Computer security.
Overview
| Works: | 174 works in 173 publications in 173 languages | |
|---|---|---|
Titles
Artificial intelligence technology in healthcare : = security and privacy issues /
by:
(Language materials, printed)
Network intrusion analysis = methodologies, tools, and techniques for incident analysis and response /
by:
(Electronic resources)
Hacking exposed malware & rootkits = malware & rootkits security secrets & solutions /
by:
(Electronic resources)
Proceedings of The Ifip Tc 11 23rd International Information Security Conference = IFIP 20th World Computer Congress, IFIP SEC'08, September 7-10, 2008, Milano, Italy /
by:
(Electronic resources)
Public key infrastructure = building trusted applications and Web services /
by:
(Electronic resources)
Integrating security and software engineering = advances and future visions /
by:
(Electronic resources)
Mission-critical security planner : = when hackers won't take no for an answer /
by:
(Language materials, printed)
Hiding in plain sight : = steganography and the art of covert communication /
by:
(Language materials, printed)
The basics of information security = understanding the fundamentals of InfoSec in theory and practice /
by:
(Electronic resources)
Web application obfuscation = -/WAFs..Evasion..Filters//alert (/Obfuscation/)- /
by:
(Electronic resources)
Visualization for Computer Security = 5th International Workshop, VizSec 2008, Cambridge, MA, USA, September 15, 2008. Proceedings /
by:
(Electronic resources)
Hacker's challenge 2 : = test your network security & forensic skills /
by:
(Language materials, printed)
The information systems security officer's guide : = establishing and managing an information protection program /
by:
(Language materials, printed)
Ninja hacking = unconventional penetration testing tactics and techniques /
by:
(Electronic resources)
Database and applications security = integrating information security and data management /
by:
(書目-電子資源)
Information security architecture = an integrated approach to security in the organization /
by:
(書目-電子資源)
Advanced persistent threat = understanding the danger and how to protect your organization /
by:
(書目-電子資源)
Information warfare in business = strategies of control and resistance in the network society /
by:
(書目-電子資源)
Information security management metrics = a definitive guide to effective security monitoring and measurement /
by:
(書目-電子資源)
Situational awareness in computer network defense = principles, methods and applications /
by:
(書目-電子資源)
Inside Java 2 platform security : = architecture, API design, and implementation /
by:
(書目-語言資料,印刷品)
Information assurance and security technologies for risk assessment and threat management = advances /
by:
(書目-電子資源)
Click, click, who's there? = a family-based non-technical approach to help parents protect their children online /
by:
(書目-電子資源)
Computer security, privacy, and politics = current issues, challenges, and solutions /
by:
(書目-電子資源)
Cyber security standards, practices and industrial applications = systems and methodologies /
by:
(書目-電子資源)
Hack the stack = using Snort and Ethereal to master the 8 layers of an insecure network /
by:
(書目-電子資源)
The secure online business handbook = a practical guide to risk management and business continuity /
by:
(書目-電子資源)
Privacy protection measures and technologies in business organizations = aspects and standards /
by:
(書目-電子資源)
Home and small business guide to protecting your computer network, electronic assets, and privacy
by:
(書目-電子資源)
Essential computer security = everyone's guide to e-mail, Internet, and wireless security /
by:
(書目-電子資源)
Hacking exposed J2EE & Java : = developing secure applications with Java technology /
by:
(書目-語言資料,印刷品)
Windows registry forensics = advanced digital forensic analysis of the Windows registry /
by:
(書目-電子資源)
Transactions on computational science X = special issue on security in computing, part I /
by:
(書目-電子資源)
Data hiding = exposing concealed data in multimedia, operating systems, mobile devices, and network protocols /
by:
(書目-電子資源)
更多
較少的
主題