Computer networks - Security measures.
Overview
Works: | 125 works in 123 publications in 123 languages |
---|
Titles
MCSE self-paced training kit (exam 70-298) : = designing security for a Microsoft Windows Server 2003 network /
by:
(Language materials, printed)
Network intrusion analysis = methodologies, tools, and techniques for incident analysis and response /
by:
(Electronic resources)
Public key infrastructure = building trusted applications and Web services /
by:
(Electronic resources)
Wars of disruption and resilience = cybered conflict, power, and national security /
by:
(Electronic resources)
Integrated security systems design = concepts, specifications, and implementation /
by:
(Electronic resources)
Hiding in plain sight : = steganography and the art of covert communication /
by:
(Language materials, printed)
The basics of information security = understanding the fundamentals of InfoSec in theory and practice /
by:
(Electronic resources)
Visualization for Computer Security = 5th International Workshop, VizSec 2008, Cambridge, MA, USA, September 15, 2008. Proceedings /
by:
(Electronic resources)
Hacker's challenge 2 : = test your network security & forensic skills /
by:
(Language materials, printed)
Privacy online = perspectives on privacy and self-disclosure in the social web /
by:
(Electronic resources)
The basics of cyber warfare = understanding the fundamentals of cyber warfare in theory and practice /
by:
(Electronic resources)
Network security, administration, and management = advancing technology and practice /
by:
(Electronic resources)
Critical infrastructure protection = information infrastructure models, analysis, and defense /
by:
(Electronic resources)
Privacy, intrusion detection, and response = technologies for protecting networks /
by:
(Electronic resources)
Hacking exposed Windows 2000 : = network security secrets & solutions /
by:
(Language materials, printed)
PKI security solutions for the Enterprise : = solving HIPAA, E-Paper Act, and other compliance issues /
by:
(Language materials, printed)
Cisco router and switch forensics = investigating and analyzing malicious network activity /
by:
(Electronic resources)
Preventing good people from doing bad things = implementing least privilege /
by:
(Electronic resources)
Advanced persistent threat = understanding the danger and how to protect your organization /
by:
(Electronic resources)
Internet security : = a jumpstart for systems administrators and IT managers /
by:
(Language materials, printed)
Computer-mediated communication across cultures = international interactions in online environments /
by:
(Electronic resources)
Moving target defense = creating asymmetric uncertainty for cyber threats /
by:
(Electronic resources)
Theory and practice of cryptography solutions for secure information systems
by:
(Electronic resources)
Strategic and practical approaches for information security governance = technologies and applied solutions /
by:
(Electronic resources)
Situational awareness in computer network defense = principles, methods and applications /
by:
(Electronic resources)
PCI compliance = understand and implement effective PCI data security standard compliance /
by:
(Electronic resources)
Policies and Research in Identity Management = First IFIP WG11.6 Working Conference on Policies and Research in Identity Management (IDMAN'07), RSM Erasmus University, Rotterdam, The Netherlands, October 11-12, 2007 /
by:
(Electronic resources)
Information assurance and security technologies for risk assessment and threat management = advances /
by:
(Electronic resources)
Computer security, privacy, and politics = current issues, challenges, and solutions /
by:
(Electronic resources)
The Making of Information Systems = Software Engineering and Management in a Globalized World /
by:
(Electronic resources)
Security risk management = building an information security risk management program from the ground up /
by:
(Electronic resources)
Hacking web apps = detecting and preventing web application security problems /
by:
(Electronic resources)
How secure is your wireless network? : = safeguarding your Wi-Fi- LAN /
by:
(Language materials, printed)
Professional penetration testing = creating and operating a formal hacking lab /
by:
(Electronic resources)
Impacts and Risk Assessment of Technology for Internet Security = Enabled Information Small-Medium Enterprises (TEISMES) /
by:
(Electronic resources)
Cyber-security and global information assurance = threat analysis and response solutions /
by:
(Electronic resources)
Cyber security standards, practices and industrial applications = systems and methodologies /
by:
(Electronic resources)
Hack the stack = using Snort and Ethereal to master the 8 layers of an insecure network /
by:
(Electronic resources)
Engineering secure two-party computation protocols = design, optimization, and applications of efficient secure function evaluation /
by:
(Electronic resources)
Home and small business guide to protecting your computer network, electronic assets, and privacy
by:
(Electronic resources)
The hacker's handbook : = the strategy behind breaking into and defending networks /
by:
(Language materials, printed)
Windows registry forensics = advanced digital forensic analysis of the Windows registry /
by:
(Electronic resources)
Wireshark & Ethereal network protocol analyzer toolkit, Jay Beale's open source security series
by:
(Electronic resources)
Foundations and practice of security = 4th Canada-France MITACS Workshop, FPS 2011, Paris, France, May 12-13, 2011 : revised selected papers /
by:
(Electronic resources)
Optimizing information security and advancing privacy assurance = new technologies /
by:
(Electronic resources)
Health-care telematics in Germany = design and application of a security analysis method /
by:
(Electronic resources)
Disappearing cryptography = information hiding : steganography & watermarking /
by:
(Electronic resources)
24 deadly sins of software security = programming flaws and how to fix them /
by:
(Electronic resources)
Show more
Fewer
Subjects