Computer security.
概要
作品: | 856 作品在 469 項出版品 469 種語言 |
---|
書目資訊
Disaster proofing information systems = a complete methodology for eliminating single points of failure /
by:
(書目-語言資料,印刷品)
Finding and fixing vulnerabilities in information systems = the vulnerability assessment & mitigation methodology /
by:
(書目-語言資料,印刷品)
Protecting your library's digital sources = the essential guide to planning and preservation /
by:
(書目-語言資料,印刷品)
Security transformation = digital defense strategies to protect your company's reputation and market share /
by:
(書目-語言資料,印刷品)
Hack proofing your Web applications = the only way to stop a hacker is to think like one /
by:
(書目-語言資料,印刷品)
Linux system security : = an administrator's guide to open source security tools /
by:
(書目-語言資料,印刷品)
E-policy : = how to develop computer, E-mail, and Internet guidelines to protect your company and its assets /
by:
(書目-語言資料,印刷品)
Information hiding : = steganography and watermarking : attacks and countermeasures /
by:
(書目-語言資料,印刷品)
Multimedia security : = steganography and digital watermarking techniques for protection of intellectual property /
by:
(書目-語言資料,印刷品)
E-policy = how to develop computer, E-policy, and Internet guidelines to protect your company and its assets /
by:
(書目-電子資源)
Writing secure code = practical strategies and proven techniques for building secure applications in a networked world /
by:
(書目-語言資料,印刷品)
Multimedia security = steganography and digital watermarking techniques for protection of intellectual property /
by:
(書目-語言資料,印刷品)
Trojans, worms, and spyware = a computer security professional's guide to malicious code /
by:
(書目-語言資料,印刷品)
Security in fixed and wireless networks : = an introduction to securing data communications /
by:
(書目-語言資料,印刷品)
The art of software security assessment : = identifying and preventing software vulnerabilities /
by:
(書目-語言資料,印刷品)
Hack proofing your identity in the information age = protect your family on the internet! /
by:
(書目-語言資料,印刷品)
Enhanced Methods in Computer Security, Biometric and Artificial Intelligence Systems
by:
(書目-語言資料,印刷品)
Foundations of security analysis and design II = FOSAD 2001/2002 tutorial lectures /
by:
(書目-語言資料,印刷品)
Contingency planning and disaster recovery : = protecting your organization's resources /
by:
(書目-語言資料,印刷品)
Securing Windows server 2008 = prevent attacks from outside and inside your organization.
by:
(書目-語言資料,印刷品)
No tech hacking = a guide to social engineering, dumpster diving, and shoulder surfing /
by:
(書目-語言資料,印刷品)
Selected areas in cryptography = 5th annual international workshop, SAC'98, Kingston, Ontario, Canada, August 17-18, 1998 : proceedings /
by:
(書目-語言資料,印刷品)
Vulnerability analysis on the computer network security : = implementation and practices /
by:
(書目-語言資料,印刷品)
Vulnerability management : = software vulnerability, Gartner, vulnerability (computing) /
by:
(書目-語言資料,印刷品)
Cryptography, information theory, and error-correction : = a handbook for the 21st century /
by:
(書目-語言資料,印刷品)
Visualization for Computer Security = 5th International Workshop, VizSec 2008, Cambridge, MA, USA, September 15, 2008. Proceedings /
by:
(書目-語言資料,印刷品)
Engineering secure software and systems = First international symposium, ESSoS 2009, Leuven, Belgium, February 4-6, 2009, proceedings /
by:
(書目-語言資料,印刷品)
Security engineering with patterns = origins, theoretical models, and new applications /
by:
(書目-語言資料,印刷品)
Foundations of security analysis and design II = FOSAD 2001/2002 turorial lectures /
by:
(書目-語言資料,印刷品)
Essential computer security = everyone's guide to e-mail, Internet, and wireless security /
by:
(書目-語言資料,印刷品)
IT-security and privacy = design and use of privacy-enhancing security mechanisms /
by:
(書目-語言資料,印刷品)
Home and small business guide to protecting your computer network, electronic assets, and privacy
by:
(書目-語言資料,印刷品)
Cyber security standards, practices and industrial applications = systems and methodologies /
by:
(書目-電子資源)
Digital forensics for network, Internet, and cloud computing = a forensic evidence guide for moving targets and data /
by:
(書目-電子資源)
Virtualization and forensics = a digital forensic investigator's guide to virtual environments /
by:
(書目-電子資源)
Optimizing information security and advancing privacy assurance = new technologies /
by:
(書目-語言資料,印刷品)
Situational awareness in computer network defense = principles, methods and applications /
by:
(書目-語言資料,印刷品)
Privacy protection measures and technologies in business organizations = aspects and standards /
by:
(書目-語言資料,印刷品)
Information assurance and security technologies for risk assessment and threat management = advances /
by:
(書目-語言資料,印刷品)
Information security management metrics = a definitive guide to effective security monitoring and measurement /
by:
(書目-電子資源)
Cyber security for educational leaders : = a guide to understanding and implementing technology policies /
by:
(書目-語言資料,印刷品)
Advanced persistent threat = understanding the danger and how to protect your organization /
by:
(書目-電子資源)
Data hiding = exposing concealed data in multimedia, operating systems, mobile devices, and network protocols /
by:
(書目-電子資源)
Web application obfuscation DUP_1 = -/WAFs..Evasion..Filters//alert (/Obfuscation/)- /
by:
(書目-電子資源)
Windows registry forensics DUP_1 = advanced digital forensic analysis of the Windows registry /
by:
(書目-電子資源)
Network intrusion analysis DUP_1 = methodologies, tools, and techniques for incident analysis and response /
by:
(書目-電子資源)
The basics of information security = understanding the fundamentals of InfoSec in theory and practice /
by:
(書目-電子資源)
Architecting user-centric privacy-as-a-set-of-services = digital identity-related privacy framework /
by:
(書目-電子資源)
Trustworthy reconfigurable systems = enhancing the security capabilities of reconfigurable hardware architectures /
by:
(書目-電子資源)
Defense against the black arts = how hackers do what they do and how to protect against it /
by:
(書目-電子資源)
10 don'ts on our digital devices = the non-techie's survival guide to cyber security and privacy /
by:
(書目-電子資源)
Secure Internet programming = security issues for mobile and distributed objects /
by:
(書目-語言資料,印刷品)
Secure networking - CQRE [Secure] '99 = International Exhibition and Congress, Dusseldorf, Germany, November 30-December 2, 1999 : proceedings /
by:
(書目-語言資料,印刷品)
Safeguarding critical e-documents = implementing a program for securing confidential information assets /
by:
(書目-電子資源)
Building a HIPAA-compliant cybersecurity program = using NIST 800-30 and CSF to secure protected health information /
by:
(書目-電子資源)
A guide to the National Initiative for Cybersecurity Education (NICE) cybersecurity workforce framework (2.0)
by:
(書目-電子資源)
Click, click, who's there? = a family-based non-technical approach to help parents protect their children online /
by:
(書目-電子資源)
Introduction to intelligent surveillance = surveillance data capture, transmission, and analytics /
by:
(書目-電子資源)
State of the art in applied cryptography = course on computer security and industrial cryptography, Leuven, Belgium, June 3-6, 1997 : revised lectures /
by:
(書目-語言資料,印刷品)
A practical guide to TPM 2.0 = using the new Trusted Platform Module in the new age of security /
by:
(書目-電子資源)
Handbook of research on digital crime, cyberspace security, and information assurance /
by:
(書目-電子資源)
Collaboration with cloud computing = security, social media, and unified communications /
by:
(書目-電子資源)
The basics of information security = understanding the fundamentals of InfoSec in theory and practice /
by:
(書目-電子資源)
Enterprise cybersecurity = how to build a successful cyberdefense program against advanced threats /
by:
(書目-電子資源)
Cyber denial, deception and counter deception = a framework for supporting active cyber defense /
by:
(書目-電子資源)
Network and system security = 9th International Conference, NSS 2015, New York, NY, USA, November 3-5, 2015 : proceedings /
by:
(書目-電子資源)
Provable security = 9th International Conference, ProvSec 2015, Kanazawa, Japan, November 24-26, 2015 : proceedings /
by:
(書目-電子資源)
Security protocols XXIII = 23rd International Workshop, Cambridge, UK, March 31 - April 2, 2015 : revised selected papers /
by:
(書目-電子資源)
Secure IT systems = 20th Nordic Conference, NordSec 2015, Stockholm, Sweden, October 19-21, 2015 : proceedings /
by:
(書目-電子資源)
Cryptography and coding = 15th IMA International Conference, IMACC 2015, Oxford, UK, December 15-17, 2015 : proceedings /
by:
(書目-電子資源)
Cyber-physical attack recovery procedures = a step-by-step preparation and response guide /
by:
(書目-電子資源)
Investigative computer forensics = the practical guide for lawyers, accountants, investigators, and business executives /
by:
(書目-電子資源)
Security intelligence = a practitioner's guide to solving enterprise security challenges /
by:
(書目-電子資源)
Preserving privacy against side-channel leaks = from data publishing to web applications /
by:
(書目-電子資源)
Cybersecurity for hospitals and healthcare facilities = a guide to detection and prevention /
by:
(書目-電子資源)
From hacking to report writing = an introduction to security and penetration testing /
by:
(書目-電子資源)
網路安全 : = 捍衛網路戰時代中的關鍵基礎設施 = Cybersecurity : protecting critical infrastructures from cyber attack and cyber warfare /
by:
(書目-語言資料,印刷品)
Hardware security and trust = design and deployment of integrated circuits in a threatened environment /
by:
(書目-電子資源)
Introduction to intelligent surveillance = surveillance data capture, transmission, and analytics /
by:
(書目-電子資源)
Cyber security on Azure = an IT professionals guide to Microsoft Azure security center /
by:
(書目-電子資源)
Transactions on computational science XXX = Special Issue on Cyberworlds and Cybersecurity /
by:
(書目-電子資源)
Privileged attack vectors = building effective cyber-defense strategies to protect organizations /
by:
(書目-電子資源)
Enterprise cybersecurity study guide = how to build a successful cyberdefense program against advanced threats /
by:
(書目-電子資源)
Trusted digital circuits = hardware trojan vulnerabilities, prevention and detection /
by:
(書目-電子資源)
Physically unclonable functions = from basic design principles to advanced hardware security applications /
by:
(書目-電子資源)
Building a corporate culture of security = strategies for strengthening organizational resiliency /
by:
(書目-電子資源)
The basics of digital privacy = simple tools to protect your personal information and your identity online /
by:
(書目-電子資源)
Networked predictive control of systems with communication constraints and cyber attacks
by:
(書目-電子資源)
Autonomous cyber deception = reasoning, adaptive planning, and evaluation of HoneyThings /
by:
(書目-電子資源)
Building decentralized trust = multidisciplinary perspectives on the design of blockchains and distributed ledgers /
by:
(書目-電子資源)
Novel techniques in recovering, embedding, and enforcing policies for control-flow integrity
by:
(書目-電子資源)
Artificial intelligence for cyber security = methods, issues and possible horizons or opportunities /
by:
(書目-電子資源)
Cyber crisis management = the practical handbook on crisis management and crisis communication /
by:
(書目-電子資源)
Transactions on computational science XXVI = special issue on cyberworlds and cybersecurity /
by:
(書目-電子資源)
Cybersecurity in the European Union = resilience and adaptability in governance policy /
by:
(書目-電子資源)
Cryptology and network security = 15th International Conference, CANS 2016, Milan, Italy, November 14-16, 2016 : proceedings /
by:
(書目-電子資源)
Concurrency, security, and puzzles = essays dedicated to Andrew William Roscoe on the occasion of his 60th birthday /
by:
(書目-電子資源)
Transactions on large-scale data- and knowledge-centered systems XXXI = special issue on data and security engineering /
by:
(書目-電子資源)
Engineering information security : = the application of systems engineering concepts to achieve information assurance /
by:
(書目-電子資源)
CyberShock : = surviving hackers, phreakers, identity thieves, Internet terrorists, and weapons of mass disruption /
by:
(書目-語言資料,印刷品)
The Underground guide to computer security : = slightly askew advice on protecting your PC and what's on it /
by:
(書目-語言資料,印刷品)
Guide to automotive connectivity and cybersecurity = trends, technologies, innovations and applications /
by:
(書目-電子資源)
Port cybersecurity : = securing critical information infrastructures and supply chains /
by:
(書目-電子資源)
Navigating new cyber risks = how businesses can plan, build and manage safe spaces in the digital age /
by:
(書目-電子資源)
Cybersecurity and secure information systems = challenges and solutions in smart environments /
by:
(書目-電子資源)
Practical security properties on commodity computing platforms = the uber extensible micro-hypervisor framework /
by:
(書目-電子資源)
Identity attack vectors = implementing an effective identity and access management solution /
by:
(書目-電子資源)
Binary code fingerprinting for cybersecurity = application to malicious code fingerprinting /
by:
(書目-電子資源)
Building a cybersecurity culture in organizations = how to bridge the gap between people and digital technology /
by:
(書目-電子資源)
Data privacy and trust in cloud computing = building trust in the cloud through assurance and accountability /
by:
(書目-電子資源)
Red Hat and IT security = with Red Hat Ansible, Red Hat OpenShift, and Red Hat security auditing /
by:
(書目-電子資源)
The theory of hash functions and random oracles = an approach to modern cryptography /
by:
(書目-電子資源)
Internet of Things and access control = sensing, monitoring and controlling access in IoT-enabled healthcare systems /
by:
(書目-電子資源)
Android software internals quick reference = a field manual and security reference guide to Java-based Android components /
by:
(書目-電子資源)
Understanding cybersecurity management in FinTech = challenges, strategies, and trends /
by:
(書目-電子資源)
Beginning security with Microsoft technologies = protecting Office 365, devices, and data /
by:
(書目-電子資源)
Security and trust management = 16th International Workshop, STM 2020, Guildford, UK, September 17-18, 2020 : proceedings /
by:
(書目-電子資源)
Firewalls don't stop dragons = a step-by-step guide to computer security for non-techies /
by:
(書目-電子資源)
Malware analysis and detection engineering = a comprehensive approach to detect and analyze modern malware /
by:
(書目-電子資源)
Android malware detection using machine learning = data-driven fingerprinting and threat intelligence /
by:
(書目-電子資源)
Tribe of hackers, security leaders = tribal knowledge from the best in cybersecurity leadership /
by:
(書目-電子資源)
The CISO'S next frontier = AI, post-quantum cryptography and advanced security paradigms /
by:
(書目-電子資源)
Azure security handbook = a comprehensive guide for defending your enterprise environment /
by:
(書目-電子資源)
Introduction to privacy enhancing technologies = a classification-based approach to understanding PETs /
by:
(書目-電子資源)
The next era in hardware security = a perspective on emerging technologies for secure electronics /
by:
(書目-電子資源)
Crypto : = how the code rebels beat the government, saving privacy in the digital age /
by:
(書目-語言資料,印刷品)
Combating security challenges in the age of big data = powered by state-of-the-art artificial intelligence techniques /
by:
(書目-電子資源)
Securing social identity in mobile platforms = technologies for for security, privacy and identity management /
by:
(書目-電子資源)
Rational cybersecurity for business = the security leaders' guide to business alignment /
by:
(書目-電子資源)
Linking sensitive data = methods and techniques for practical privacy-preserving information sharing /
by:
(書目-電子資源)
Logic, language, and security = essays dedicated to Andre Scedrov on the occasion of his 65th birthday /
by:
(書目-電子資源)
Cross-layer design for secure and resilient cyber-physical systems = a decision and game theoretic approach /
by:
(書目-電子資源)
Cyber security = 17th China Annual Conference, CNCERT 2020, Beijing, China, August 12, 2020 : revised selected papers /
by:
(書目-電子資源)
Cryptography, information theory, and error-correction : = a handbook for the 21st century /
by:
(書目-語言資料,印刷品)
The Effectiveness of Digital Forensics and Security Strategies in Using AI and Machine Learning to Protect Children Online.
by:
(書目-電子資源)
Phishing and communication channels = a guide to identifying and mitigating phishing attacks /
by:
(書目-電子資源)
Snowflake access control = mastering the features for data privacy and regulatory compliance /
by:
(書目-電子資源)
Solving identity management in modern applications = demystifying OAuth 2.0, OpenID Connect, and SAML 2.0 /
by:
(書目-電子資源)
Adversarial machine learning = attack surfaces, defence mechanisms, learning theories in artificial intelligence /
by:
(書目-電子資源)
Advanced methodologies and technologies in system security, information privacy, and forensics
by:
(書目-電子資源)
Countering cyber attacks and preserving the integrity and availability of critical systems
by:
(書目-電子資源)
From corporate security to commercial force : = a business leader's guide to security economics /
by:
(書目-電子資源)
Transactions on computational science XXXVI = special issue on cyberworlds and cybersecurity /
by:
(書目-電子資源)
System administration ethics = ten commandments for security and compliance in a modern cyber world /
by:
(書目-電子資源)
Information security analytics = finding security insights, patterns, and anomalies in big data /
by:
(書目-電子資源)
The science and technology of counterterrorism = measuring physical and electronic security risk /
by:
(書目-電子資源)
New methods and tools for intelligent data processing and information security systems
by:
(書目-電子資源)
The Risk that Cyber-Attacks Pose to Outer Space Assets: How Can International Dialogue and Cooperation Help?
by:
(書目-電子資源)
Towards an increased security = green innovations, intellectual property protection and information security /
by:
(書目-電子資源)
Explainable artificial intelligence for cyber security = next generation artificial intelligence /
by:
(書目-電子資源)
Cryptography and cryptanalysis in Java = creating and programming advanced algorithms with Java SE 17 LTS and Jakarta EE 10 /
by:
(書目-電子資源)
Security compliance in model-driven development of software systems in presence of long-term evolution and variants
by:
(書目-電子資源)
Citizen privacy framework = case of a fuzzy-based recommender system for political participation /
by:
(書目-電子資源)
Security issues in fog computing from 5G to 6G = architectures, applications and solutions /
by:
(書目-電子資源)
Security and resilience in intelligent data-centric systems and communication networks
by:
(書目-電子資源)
Predictive data security using AI = insights and issues of blockchain, IoT, and DevOps /
by:
(書目-電子資源)
Solving identity management in modern applications = demystifying OAuth 2.0, OpenID Connect, and SAML 2 /
by:
(書目-電子資源)
Azure security for critical workloads = implementing modern security controls for authentication, authorization and auditing /
by:
(書目-電子資源)
Understanding cybersecurity management in decentralized finance = challenges, strategies, and trends /
by:
(書目-電子資源)
Handbook of biometric anti-spoofing = presentation attack detection and vulnerability assessment /
by:
(書目-電子資源)
Firewalls don't stop dragons = a step-by-step guide to computer security and privacy for non-techies /
by:
(書目-電子資源)
Hacking exposed malware & rootkits = malware & rootkits security secrets & solutions /
by:
(書目-電子資源)
Demystifying intelligent multimode security systems = an edge-to-cloud cybersecurity solutions guide /
by:
(書目-電子資源)
Safety in the digital age = sociotechnical perspectives on algorithms and machine learning /
by:
(書目-電子資源)
Handbook of research on cybersecurity issues and challenges for business and FinTech applications
by:
(書目-電子資源)
The Evolution of Logic Locking: Towards Next Generation Logic Locking Countermeasures.
by:
(書目-電子資源)
Monte Carlo Planning and Reinforcement Learning for Large Scale Sequential Decision Problems.
by:
(書目-電子資源)
Use and Analysis of Attack Graphs for Decision Making in a Cybersecurity Defense Plan.
by:
(書目-電子資源)
Design and Implementation of a Secure and Efficient E-Governance Model Using Blockchain for a Developed Country.
by:
(書目-電子資源)
Cybersecurity and artificial intelligence = transformational strategies and disruptive innovation /
by:
(書目-電子資源)
Ai-driven cybersecurity and threat intelligence = cyber automation, intelligent decision-making and explainability /
by:
(書目-電子資源)
Sustainable security practices using blockchain, quantum and post-quantum technologies for real time applications
by:
(書目-電子資源)
Identity attack vectors = strategically designing and implementing identity security /
by:
(書目-電子資源)
Security and resilience in cyber-physical systems = detection, estimation and control /
by:
(書目-電子資源)
An introduction to secret sharing = a systematic overview and guide for protocol selection /
by:
(書目-電子資源)
Emerging ICT technologies and cybersecurity = from AI and ML to other futuristic technologies /
by:
(書目-電子資源)
更多
較少的
主題