Computer networks - Security measures.
Overview
Works: | 449 works in 267 publications in 267 languages |
---|
Titles
The hacker's handbook :the strategy behind breaking into and defending networks /
by:
(Language materials, printed)
Error correcting coding and security for data networks :analysis of the superchannel concept /
by:
(Language materials, printed)
Security in fixed and wireless networks :an introduction to securing data communications /
by:
(Language materials, printed)
Special ops :host and network security for Microsoft, UNIX, and Oracle /
by:
(Language materials, printed)
How to break Web software :functional and security testing of Web applications and Web services /
by:
(Language materials, printed)
Security in fixed and wireless networks an introduction to securing data communications /
by:
(Electronic resources)
Hacking exposed Cisco networks :Cisco security secrets & solutions /
by:
(Language materials, printed)
Web service security :scenarios, patterns, and implementation guidance for Web services enhancements (WSE) 3.0 /
by:
(Language materials, printed)
Enterprise information systems assurance and system security :managerial and technical issues /
by:
(Language materials, printed)
The business case for network security :advocacy, governance, and ROI /
by:
(Language materials, printed)
The Making of Information SystemsSoftware Engineering and Management in a Globalized World /
by:
(Electronic resources)
Public key infrastructurebuilding trusted applications and Web services /
by:
(Electronic resources)
Wireshark & Ethereal network protocol analyzer toolkit, Jay Beale's open source security series
by:
(Electronic resources)
Hack the stackusing Snort and Ethereal to master the 8 layers of an insecure network /
by:
(Electronic resources)
Visualization for Computer Security5th International Workshop, VizSec 2008, Cambridge, MA, USA, September 15, 2008. Proceedings /
by:
(Language materials, printed)
Foundations of security analysis and design IIFOSAD 2001/2002 turorial lectures /
by:
(Electronic resources)
Querying databases privatelya new approach to private information retrieval /
by:
(Electronic resources)
Computer security, privacy, and politicscurrent issues, challenges, and solutions /
by:
(Electronic resources)
Malware :Computer virus, Computer worm, Trojan horse (computing), Rootkit, Backdoor (computing), Spyware, Keystroke logging, Botnet, Web threat, Dialer, Vulnerability (computing), World Wide Web /
by:
(Language materials, printed)
Counter hack reloaded :a step-by-step guide to computer attacks and effective defenses /
by:
(Language materials, printed)
24 deadly sins of software security :programming flaws and how to fix them
by:
(Electronic resources)
Network intrusion detection and prevention :concepts and techniques /
by:
(Language materials, printed)
Statistical techniques for network security :modern statistically-based intrusion detection and protection /
by:
(Language materials, printed)
Disappearing cryptographyinformation hiding : steganography & watermarking /
by:
(Electronic resources)
Integrated security systems designconcepts, specifications, and implementation /
by:
(Electronic resources)
Secure networking - CQRE [Secure] '99International Exhibition and Congress, Dusseldorf, Germany, November 30-December 2, 1999 : proceedings /
by:
(Electronic resources)
Information assurance in computer networksmethods, models, and architectures for network security : international workshop MMM-ACNS 2001, St. Petersburg, Russia, May 21-23, 2001 /
by:
(Electronic resources)
Home and small business guide to protecting your computer network, electronic assets, and privacy
by:
(Electronic resources)
Health-care telematics in Germanydesign and application of a security analysis method /
by:
(Electronic resources)
Privacy onlineperspectives on privacy and self-disclosure in the social web /
by:
(Electronic resources)
Network security, administration, and managementadvancing technology and practice /
by:
(Electronic resources)
Cisco router and switch forensicsinvestigating and analyzing malicious network activity /
by:
(Electronic resources)
Digital forensics for network, Internet, and cloud computinga forensic evidence guide for moving targets and data /
by:
(Electronic resources)
Securing the cloud :cloud computer security techniques and tactics /
by:
(Language materials, printed)
Preventing good people from doing bad thingsimplementing least privilege /
by:
(Electronic resources)
Identity and access management in cloud computing :developing a prototype of identity and access management in cloud computing /
by:
(Language materials, printed)
Panda Cloud Antivirus :Panda Security, cloud computing, computer security /
by:
(Language materials, printed)
Cloud computing security :high-impact emerging technology - what you need to know : definitions, adoptions, impact, benefits, maturity, vendors /
by:
(Language materials, printed)
Foundations and practice of security4th Canada-France MITACS Workshop, FPS 2011, Paris, France, May 12-13, 2011 : revised selected papers /
by:
(Electronic resources)
Critical infrastructure protectioninformation infrastructure models, analysis, and defense /
by:
(Electronic resources)
Engineering secure two-party computation protocolsdesign, optimization, and applications of efficient secure function evaluation /
by:
(Electronic resources)
Strategic and practical approaches for information security governancetechnologies and applied solutions /
by:
(Electronic resources)
Optimizing information security and advancing privacy assurancenew technologies /
by:
(Electronic resources)
Situational awareness in computer network defenseprinciples, methods and applications /
by:
(Electronic resources)
Information assurance and security technologies for risk assessment and threat managementadvances /
by:
(Electronic resources)
Privacy, intrusion detection, and responsetechnologies for protecting networks /
by:
(Electronic resources)
Advances in cyber security :technology, operations, and experiences /
by:
(Language materials, printed)
Theory and practice of cryptography solutions for secure information systems
by:
(Electronic resources)
Wars of disruption and resiliencecybered conflict, power, and national security /
by:
(Electronic resources)
Advanced persistent threatunderstanding the danger and how to protect your organization /
by:
(Electronic resources)
Professional penetration testingcreating and operating a formal hacking lab /
by:
(Electronic resources)
Security risk managementbuilding an information security risk management program from the ground up /
by:
(Electronic resources)
Hacking web appsdetecting and preventing web application security problems /
by:
(Electronic resources)
Windows registry forensicsadvanced digital forensic analysis of the Windows registry /
by:
(Electronic resources)
PCI complianceunderstand and implement effective PCI data security standard compliance /
by:
(Electronic resources)
Network intrusion analysismethodologies, tools, and techniques for incident analysis and response /
by:
(Electronic resources)
The basics of cyber warfareunderstanding the fundamentals of cyber warfare in theory and practice /
by:
(Electronic resources)
The basics of information securityunderstanding the fundamentals of InfoSec in theory and practice /
by:
(Electronic resources)
The basics of digital privacy :simple tools to protect your personal information and your identity online /
by:
(Language materials, printed)
Learning Nessus for penetration testing :master how to perform IT infrastructure security vulnerability assessments using Nessus with tips and insights from real-world challenges faced during vulnerability assessment /
by:
(Language materials, printed)
Topics in cryptology - CT-RSA 2014the Cryptographer's track at the RSA Conference 2014, San Francisco, CA, USA, February 25-28, 2014 : proceedings /
by:
(Electronic resources)
Cyberpatternsunifying design patterns with security and attack patterns /
by:
(Electronic resources)
Engineering secure future internet services and systemscurrent research /
by:
(Electronic resources)
Architecting user-centric privacy-as-a-set-of-servicesdigital identity-related privacy framework /
by:
(Electronic resources)
Security risks in social media technologies safe practices in public service applications /
by:
(Electronic resources)
Defense against the black artshow hackers do what they do and how to protect against it /
by:
(Electronic resources)
Authentication in insecure environmentsusing visual cryptography and non-transferable credentials in practise /
by:
(Language materials, printed)
10 don'ts on our digital devicesthe non-techie's survival guide to cyber security and privacy /
by:
(Electronic resources)
A practical guide to TPM 2.0using the new Trusted Platform Module in the new age of security /
by:
(Electronic resources)
Architectures and protocols for secure information technology infrastructures /
by:
(Electronic resources)
Security, privacy, trust, and resource management in mobile and wireless communications /
by:
(Electronic resources)
Handbook of research on digital crime, cyberspace security, and information assurance /
by:
(Electronic resources)
Handbook of research on threat detection and countermeasures in network security /
by:
(Electronic resources)
The basics of information securityunderstanding the fundamentals of InfoSec in theory and practice /
by:
(Electronic resources)
Cyber operationsbuilding, defending, and attacking modern computer networks /
by:
(Electronic resources)
Risk centric threat modelingprocess for attack simulation and threat analysis /
by:
(Electronic resources)
Security intelligencea practitioner's guide to solving enterprise security challenges /
by:
(Electronic resources)
Virtuality and capabilities in a world of ambient intelligencenew challenges to privacy and data protection /
by:
(Electronic resources)
Cybersecurity for hospitals and healthcare facilitiesa guide to detection and prevention /
by:
(Electronic resources)
The second economythe race for trust, treasure and time in the cybersecurity war /
by:
(Electronic resources)
From hacking to report writingan introduction to security and penetration testing /
by:
(Electronic resources)
Secure ICT service provisioning for cloud, mobile and beyondESARIS: the answer to the demands of industrialized IT production balancing between buyers and providers /
by:
(Electronic resources)
Operations research, engineering, and cyber securitytrends in applied mathematics and technology /
by:
(Electronic resources)
Cyber security, simply, make it happenleveraging digitization through IT security /
by:
(Electronic resources)
Engineering information securitythe application of systems engineering concepts to achieve information assurance /
by:
(Electronic resources)
Handbook of system safety and securitycyber risk and risk management, cyber security, threat analysis, functional safety, software systems, and cyber physical systems /
by:
(Electronic resources)
The new era in U.S. national securityan introduction to emerging threats and challenges /
by:
(Electronic resources)
What every engineer should know about cyber security and digital forensics
by:
(Electronic resources)
Advanced persistent trainingtake your security awareness program to the next level /
by:
(Electronic resources)
Cyber security on Azurean IT professionals guide to Microsoft Azure security center /
by:
(Electronic resources)
Guide to security in SDN and NFVchallenges, opportunities, and applications /
by:
(Electronic resources)
Privileged attack vectorsbuilding effective cyber-defense strategies to protect organizations /
by:
(Electronic resources)
Transactions on computational science XXXIspecial issue on signal processing and security in distributed systems /
by:
(Electronic resources)
SDN and NFV securitysecurity analysis of software-defined networking and network function virtualization /
by:
(Electronic resources)
Contemporary identity and access management architecturesemerging research and opportunities /
by:
(Electronic resources)
A guide to the National Initiative for Cybersecurity Education (NICE) cybersecurity workforce framework (2.0)
by:
(Electronic resources)
Security and privacy in cyber-physical systemsfoundations, principles, and applications /
by:
(Electronic resources)
Network Performance and SecurityTesting and Analyzing Using Open Source and Low-Cost Tools /
by:
(Electronic resources)
The basics of digital privacysimple tools to protect your personal information and your identity online /
by:
(Electronic resources)
Open source intelligence methods and toolsa practical guide to online intelligence /
by:
(Electronic resources)
Guide to vulnerability analysis for computer networks and systemsan artificial intelligence approach /
by:
(Electronic resources)
Cyber operationsbuilding, defending, and attacking modern computer networks /
by:
(Electronic resources)
Autonomous cyber deceptionreasoning, adaptive planning, and evaluation of HoneyThings /
by:
(Electronic resources)
The NICE cyber security frameworkcyber security intelligence and analytics /
by:
(Electronic resources)
Hacking web intelligence :open source intelligence and web reconnaissance concepts and techniques /
by:
(Electronic resources)
Advanced methodologies and technologies in system security, information privacy, and forensics
by:
(Electronic resources)
Countering cyber attacks and preserving the integrity and availability of critical systems
by:
(Electronic resources)
A study of black hole attack solutions :on AODV routing protocol in MANET /
by:
(Electronic resources)
Theoretical and experimental methods for defending against DDoS attacks /
by:
(Electronic resources)
The information systems security officer's guide :establishing and managing a cyber security program /
by:
(Electronic resources)
Security operations center guidebook :a practical guide for a successful SOC /
by:
(Electronic resources)
Five technological forces disrupting security :how cloud, social, mobile, big data and IoT are transforming physical security in the digital age /
by:
(Electronic resources)
Navigating new cyber riskshow businesses can plan, build and manage safe spaces in the digital age /
by:
(Electronic resources)
Cybersecurity and secure information systemschallenges and solutions in smart environments /
by:
(Electronic resources)
Practical cyber forensicsan incident-based approach to forensic investigations /
by:
(Electronic resources)
Stochastic models in reliability, network security and system safetyessays dedicated to Professor Jinhua Cao on the occasion of his 80th birthday /
by:
(Electronic resources)
Bug bounty hunting for web securityfind and exploit vulnerabilities in web sites and applications /
by:
(Electronic resources)
Pro Spring securitysecuring Spring Framework 5 and Boot 2-based Java applications /
by:
(Electronic resources)
Zero trust networks with VMware NSXbuild highly secure network architectures for your data centers /
by:
(Electronic resources)
Transactions on computational science XXXVspecial issue on signal processing and security in distributed systems /
by:
(Electronic resources)
Designing a HIPAA-compliant security operations centera guide to detecting and responding to healthcare breaches and events /
by:
(Electronic resources)
Implementing computational intelligence techniques for security systems design
by:
(Electronic resources)
Privileged attack vectorsbuilding effective cyber-defense strategies to protect organizations /
by:
(Electronic resources)
How to define and build an effective cyber threat intelligence capability
by:
(Electronic resources)
Rational cybersecurity for businessthe security leaders' guide to business alignment /
by:
(Electronic resources)
Security and trust management16th International Workshop, STM 2020, Guildford, UK, September 17-18, 2020 : proceedings /
by:
(Electronic resources)
Serverless securityunderstand, assess, and implement secure and reliable applications in AWS, Microsoft Azure, and Google Cloud /
by:
(Electronic resources)
Detection of false data injection attacks in smart grid cyber-physical systems
by:
(Electronic resources)
Cross-layer design for secure and resilient cyber-physical systemsa decision and game theoretic approach /
by:
(Electronic resources)
Cyber security17th China Annual Conference, CNCERT 2020, Beijing, China, August 12, 2020 : revised selected papers /
by:
(Electronic resources)
Identification of pathogenic social media accountsfrom data to intelligence to prediction /
by:
(Electronic resources)
The theory of hash functions and random oraclesan approach to modern cryptography /
by:
(Electronic resources)
Multi-site network and security services with NSX-Timplement network security, stateful services, and operations /
by:
(Electronic resources)
Digital transformation, cyber security and resilience of modern societies
by:
(Electronic resources)
Data breach preparation and responsebreaches are certain, impact is not /
by:
(Electronic resources)
Advanced persistent securitya cyberwarfare approach to implementing adaptive enterprise protection, detection, and reaction strategies /
by:
(Electronic resources)
Safety of web applicationsrisks, encryption and handling vulnerabilities with PHP /
by:
(Electronic resources)
Handbook of research on machine and deep learning applications for cyber security
by:
(Electronic resources)
Co-governed sovereignty networklegal basis and its prototype & applications with MIN architecture /
by:
(Electronic resources)
The CISO'S next frontierAI, post-quantum cryptography and advanced security paradigms /
by:
(Electronic resources)
Protocols, strands, and logicessays dedicated to Joshua Guttman on the the occasion of his 66.66th birthday /
by:
(Electronic resources)
Understand, manage, and measure cyber riskpractical solutions for creating a sustainable cyber program /
by:
(Electronic resources)
Cybersecurity of digital service chainschallenges, methodologies, and tools /
by:
(Electronic resources)
Information security technologies in the decentralized distributed networks
by:
(Electronic resources)
Security and resilience in intelligent data-centric systems and communication networks
by:
(Electronic resources)
Intelligent network management and controlintelligent security, multi-criteria optimization, cloud computing, Internet of Vehicles, intelligent radio /
by:
(Electronic resources)
Secure web application developmenta hands-on guide with Python and Django /
by:
(Electronic resources)
Recent advanced in image security technologiesintelligent image, signal, and video processing /
by:
(Electronic resources)
Fundamentals of information securitya complete go-to guide for beginners to understand all the aspects of information security /
by:
(Electronic resources)
Emerging ICT technologies and cybersecurityfrom AI and ML to other futuristic technologies /
by:
(Electronic resources)
The NICE cyber security frameworkcyber security intelligence and analytics /
by:
(Electronic resources)
Handbook of research on cybersecurity issues and challenges for business and FinTech applications
by:
(Electronic resources)
Countering cyberterrorismthe confluence of artificial intelligence, cyber forensics and digital policing in US and UK national cybersecurity /
by:
(Electronic resources)
Winning the national security AI competitiona practical guide for government and industry leaders /
by:
(Electronic resources)
Azure security for critical workloadsimplementing modern security controls for authentication, authorization and auditing /
by:
(Electronic resources)
Wireshark for network forensicsan essential guide for IT and cloud professionals /
by:
(Electronic resources)
Understand, manage, and measure cyber risk®practical solutions for creating a sustainable cyber program /
by:
(Electronic resources)
Design and deploy Microsoft Defender for IoTleveraging cloud-based analytics and machine learning capabilities /
by:
(Electronic resources)
Safe performance in a world of global networkscase studies, collaborative practices and governance principles /
by:
(Electronic resources)
Pro Spring securitysecuring Spring Framework 6 and Boot 3-based Java applications /
by:
(Electronic resources)
Enterprise cyber risk management as a value creatorleverage cybersecurity for competitive advantage /
by:
(Electronic resources)
Show more
Fewer
Subjects