Computer networks - Security measures.
概要
作品: | 449 作品在 267 項出版品 267 種語言 |
---|
書目資訊
Error correcting coding and security for data networks :analysis of the superchannel concept /
by:
(書目-語言資料,印刷品)
Security in fixed and wireless networks :an introduction to securing data communications /
by:
(書目-語言資料,印刷品)
How to break Web software :functional and security testing of Web applications and Web services /
by:
(書目-語言資料,印刷品)
Security in fixed and wireless networks an introduction to securing data communications /
by:
(書目-電子資源)
Web service security :scenarios, patterns, and implementation guidance for Web services enhancements (WSE) 3.0 /
by:
(書目-語言資料,印刷品)
Enterprise information systems assurance and system security :managerial and technical issues /
by:
(書目-語言資料,印刷品)
The Making of Information SystemsSoftware Engineering and Management in a Globalized World /
by:
(書目-電子資源)
Wireshark & Ethereal network protocol analyzer toolkit, Jay Beale's open source security series
by:
(書目-電子資源)
Hack the stackusing Snort and Ethereal to master the 8 layers of an insecure network /
by:
(書目-電子資源)
Visualization for Computer Security5th International Workshop, VizSec 2008, Cambridge, MA, USA, September 15, 2008. Proceedings /
by:
(書目-語言資料,印刷品)
Counter hack reloaded :a step-by-step guide to computer attacks and effective defenses /
by:
(書目-語言資料,印刷品)
Statistical techniques for network security :modern statistically-based intrusion detection and protection /
by:
(書目-語言資料,印刷品)
Home and small business guide to protecting your computer network, electronic assets, and privacy
by:
(書目-電子資源)
Health-care telematics in Germanydesign and application of a security analysis method /
by:
(書目-電子資源)
Cisco router and switch forensicsinvestigating and analyzing malicious network activity /
by:
(書目-電子資源)
Digital forensics for network, Internet, and cloud computinga forensic evidence guide for moving targets and data /
by:
(書目-電子資源)
Identity and access management in cloud computing :developing a prototype of identity and access management in cloud computing /
by:
(書目-語言資料,印刷品)
Cloud computing security :high-impact emerging technology - what you need to know : definitions, adoptions, impact, benefits, maturity, vendors /
by:
(書目-語言資料,印刷品)
Critical infrastructure protectioninformation infrastructure models, analysis, and defense /
by:
(書目-電子資源)
Strategic and practical approaches for information security governancetechnologies and applied solutions /
by:
(書目-電子資源)
Situational awareness in computer network defenseprinciples, methods and applications /
by:
(書目-電子資源)
Information assurance and security technologies for risk assessment and threat managementadvances /
by:
(書目-電子資源)
Advanced persistent threatunderstanding the danger and how to protect your organization /
by:
(書目-電子資源)
Security risk managementbuilding an information security risk management program from the ground up /
by:
(書目-電子資源)
Windows registry forensicsadvanced digital forensic analysis of the Windows registry /
by:
(書目-電子資源)
PCI complianceunderstand and implement effective PCI data security standard compliance /
by:
(書目-電子資源)
Network intrusion analysismethodologies, tools, and techniques for incident analysis and response /
by:
(書目-電子資源)
The basics of cyber warfareunderstanding the fundamentals of cyber warfare in theory and practice /
by:
(書目-電子資源)
The basics of information securityunderstanding the fundamentals of InfoSec in theory and practice /
by:
(書目-電子資源)
The basics of digital privacy :simple tools to protect your personal information and your identity online /
by:
(書目-語言資料,印刷品)
Architecting user-centric privacy-as-a-set-of-servicesdigital identity-related privacy framework /
by:
(書目-電子資源)
Security risks in social media technologies safe practices in public service applications /
by:
(書目-電子資源)
Defense against the black artshow hackers do what they do and how to protect against it /
by:
(書目-電子資源)
Authentication in insecure environmentsusing visual cryptography and non-transferable credentials in practise /
by:
(書目-語言資料,印刷品)
10 don'ts on our digital devicesthe non-techie's survival guide to cyber security and privacy /
by:
(書目-電子資源)
A practical guide to TPM 2.0using the new Trusted Platform Module in the new age of security /
by:
(書目-電子資源)
Security, privacy, trust, and resource management in mobile and wireless communications /
by:
(書目-電子資源)
Handbook of research on digital crime, cyberspace security, and information assurance /
by:
(書目-電子資源)
The basics of information securityunderstanding the fundamentals of InfoSec in theory and practice /
by:
(書目-電子資源)
Security intelligencea practitioner's guide to solving enterprise security challenges /
by:
(書目-電子資源)
Virtuality and capabilities in a world of ambient intelligencenew challenges to privacy and data protection /
by:
(書目-電子資源)
Cybersecurity for hospitals and healthcare facilitiesa guide to detection and prevention /
by:
(書目-電子資源)
Operations research, engineering, and cyber securitytrends in applied mathematics and technology /
by:
(書目-電子資源)
Engineering information securitythe application of systems engineering concepts to achieve information assurance /
by:
(書目-電子資源)
The new era in U.S. national securityan introduction to emerging threats and challenges /
by:
(書目-電子資源)
Privileged attack vectorsbuilding effective cyber-defense strategies to protect organizations /
by:
(書目-電子資源)
Transactions on computational science XXXIspecial issue on signal processing and security in distributed systems /
by:
(書目-電子資源)
SDN and NFV securitysecurity analysis of software-defined networking and network function virtualization /
by:
(書目-電子資源)
Contemporary identity and access management architecturesemerging research and opportunities /
by:
(書目-電子資源)
A guide to the National Initiative for Cybersecurity Education (NICE) cybersecurity workforce framework (2.0)
by:
(書目-電子資源)
Security and privacy in cyber-physical systemsfoundations, principles, and applications /
by:
(書目-電子資源)
Network Performance and SecurityTesting and Analyzing Using Open Source and Low-Cost Tools /
by:
(書目-電子資源)
The basics of digital privacysimple tools to protect your personal information and your identity online /
by:
(書目-電子資源)
Guide to vulnerability analysis for computer networks and systemsan artificial intelligence approach /
by:
(書目-電子資源)
Autonomous cyber deceptionreasoning, adaptive planning, and evaluation of HoneyThings /
by:
(書目-電子資源)
Hacking web intelligence :open source intelligence and web reconnaissance concepts and techniques /
by:
(書目-電子資源)
Advanced methodologies and technologies in system security, information privacy, and forensics
by:
(書目-電子資源)
Countering cyber attacks and preserving the integrity and availability of critical systems
by:
(書目-電子資源)
The information systems security officer's guide :establishing and managing a cyber security program /
by:
(書目-電子資源)
Navigating new cyber riskshow businesses can plan, build and manage safe spaces in the digital age /
by:
(書目-電子資源)
Cybersecurity and secure information systemschallenges and solutions in smart environments /
by:
(書目-電子資源)
Bug bounty hunting for web securityfind and exploit vulnerabilities in web sites and applications /
by:
(書目-電子資源)
Zero trust networks with VMware NSXbuild highly secure network architectures for your data centers /
by:
(書目-電子資源)
Transactions on computational science XXXVspecial issue on signal processing and security in distributed systems /
by:
(書目-電子資源)
Designing a HIPAA-compliant security operations centera guide to detecting and responding to healthcare breaches and events /
by:
(書目-電子資源)
Privileged attack vectorsbuilding effective cyber-defense strategies to protect organizations /
by:
(書目-電子資源)
Rational cybersecurity for businessthe security leaders' guide to business alignment /
by:
(書目-電子資源)
Security and trust management16th International Workshop, STM 2020, Guildford, UK, September 17-18, 2020 : proceedings /
by:
(書目-電子資源)
Cross-layer design for secure and resilient cyber-physical systemsa decision and game theoretic approach /
by:
(書目-電子資源)
Cyber security17th China Annual Conference, CNCERT 2020, Beijing, China, August 12, 2020 : revised selected papers /
by:
(書目-電子資源)
Identification of pathogenic social media accountsfrom data to intelligence to prediction /
by:
(書目-電子資源)
Multi-site network and security services with NSX-Timplement network security, stateful services, and operations /
by:
(書目-電子資源)
Co-governed sovereignty networklegal basis and its prototype & applications with MIN architecture /
by:
(書目-電子資源)
The CISO'S next frontierAI, post-quantum cryptography and advanced security paradigms /
by:
(書目-電子資源)
Protocols, strands, and logicessays dedicated to Joshua Guttman on the the occasion of his 66.66th birthday /
by:
(書目-電子資源)
Understand, manage, and measure cyber riskpractical solutions for creating a sustainable cyber program /
by:
(書目-電子資源)
Security and resilience in intelligent data-centric systems and communication networks
by:
(書目-電子資源)
Recent advanced in image security technologiesintelligent image, signal, and video processing /
by:
(書目-電子資源)
Emerging ICT technologies and cybersecurityfrom AI and ML to other futuristic technologies /
by:
(書目-電子資源)
Handbook of research on cybersecurity issues and challenges for business and FinTech applications
by:
(書目-電子資源)
Winning the national security AI competitiona practical guide for government and industry leaders /
by:
(書目-電子資源)
Azure security for critical workloadsimplementing modern security controls for authentication, authorization and auditing /
by:
(書目-電子資源)
Understand, manage, and measure cyber risk®practical solutions for creating a sustainable cyber program /
by:
(書目-電子資源)
Design and deploy Microsoft Defender for IoTleveraging cloud-based analytics and machine learning capabilities /
by:
(書目-電子資源)
Safe performance in a world of global networkscase studies, collaborative practices and governance principles /
by:
(書目-電子資源)
更多
較少的
主題