Internet - Security measures.
Overview
Works: | 78 works in 43 publications in 43 languages |
---|
Titles
E-commerce and internet risk management, contingency planning and business continuity :best practices for e-commerce risk control.
by:
(Language materials, printed)
Securing e-business systems :a guide for managers and executives /
by:
(Language materials, printed)
Cryptography for Internet and database applications :developing secret and public key techniques with Java /
by:
(Language materials, printed)
Internet security :cryptographic principles, algorithms, and protocols /
by:
(Language materials, printed)
Web service security :scenarios, patterns, and implementation guidance for Web services enhancements (WSE) 3.0 /
by:
(Language materials, printed)
The executive guide to information security :threats, challenges, and solutions /
by:
(Language materials, printed)
Securing Web services :practical usage of standards and specifications /
by:
(Language materials, printed)
The web application hacker's handbook :discovering and exploiting security flaws /
by:
(Language materials, printed)
Essential computer securityeveryone's guide to e-mail, Internet, and wireless security /
by:
(Electronic resources)
Advances in cyber security :technology, operations, and experiences /
by:
(Language materials, printed)
Network intrusion analysismethodologies, tools, and techniques for incident analysis and response /
by:
(Electronic resources)
Cyberpatternsunifying design patterns with security and attack patterns /
by:
(Electronic resources)
Engineering secure future internet services and systemscurrent research /
by:
(Electronic resources)
The manager's guide to web application securitya concise guide to the weaker side of the web /
by:
(Electronic resources)
Handbook of research on redesigning the future of internet architectures /
by:
(Electronic resources)
Self- and co-regulation in cybercrime, cybersecurity and national security
by:
(Electronic resources)
Enterprise cybersecurityhow to build a successful cyberdefense program against advanced threats /
by:
(Electronic resources)
Preserving privacy against side-channel leaksfrom data publishing to web applications /
by:
(Electronic resources)
The second economythe race for trust, treasure and time in the cybersecurity war /
by:
(Electronic resources)
Introduction to cybercrimecomputer crimes, laws, and policing in the 21st century /
by:
(Electronic resources)
RIoT controlunderstanding and managing risks and the internet of things /
by:
(Electronic resources)
Transactions on computational science XXXSpecial Issue on Cyberworlds and Cybersecurity /
by:
(Electronic resources)
Situational privacy and self-disclosurecommunication processes in online environments /
by:
(Electronic resources)
Sweetie 2.0using artificial intelligence to fight webcam child sex tourism /
by:
(Electronic resources)
Computer security and the internettools and jewels from malware to bitcoin /
by:
(Electronic resources)
The complete guide to SCIONfrom design principles to formal verification /
by:
(Electronic resources)
Cyber security and threatsconcepts, methodologies, tools, and applications /
by:
(Electronic resources)
Guide to internet cryptographysecurity protocols and real-world attack implications /
by:
(Electronic resources)
A comprehensive guide for Web3 securityfrom technology, economic and legal aspects /
by:
(Electronic resources)
Show more
Fewer
Subjects