multimedia security :digital image and video watermarking : HMM based transform domain watermarking in image & video /
by:
(書目-語言資料,印刷品)
The web application hacker's handbook :discovering and exploiting security flaws /
by:
(書目-語言資料,印刷品)
VMware vSphere and virtual infrastructure security :securing the virtual environment /
by:
(書目-語言資料,印刷品)
Statistical techniques for network security :modern statistically-based intrusion detection and protection /
by:
(書目-語言資料,印刷品)
Essential computer securityeveryone's guide to e-mail, Internet, and wireless security /
by:
(書目-電子資源)
Home and small business guide to protecting your computer network, electronic assets, and privacy
by:
(書目-電子資源)
Click, click, who's there?a family-based non-technical approach to help parents protect their children online /
by:
(書目-電子資源)
Transactions on computational science Xspecial issue on security in computing, part I /
by:
(書目-電子資源)
Hacking exposed malware & rootkits :malware & rootkits security secrets & solutions
by:
(書目-語言資料,印刷品)
Digital forensics for network, Internet, and cloud computinga forensic evidence guide for moving targets and data /
by:
(書目-電子資源)
Virtualization and forensicsa digital forensic investigator's guide to virtual environments /
by:
(書目-電子資源)
Privacy and accountability in the cloud :based on exploring private and accountable storage in distributed and dynamic environments /
by:
(書目-語言資料,印刷品)
Cloud computing security :high-impact emerging technology - what you need to know : definitions, adoptions, impact, benefits, maturity, vendors /
by:
(書目-語言資料,印刷品)
Information security management metricsa definitive guide to effective security monitoring and measurement /
by:
(書目-電子資源)
Situational awareness in computer network defenseprinciples, methods and applications /
by:
(書目-電子資源)
Privacy protection measures and technologies in business organizationsaspects and standards /
by:
(書目-電子資源)
Information assurance and security technologies for risk assessment and threat managementadvances /
by:
(書目-電子資源)
Advanced persistent threatunderstanding the danger and how to protect your organization /
by:
(書目-電子資源)
Data hidingexposing concealed data in multimedia, operating systems, mobile devices, and network protocols /
by:
(書目-電子資源)
Windows registry forensicsadvanced digital forensic analysis of the Windows registry /
by:
(書目-電子資源)
Network intrusion analysismethodologies, tools, and techniques for incident analysis and response /
by:
(書目-電子資源)
The basics of information securityunderstanding the fundamentals of InfoSec in theory and practice /
by:
(書目-電子資源)
The basics of digital privacy :simple tools to protect your personal information and your identity online /
by:
(書目-語言資料,印刷品)
Architecting user-centric privacy-as-a-set-of-servicesdigital identity-related privacy framework /
by:
(書目-電子資源)
Trustworthy reconfigurable systemsenhancing the security capabilities of reconfigurable hardware architectures /
by:
(書目-電子資源)
Defense against the black artshow hackers do what they do and how to protect against it /
by:
(書目-電子資源)
10 don'ts on our digital devicesthe non-techie's survival guide to cyber security and privacy /
by:
(書目-電子資源)
A practical guide to TPM 2.0using the new Trusted Platform Module in the new age of security /
by:
(書目-電子資源)
Handbook of research on digital crime, cyberspace security, and information assurance /
by:
(書目-電子資源)
Collaboration with cloud computingsecurity, social media, and unified communications /
by:
(書目-電子資源)
The basics of information securityunderstanding the fundamentals of InfoSec in theory and practice /
by:
(書目-電子資源)
Enterprise cybersecurityhow to build a successful cyberdefense program against advanced threats /
by:
(書目-電子資源)
Cyber denial, deception and counter deceptiona framework for supporting active cyber defense /
by:
(書目-電子資源)
Network and system security9th International Conference, NSS 2015, New York, NY, USA, November 3-5, 2015 : proceedings /
by:
(書目-電子資源)
Provable security9th International Conference, ProvSec 2015, Kanazawa, Japan, November 24-26, 2015 : proceedings /
by:
(書目-電子資源)
Security protocols XXIII23rd International Workshop, Cambridge, UK, March 31 - April 2, 2015 : revised selected papers /
by:
(書目-電子資源)
Secure IT systems20th Nordic Conference, NordSec 2015, Stockholm, Sweden, October 19-21, 2015 : proceedings /
by:
(書目-電子資源)
Cryptography and coding15th IMA International Conference, IMACC 2015, Oxford, UK, December 15-17, 2015 : proceedings /
by:
(書目-電子資源)
Transactions on computational science XXVIspecial issue on cyberworlds and cybersecurity /
by:
(書目-電子資源)
Cyber-physical attack recovery proceduresa step-by-step preparation and response guide /
by:
(書目-電子資源)
Investigative computer forensicsthe practical guide for lawyers, accountants, investigators, and business executives /
by:
(書目-電子資源)
Security intelligencea practitioner's guide to solving enterprise security challenges /
by:
(書目-電子資源)
Safeguarding critical e-documentsimplementing a program for securing confidential information assets /
by:
(書目-電子資源)
Preserving privacy against side-channel leaksfrom data publishing to web applications /
by:
(書目-電子資源)
Cybersecurity for hospitals and healthcare facilitiesa guide to detection and prevention /
by:
(書目-電子資源)
Cryptology and network security15th International Conference, CANS 2016, Milan, Italy, November 14-16, 2016 : proceedings /
by:
(書目-電子資源)
Concurrency, security, and puzzlesessays dedicated to Andrew William Roscoe on the occasion of his 60th birthday /
by:
(書目-電子資源)
Transactions on large-scale data- and knowledge-centered systems XXXIspecial issue on data and security engineering /
by:
(書目-電子資源)
Hardware security and trustdesign and deployment of integrated circuits in a threatened environment /
by:
(書目-電子資源)
Engineering information securitythe application of systems engineering concepts to achieve information assurance /
by:
(書目-電子資源)
Introduction to intelligent surveillancesurveillance data capture, transmission, and analytics /
by:
(書目-電子資源)
Transactions on computational science XXXSpecial Issue on Cyberworlds and Cybersecurity /
by:
(書目-電子資源)
Building a HIPAA-compliant cybersecurity programusing NIST 800-30 and CSF to secure protected health information /
by:
(書目-電子資源)
Privileged attack vectorsbuilding effective cyber-defense strategies to protect organizations /
by:
(書目-電子資源)
Enterprise cybersecurity study guidehow to build a successful cyberdefense program against advanced threats /
by:
(書目-電子資源)
A guide to the National Initiative for Cybersecurity Education (NICE) cybersecurity workforce framework (2.0)
by:
(書目-電子資源)
Physically unclonable functionsfrom basic design principles to advanced hardware security applications /
by:
(書目-電子資源)
Building a corporate culture of securitystrategies for strengthening organizational resiliency /
by:
(書目-電子資源)
The basics of digital privacysimple tools to protect your personal information and your identity online /
by:
(書目-電子資源)
Asset attack vectorsbuilding effective vulnerability management strategies to protect organizations /
by:
(書目-電子資源)
Guide to vulnerability analysis for computer networks and systemsan artificial intelligence approach /
by:
(書目-電子資源)
Firewalls don't stop dragonsa step-by-step guide to computer security for non-techies /
by:
(書目-電子資源)
From database to cyber securityessays dedicated to Sushil Jajodia on the occasion of his 70th birthday /
by:
(書目-電子資源)
Networked predictive control of systems with communication constraints and cyber attacks
by:
(書目-電子資源)
Introduction to intelligent surveillancesurveillance data capture, transmission, and analytics /
by:
(書目-電子資源)
Guide to automotive connectivity and cybersecuritytrends, technologies, innovations and applications /
by:
(書目-電子資源)
Autonomous cyber deceptionreasoning, adaptive planning, and evaluation of HoneyThings /
by:
(書目-電子資源)
Advanced methodologies and technologies in system security, information privacy, and forensics
by:
(書目-電子資源)
Countering cyber attacks and preserving the integrity and availability of critical systems
by:
(書目-電子資源)
From corporate security to commercial force :a business leader's guide to security economics /
by:
(書目-電子資源)
Navigating new cyber riskshow businesses can plan, build and manage safe spaces in the digital age /
by:
(書目-電子資源)
Cybersecurity and secure information systemschallenges and solutions in smart environments /
by:
(書目-電子資源)
Trustworthy cyber-physical systemsa systematic framework towards design and evaluation of trust and trustworthiness /
by:
(書目-電子資源)
Practical security properties on commodity computing platformsthe uber extensible micro-hypervisor framework /
by:
(書目-電子資源)
System administration ethicsten commandments for security and compliance in a modern cyber world /
by:
(書目-電子資源)
Ransomware revealeda beginner's guide to protecting and recovering from ransomware attacks /
by:
(書目-電子資源)
Solving identity management in modern applicationsdemystifying OAuth 2.0, OpenID Connect, and SAML 2.0 /
by:
(書目-電子資源)
Building a cybersecurity culture in organizationshow to bridge the gap between people and digital technology /
by:
(書目-電子資源)
Transactions on computational science XXXVIspecial issue on cyberworlds and cybersecurity /
by:
(書目-電子資源)
Binary code fingerprinting for cybersecurityapplication to malicious code fingerprinting /
by:
(書目-電子資源)
Designing a HIPAA-compliant security operations centera guide to detecting and responding to healthcare breaches and events /
by:
(書目-電子資源)
Identity attack vectorsimplementing an effective identity and access management solution /
by:
(書目-電子資源)
Combating security challenges in the age of big datapowered by state-of-the-art artificial intelligence techniques /
by:
(書目-電子資源)
Securing social identity in mobile platformstechnologies for for security, privacy and identity management /
by:
(書目-電子資源)
Information security analyticsfinding security insights, patterns, and anomalies in big data /
by:
(書目-電子資源)
The science and technology of counterterrorismmeasuring physical and electronic security risk /
by:
(書目-電子資源)
Rational cybersecurity for businessthe security leaders' guide to business alignment /
by:
(書目-電子資源)
Security and trust management16th International Workshop, STM 2020, Guildford, UK, September 17-18, 2020 : proceedings /
by:
(書目-電子資源)
Firewalls don't stop dragonsa step-by-step guide to computer security for non-techies /
by:
(書目-電子資源)
Malware analysis and detection engineeringa comprehensive approach to detect and analyze modern malware /
by:
(書目-電子資源)
Beginning security with Microsoft technologiesprotecting Office 365, devices, and data /
by:
(書目-電子資源)
Linking sensitive datamethods and techniques for practical privacy-preserving information sharing /
by:
(書目-電子資源)
Logic, language, and securityessays dedicated to Andre Scedrov on the occasion of his 65th birthday /
by:
(書目-電子資源)
Cross-layer design for secure and resilient cyber-physical systemsa decision and game theoretic approach /
by:
(書目-電子資源)
Cyber security17th China Annual Conference, CNCERT 2020, Beijing, China, August 12, 2020 : revised selected papers /
by:
(書目-電子資源)
Data privacy and trust in cloud computingbuilding trust in the cloud through assurance and accountability /
by:
(書目-電子資源)
Red Hat and IT securitywith Red Hat Ansible, Red Hat OpenShift, and Red Hat security auditing /
by:
(書目-電子資源)
Building decentralized trustmultidisciplinary perspectives on the design of blockchains and distributed ledgers /
by:
(書目-電子資源)
Internet of Things and access controlsensing, monitoring and controlling access in IoT-enabled healthcare systems /
by:
(書目-電子資源)
Novel techniques in recovering, embedding, and enforcing policies for control-flow integrity
by:
(書目-電子資源)
Artificial intelligence for cyber securitymethods, issues and possible horizons or opportunities /
by:
(書目-電子資源)
Android software internals quick referencea field manual and security reference guide to Java-based Android components /
by:
(書目-電子資源)
Android malware detection using machine learningdata-driven fingerprinting and threat intelligence /
by:
(書目-電子資源)
New methods and tools for intelligent data processing and information security systems
by:
(書目-電子資源)
Tribe of hackers, security leaderstribal knowledge from the best in cybersecurity leadership /
by:
(書目-電子資源)
The CISO'S next frontierAI, post-quantum cryptography and advanced security paradigms /
by:
(書目-電子資源)
Azure security handbooka comprehensive guide for defending your enterprise environment /
by:
(書目-電子資源)
Introduction to privacy enhancing technologiesa classification-based approach to understanding PETs /
by:
(書目-電子資源)
The next era in hardware securitya perspective on emerging technologies for secure electronics /
by:
(書目-電子資源)
Cyber crisis managementthe practical handbook on crisis management and crisis communication /
by:
(書目-電子資源)
Phishing and communication channelsa guide to identifying and mitigating phishing attacks /
by:
(書目-電子資源)
Towards an increased securitygreen innovations, intellectual property protection and information security /
by:
(書目-電子資源)
Explainable artificial intelligence for cyber securitynext generation artificial intelligence /
by:
(書目-電子資源)
Cryptography and cryptanalysis in Javacreating and programming advanced algorithms with Java SE 17 LTS and Jakarta EE 10 /
by:
(書目-電子資源)
Snowflake access controlmastering the features for data privacy and regulatory compliance /
by:
(書目-電子資源)
Security and resilience in intelligent data-centric systems and communication networks
by:
(書目-電子資源)
Security compliance in model-driven development of software systems in presence of long-term evolution and variants
by:
(書目-電子資源)
Citizen privacy frameworkcase of a fuzzy-based recommender system for political participation /
by:
(書目-電子資源)
Security issues in fog computing from 5G to 6Garchitectures, applications and solutions /
by:
(書目-電子資源)
Understanding cybersecurity management in decentralized financechallenges, strategies, and trends /
by:
(書目-電子資源)
Handbook of biometric anti-spoofingpresentation attack detection and vulnerability assessment /
by:
(書目-電子資源)
Firewalls don't stop dragonsa step-by-step guide to computer security and privacy for non-techies /
by:
(書目-電子資源)
An introduction to secret sharinga systematic overview and guide for protocol selection /
by:
(書目-電子資源)
Emerging ICT technologies and cybersecurityfrom AI and ML to other futuristic technologies /
by:
(書目-電子資源)
Guide to cybersecurity in digital transformationtrends, methods, technologies, applications and best practices /
by:
(書目-電子資源)
Handbook of research on cybersecurity issues and challenges for business and FinTech applications
by:
(書目-電子資源)
Solving identity management in modern applicationsdemystifying OAuth 2.0, OpenID Connect, and SAML 2 /
by:
(書目-電子資源)
Azure security for critical workloadsimplementing modern security controls for authentication, authorization and auditing /
by:
(書目-電子資源)
Safety in the digital agesociotechnical perspectives on algorithms and machine learning /
by:
(書目-電子資源)
Demystifying intelligent multimode security systemsan edge-to-cloud cybersecurity solutions guide /
by:
(書目-電子資源)
更多
較少的
主題