Security.
概要
作品: | 309 作品在 309 項出版品 309 種語言 |
---|
書目資訊
Cybersecurity for hospitals and healthcare facilitiesa guide to detection and prevention /
by:
(書目-電子資源)
Information systems security12th International Conference, ICISS 2016, Jaipur, India, December 16-20, 2016 : proceedings /
by:
(書目-電子資源)
Practical information security managementa complete guide to planning and implementation /
by:
(書目-電子資源)
Applications for future internetInternational Summit, AFI 2016, Puebla, Mexico, May 25-28, 2016 : revised selected papers /
by:
(書目-電子資源)
Ad hoc networks8th International Conference, ADHOCNETS 2016, Ottawa, Canada, September 26-27, 2016 : revised selected papers /
by:
(書目-電子資源)
Mathematics and computingthird International Conference, ICMC 2017, Haldia, India, January 17-21, 2017 : proceedings /
by:
(書目-電子資源)
Cyber and chemical, biological, radiological, nuclear, explosives challengesthreats and counter efforts /
by:
(書目-電子資源)
Building a HIPAA-compliant cybersecurity programusing NIST 800-30 and CSF to secure protected health information /
by:
(書目-電子資源)
Information systems security13th International Conference, ICISS 2017, Mumbai, India, December 16-20, 2017 : proceedings /
by:
(書目-電子資源)
5G for future wireless networksfirst International Conference, 5GWN 2017, Beijing, China, April 21-23, 2017 : proceedings /
by:
(書目-電子資源)
Privileged attack vectorsbuilding effective cyber-defense strategies to protect organizations /
by:
(書目-電子資源)
Ad hoc networks9th International Conference, AdHocNets 2017, Niagara Falls, ON, Canada, September 28-29, 2017 : proceedings /
by:
(書目-電子資源)
Fundamentals and applications of hardcopy communicationconveying side information by printed media /
by:
(書目-電子資源)
Transactions on computational science XXXIIspecial issue on cybersecurity and biometrics /
by:
(書目-電子資源)
Information technology - new generations15th International Conference on Information Technology /
by:
(書目-電子資源)
Enterprise cybersecurity study guidehow to build a successful cyberdefense program against advanced threats /
by:
(書目-電子資源)
Big data technologies for monitoring of computer securitya case study of the Russian Federation /
by:
(書目-電子資源)
Future network systems and security4th International Conference, FNSS 2018, Paris, France, July 9-11, 2018 : proceedings /
by:
(書目-電子資源)
Asset attack vectorsbuilding effective vulnerability management strategies to protect organizations /
by:
(書目-電子資源)
Defending IoT infrastructures with the Raspberry Pimonitoring and detecting nefarious behavior in real time /
by:
(書目-電子資源)
Firewalls don't stop dragonsa step-by-step guide to computer security for non-techies /
by:
(書目-電子資源)
Electronic votingthird International Joint Conference, E-Vote-ID 2018, Bregenz, Austria, October 2-5, 2018 : proceedings /
by:
(書目-電子資源)
Cybersecurity incident responsehow to contain, eradicate, and recover from incidents /
by:
(書目-電子資源)
Smart blockchainfirst International Conference, SmartBlock 2018, Tokyo, Japan, December 10-12, 2018 : proceedings /
by:
(書目-電子資源)
Smart MultimediaFirst International Conference, ICSM 2018, Toulon, France, August 24-26, 2018 : revised selected papers /
by:
(書目-電子資源)
Information systems security14th International Conference, ICISS 2018, Bangalore, India, December 17-19, 2018 : proceedings /
by:
(書目-電子資源)
Securing the perimeterdeploying identity and access management with free open source software /
by:
(書目-電子資源)
Security protocols XXVI26th International Workshop, Cambridge, UK, March 19-21, 2018 : revised selected papers /
by:
(書目-電子資源)
Beginning ethical hacking with Kali Linuxcomputational techniques for resolving security issues /
by:
(書目-電子資源)
Building a comprehensive IT security programbpractical guidelines and best practices /
by:
(書目-電子資源)
Networked predictive control of systems with communication constraints and cyber attacks
by:
(書目-電子資源)
Critical infrastructure security and resiliencetheories, methods, tools and technologies /
by:
(書目-電子資源)
Autonomous cyber deceptionreasoning, adaptive planning, and evaluation of HoneyThings /
by:
(書目-電子資源)
Wireless internet11th EAI International Conference, WiCON 2018, Taipei, Taiwan, October 15-16, 2018 : proceedings /
by:
(書目-電子資源)
Ad hoc networks10th EAI International Conference, ADHOCNETS 2018, Cairns, Australia, September 20-23, 2018 : proceedings /
by:
(書目-電子資源)
Pro Azure governance and securitya comprehensive guide to Azure policy, blueprints, Security Center, and Sentinel /
by:
(書目-電子資源)
Smart blockchainsecond International Conference, SmartBlock 2019, Birmingham, UK, October 11-13, 2019 : proceedings /
by:
(書目-電子資源)
System administration ethicsten commandments for security and compliance in a modern cyber world /
by:
(書目-電子資源)
Oracle database application securitywith Oracle Internet Directory, Oracle Access Manager, and Oracle Identity Manager /
by:
(書目-電子資源)
Ransomware revealeda beginner's guide to protecting and recovering from ransomware attacks /
by:
(書目-電子資源)
Bug bounty hunting for web securityfind and exploit vulnerabilities in web sites and applications /
by:
(書目-電子資源)
Zero trust networks with VMware NSXbuild highly secure network architectures for your data centers /
by:
(書目-電子資源)
Solving identity management in modern applicationsdemystifying OAuth 2.0, OpenID Connect, and SAML 2.0 /
by:
(書目-電子資源)
Security infrastructure technology for integrated utilization of big dataapplied to the living safety and medical fields /
by:
(書目-電子資源)
Proceedings of First International Conference on Computing, Communications, and Cyber-Security (IC4S 2019)
by:
(書目-電子資源)
21st century Prometheusmanaging CBRN safety and security affected by cutting-edge technologies /
by:
(書目-電子資源)
Binary code fingerprinting for cybersecurityapplication to malicious code fingerprinting /
by:
(書目-電子資源)
Transactions on computational science XXXVspecial issue on signal processing and security in distributed systems /
by:
(書目-電子資源)
Designing a HIPAA-compliant security operations centera guide to detecting and responding to healthcare breaches and events /
by:
(書目-電子資源)
Analysis and design of next-generation software architectures5G, IoT, Blockchain, and Quantum Computing /
by:
(書目-電子資源)
Blockchain technology for industry 4.0secure, decentralized, distributed and trusted industry environment /
by:
(書目-電子資源)
Identity attack vectorsimplementing an effective identity and access management solution /
by:
(書目-電子資源)
Implementing an information security management systemsecurity management based on ISO 27001 guidelines /
by:
(書目-電子資源)
Combating security challenges in the age of big datapowered by state-of-the-art artificial intelligence techniques /
by:
(書目-電子資源)
Privileged attack vectorsbuilding effective cyber-defense strategies to protect organizations /
by:
(書目-電子資源)
Security protocols XXVII27th International Workshop, Cambridge, UK, April 10-12, 2019 : revised selected papers /
by:
(書目-電子資源)
Rational cybersecurity for businessthe security leaders' guide to business alignment /
by:
(書目-電子資源)
Encryption for organizations and individualsbasics of contemporary and quantum cryptography /
by:
(書目-電子資源)
Firewalls don't stop dragonsa step-by-step guide to computer security for non-techies /
by:
(書目-電子資源)
Frontiers in cyber securitysecond International Conference, FCS 2019, Xi'an, China, November 15-17, 2019 : proceedings /
by:
(書目-電子資源)
Cryptography and coding17th IMA International Conference, IMACC 2019, Oxford, UK, December 16-18, 2019 : proceedings /
by:
(書目-電子資源)
Foundations of security, protocols, and equational reasoningessays dedicated to Catherine A. Meadows /
by:
(書目-電子資源)
Information systems security15th International Conference, ICISS 2019, Hyderabad, India, December 16-20, 2019 : proceedings /
by:
(書目-電子資源)
Beginning security with Microsoft technologiesprotecting Office 365, devices, and data /
by:
(書目-電子資源)
Advanced ASP.NET Core 3 Securityunderstanding hacks, attacks, and vulnerabilities to secure your website /
by:
(書目-電子資源)
Computer vision - ECCV 202016th European Conference, Glasgow, UK, August 23-28, 2020 : proceedings.Part III /
by:
(書目-電子資源)
Computer vision - ECCV 202016th European Conference, Glasgow, UK, August 23-28, 2020 : proceedings.Part XVII /
by:
(書目-電子資源)
Data privacy and trust in cloud computingbuilding trust in the cloud through assurance and accountability /
by:
(書目-電子資源)
Proceedings of International Conference on Frontiers in Computing and SystemsCOMSYS 2020 /
by:
(書目-電子資源)
Python testing with Seleniumlearn to implement different testing techniques using the Selenium WebDriver /
by:
(書目-電子資源)
更多
較少的
主題