Computer security.
Overview
Works: | 173 works in 172 publications in 172 languages |
---|
Titles
Network intrusion analysis = methodologies, tools, and techniques for incident analysis and response /
by:
(Electronic resources)
Hacking exposed malware & rootkits = malware & rootkits security secrets & solutions /
by:
(Electronic resources)
Proceedings of The Ifip Tc 11 23rd International Information Security Conference = IFIP 20th World Computer Congress, IFIP SEC'08, September 7-10, 2008, Milano, Italy /
by:
(Electronic resources)
Public key infrastructure = building trusted applications and Web services /
by:
(Electronic resources)
Integrating security and software engineering = advances and future visions /
by:
(Electronic resources)
Mission-critical security planner : = when hackers won't take no for an answer /
by:
(Language materials, printed)
Hiding in plain sight : = steganography and the art of covert communication /
by:
(Language materials, printed)
The basics of information security = understanding the fundamentals of InfoSec in theory and practice /
by:
(Electronic resources)
Web application obfuscation = -/WAFs..Evasion..Filters//alert (/Obfuscation/)- /
by:
(Electronic resources)
Visualization for Computer Security = 5th International Workshop, VizSec 2008, Cambridge, MA, USA, September 15, 2008. Proceedings /
by:
(Electronic resources)
Hacker's challenge 2 : = test your network security & forensic skills /
by:
(Language materials, printed)
The information systems security officer's guide : = establishing and managing an information protection program /
by:
(Language materials, printed)
Ninja hacking = unconventional penetration testing tactics and techniques /
by:
(Electronic resources)
Database and applications security = integrating information security and data management /
by:
(Electronic resources)
Hacking exposed Windows 2000 : = network security secrets & solutions /
by:
(Language materials, printed)
Information security architecture = an integrated approach to security in the organization /
by:
(Electronic resources)
Industrial network security = securing critical infrastructure networks for Smart Grid, SCADA , and other industrial control systems /
by:
(Electronic resources)
Preventing good people from doing bad things = implementing least privilege /
by:
(Electronic resources)
Advanced persistent threat = understanding the danger and how to protect your organization /
by:
(Electronic resources)
Information warfare in business = strategies of control and resistance in the network society /
by:
(Electronic resources)
The art of deception : = controlling the human element of security /
by:
(Language materials, printed)
Engineering secure software and systems = First international symposium, ESSoS 2009, Leuven, Belgium, February 4-6, 2009, proceedings /
by:
(Electronic resources)
Internet security : = a jumpstart for systems administrators and IT managers /
by:
(Language materials, printed)
Information security management metrics = a definitive guide to effective security monitoring and measurement /
by:
(Electronic resources)
Moving target defense = creating asymmetric uncertainty for cyber threats /
by:
(Electronic resources)
Theory and practice of cryptography solutions for secure information systems
by:
(Electronic resources)
Situational awareness in computer network defense = principles, methods and applications /
by:
(Electronic resources)
IT governance = a manager's guide to data security and BS 7799/ISO 17799 /
by:
(Electronic resources)
Inside Java 2 platform security : = architecture, API design, and implementation /
by:
(Language materials, printed)
Cryptography and security = from theory to applications : essays dedicated to Jean-Jacques Quisquater on the Occasion of His 65th Birthday /
by:
(Electronic resources)
Information assurance and security technologies for risk assessment and threat management = advances /
by:
(Electronic resources)
Click, click, who's there? = a family-based non-technical approach to help parents protect their children online /
by:
(Electronic resources)
Information security intelligence : = cryptographic principles and applications /
by:
(Language materials, printed)
Computer security, privacy, and politics = current issues, challenges, and solutions /
by:
(Electronic resources)
Anonymous security systems and applications = requirements and solutions /
by:
(Electronic resources)
Hacking web apps = detecting and preventing web application security problems /
by:
(Electronic resources)
Enhanced Methods in Computer Security, Biometric and Artificial Intelligence Systems
by:
(Electronic resources)
Information security and ethics = concepts, methodologies, tools and applications /
by:
(Electronic resources)
Cyber security standards, practices and industrial applications = systems and methodologies /
by:
(Electronic resources)
Hack the stack = using Snort and Ethereal to master the 8 layers of an insecure network /
by:
(Electronic resources)
The secure online business handbook = a practical guide to risk management and business continuity /
by:
(Electronic resources)
Privacy protection measures and technologies in business organizations = aspects and standards /
by:
(Electronic resources)
Information security = design, implementation, measurement, and compliance /
by:
(Electronic resources)
Home and small business guide to protecting your computer network, electronic assets, and privacy
by:
(Electronic resources)
Essential computer security = everyone's guide to e-mail, Internet, and wireless security /
by:
(Electronic resources)
Hacking exposed J2EE & Java : = developing secure applications with Java technology /
by:
(Language materials, printed)
Windows registry forensics = advanced digital forensic analysis of the Windows registry /
by:
(Electronic resources)
Privacy in location-based applications = research issues and emerging trends /
by:
(Electronic resources)
Transactions on computational science X = special issue on security in computing, part I /
by:
(Electronic resources)
Software engineering for secure systems = industrial and research perspectives /
by:
(Electronic resources)
Data hiding = exposing concealed data in multimedia, operating systems, mobile devices, and network protocols /
by:
(Electronic resources)
How to break software security : = effective techniques for security testing /
by:
(Language materials, printed)
Optimizing information security and advancing privacy assurance = new technologies /
by:
(Electronic resources)
Virtualization and forensics = a digital forensic investigator's guide to virtual environments /
by:
(Electronic resources)
24 deadly sins of software security = programming flaws and how to fix them /
by:
(Electronic resources)
Applied Oracle security = developing secure database and middleware environments /
by:
(Electronic resources)
Information security = a manager's guide to thwarting data thieves and hackers /
by:
(Electronic resources)
Show more
Fewer
Subjects