Computer networks - Security measures.
概要
作品: | 449 作品在 207 項出版品 207 種語言 |
---|
書目資訊
Inside network perimeter security : = the definitive guide to firewalls, VPNs, routers, and intrusion detection systems /
by:
(書目-語言資料,印刷品)
Securing Web services with WS-Security : = demystifying WS-Security, WS-Policy, SAML, XML Signature, and XML Encryption /
by:
(書目-語言資料,印刷品)
Internet security made easy : = a plain-English guide to protecting yourself and your company online /
by:
(書目-語言資料,印刷品)
CYA = securing Exchange Server 2003 and Outlook Web Access : cover your a** by getting it right the first time /
by:
(書目-語言資料,印刷品)
ISA server and beyond = real world security solutions for Microsoft enterprise networks /
by:
(書目-語言資料,印刷品)
The Making of Information Systems = Software Engineering and Management in a Globalized World /
by:
(書目-語言資料,印刷品)
Visualization for Computer Security = 5th International Workshop, VizSec 2008, Cambridge, MA, USA, September 15, 2008. Proceedings /
by:
(書目-語言資料,印刷品)
Integrated security systems design = concepts, specifications, and implementation /
by:
(書目-語言資料,印刷品)
Cyber-security and global information assurance = threat analysis and response solutions /
by:
(書目-電子資源)
Cyber security standards, practices and industrial applications = systems and methodologies /
by:
(書目-電子資源)
Network security, administration, and management = advancing technology and practice /
by:
(書目-電子資源)
Computer-mediated communication across cultures = international interactions in online environments /
by:
(書目-電子資源)
Information assurance and security technologies for risk assessment and threat management = advances /
by:
(書目-語言資料,印刷品)
Network intrusion analysis DUP_1 = methodologies, tools, and techniques for incident analysis and response /
by:
(書目-電子資源)
The basics of cyber warfare = understanding the fundamentals of cyber warfare in theory and practice /
by:
(書目-電子資源)
The basics of information security = understanding the fundamentals of InfoSec in theory and practice /
by:
(書目-電子資源)
Architecting user-centric privacy-as-a-set-of-services = digital identity-related privacy framework /
by:
(書目-電子資源)
Security risks in social media technologies = safe practices in public service applications /
by:
(書目-電子資源)
Defense against the black arts = how hackers do what they do and how to protect against it /
by:
(書目-電子資源)
Authentication in insecure environments = using visual cryptography and non-transferable credentials in practise /
by:
(書目-電子資源)
The basics of information security = understanding the fundamentals of InfoSec in theory and practice /
by:
(書目-電子資源)
Security intelligence = a practitioner's guide to solving enterprise security challenges /
by:
(書目-電子資源)
Nessus, Snort, & Ethereal power tools : = customizing open source security applications /
by:
(書目-語言資料,印刷品)
Foundations of security analysis and design II = FOSAD 2001/2002 tutorial lectures /
by:
(書目-語言資料,印刷品)
Securing Web services with WS-Security = demystifying WS-Security, WS-Policy, SAML, XML Signature, and XML Encryption /
by:
(書目-語言資料,印刷品)
Inside network perimeter security = the definitive guide to firewalls, VPNs, routers, and intrusion detection systems /
by:
(書目-語言資料,印刷品)
Security in fixed and wireless networks : = an introduction to securing data communications /
by:
(書目-語言資料,印刷品)
The art of software security assessment : = identifying and preventing software vulnerabilities /
by:
(書目-語言資料,印刷品)
Impacts and Risk Assessment of Technology for Internet Security = Enabled Information Small-Medium Enterprises (TEISMES) /
by:
(書目-語言資料,印刷品)
Foundations of security analysis and design II = FOSAD 2001/2002 turorial lectures /
by:
(書目-語言資料,印刷品)
Secure networking - CQRE [Secure] '99 = International Exhibition and Congress, Dusseldorf, Germany, November 30-December 2, 1999 : proceedings /
by:
(書目-語言資料,印刷品)
Home and small business guide to protecting your computer network, electronic assets, and privacy
by:
(書目-語言資料,印刷品)
Cisco router and switch forensics = investigating and analyzing malicious network activity /
by:
(書目-電子資源)
Digital forensics for network, Internet, and cloud computing = a forensic evidence guide for moving targets and data /
by:
(書目-電子資源)
Health-care telematics in Germany = design and application of a security analysis method /
by:
(書目-電子資源)
Critical infrastructure protection = information infrastructure models, analysis, and defense /
by:
(書目-電子資源)
Strategic and practical approaches for information security governance = technologies and applied solutions /
by:
(書目-語言資料,印刷品)
Optimizing information security and advancing privacy assurance = new technologies /
by:
(書目-語言資料,印刷品)
Situational awareness in computer network defense = principles, methods and applications /
by:
(書目-語言資料,印刷品)
Privacy, intrusion detection, and response = technologies for protecting networks /
by:
(書目-語言資料,印刷品)
Advanced persistent threat = understanding the danger and how to protect your organization /
by:
(書目-電子資源)
Professional penetration testing DUP_1 = creating and operating a formal hacking lab /
by:
(書目-電子資源)
Security risk management DUP_1 = building an information security risk management program from the ground up /
by:
(書目-電子資源)
PCI compliance DUP_1 = understand and implement effective PCI data security standard compliance /
by:
(書目-電子資源)
Windows registry forensics DUP_1 = advanced digital forensic analysis of the Windows registry /
by:
(書目-電子資源)
10 don'ts on our digital devices = the non-techie's survival guide to cyber security and privacy /
by:
(書目-電子資源)
A practical guide to TPM 2.0 = using the new Trusted Platform Module in the new age of security /
by:
(書目-電子資源)
Security, privacy, trust, and resource management in mobile and wireless communications /
by:
(書目-電子資源)
Handbook of research on digital crime, cyberspace security, and information assurance /
by:
(書目-電子資源)
Virtuality and capabilities in a world of ambient intelligence = new challenges to privacy and data protection /
by:
(書目-電子資源)
Cybersecurity for hospitals and healthcare facilities = a guide to detection and prevention /
by:
(書目-電子資源)
From hacking to report writing = an introduction to security and penetration testing /
by:
(書目-電子資源)
Cyber security, simply, make it happen = leveraging digitization through IT security /
by:
(書目-電子資源)
The new era in U.S. national security = an introduction to emerging threats and challenges /
by:
(書目-電子資源)
Cyber security on Azure = an IT professionals guide to Microsoft Azure security center /
by:
(書目-電子資源)
Privileged attack vectors = building effective cyber-defense strategies to protect organizations /
by:
(書目-電子資源)
Transactions on computational science XXXI = special issue on signal processing and security in distributed systems /
by:
(書目-電子資源)
Contemporary identity and access management architectures = emerging research and opportunities /
by:
(書目-電子資源)
A guide to the National Initiative for Cybersecurity Education (NICE) cybersecurity workforce framework (2.0)
by:
(書目-電子資源)
Autonomous cyber deception = reasoning, adaptive planning, and evaluation of HoneyThings /
by:
(書目-電子資源)
Hacking web intelligence : = open source intelligence and web reconnaissance concepts and techniques /
by:
(書目-電子資源)
Advanced methodologies and technologies in system security, information privacy, and forensics
by:
(書目-電子資源)
Countering cyber attacks and preserving the integrity and availability of critical systems
by:
(書目-電子資源)
The information systems security officer's guide : = establishing and managing a cyber security program /
by:
(書目-電子資源)
Transactions on computational science XXXV = special issue on signal processing and security in distributed systems /
by:
(書目-電子資源)
Privileged attack vectors = building effective cyber-defense strategies to protect organizations /
by:
(書目-電子資源)
Multi-site network and security services with NSX-T = implement network security, stateful services, and operations /
by:
(書目-電子資源)
Safety of web applications = risks, encryption and handling vulnerabilities with PHP /
by:
(書目-電子資源)
Rational cybersecurity for business = the security leaders' guide to business alignment /
by:
(書目-電子資源)
Cross-layer design for secure and resilient cyber-physical systems = a decision and game theoretic approach /
by:
(書目-電子資源)
Protocols, strands, and logic = essays dedicated to Joshua Guttman on the the occasion of his 66.66th birthday /
by:
(書目-電子資源)
Understand, manage, and measure cyber risk = practical solutions for creating a sustainable cyber program /
by:
(書目-電子資源)
Azure security for critical workloads = implementing modern security controls for authentication, authorization and auditing /
by:
(書目-電子資源)
Understand, manage, and measure cyber risk® = practical solutions for creating a sustainable cyber program /
by:
(書目-電子資源)
Handbook of research on cybersecurity issues and challenges for business and FinTech applications
by:
(書目-電子資源)
Operations research, engineering, and cyber security = trends in applied mathematics and technology /
by:
(書目-電子資源)
Engineering information security : = the application of systems engineering concepts to achieve information assurance /
by:
(書目-電子資源)
SDN and NFV security = security analysis of software-defined networking and network function virtualization /
by:
(書目-電子資源)
Security and privacy in cyber-physical systems = foundations, principles, and applications /
by:
(書目-電子資源)
Network Performance and Security = Testing and Analyzing Using Open Source and Low-Cost Tools /
by:
(書目-電子資源)
The basics of digital privacy = simple tools to protect your personal information and your identity online /
by:
(書目-電子資源)
Navigating new cyber risks = how businesses can plan, build and manage safe spaces in the digital age /
by:
(書目-電子資源)
Cybersecurity and secure information systems = challenges and solutions in smart environments /
by:
(書目-電子資源)
Identification of pathogenic social media accounts = from data to intelligence to prediction /
by:
(書目-電子資源)
The theory of hash functions and random oracles = an approach to modern cryptography /
by:
(書目-電子資源)
Co-governed sovereignty network = legal basis and its prototype & applications with MIN architecture /
by:
(書目-電子資源)
Security and trust management = 16th International Workshop, STM 2020, Guildford, UK, September 17-18, 2020 : proceedings /
by:
(書目-電子資源)
The CISO'S next frontier = AI, post-quantum cryptography and advanced security paradigms /
by:
(書目-電子資源)
Cyber security = 17th China Annual Conference, CNCERT 2020, Beijing, China, August 12, 2020 : revised selected papers /
by:
(書目-電子資源)
Security and resilience in intelligent data-centric systems and communication networks
by:
(書目-電子資源)
Winning the national security AI competition = a practical guide for government and industry leaders /
by:
(書目-電子資源)
Recent advanced in image security technologies = intelligent image, signal, and video processing /
by:
(書目-電子資源)
更多
較少的
主題