Search Results - "Computer security."

  1. 441

    CISO's guide to penetration testing : a framework to plan, manage, and maximize benefits by Tiller, James S.

    Published 2012
    Subjects: “…Penetration testing (Computer security)…”
    Full text (MFA users only)
    Electronic eBook
  2. 442

    Information Warfare. by Ventre, Daniel

    Published 2012
    Subjects: “…Computer security Management.…”
    Full text (MFA users only)
    Electronic eBook
  3. 443

    Managing information security

    Published 2014
    Subjects: “…Computer security Management.…”
    Full text (MFA users only)
    Electronic eBook
  4. 444

    Software test attacks to break mobile and embedded devices by Hagar, Jon Duncan

    Published 2013
    Subjects: “…Penetration testing (Computer security)…”
    Full text (MFA users only)
    Electronic eBook
  5. 445

    Cyber reconnaissance surveillance and defense by Shimonski, Robert

    Published 2015
    Subjects: “…Cyber intelligence (Computer security)…”
    Full text (MFA users only)
    Electronic eBook
  6. 446

    Security architect : careers in information security (bcs guides to it roles).

    Subjects: “…Computer security Management.…”
    Full text (MFA users only)
    Electronic eBook
  7. 447

    Selling information security to the board : a primer by Calder, Alan, 1957-

    Published 2016
    Subjects: “…Computer security Information technology.…”
    Full text (MFA users only)
    Electronic eBook
  8. 448

    Group Policy : Fundamentals, Security, and the Managed Desktop. by Moskowitz, Jeremy

    Published 2015
    Subjects: “…Computer security.…”
    Full text (MFA users only)
    Electronic eBook
  9. 449

    Security Automation with Ansible 2 by Akula, Madhu, Mahajan, Akash

    Published 2017
    Subjects: “…Computer security Management.…”
    Full text (MFA users only)
    Electronic eBook
  10. 450
  11. 451

    CCNA Cyber Ops SECOPS certification guide 210-255 : learn the skills to pass the 210-255 certification exam and become a competent SECOPS associate by Chu, Andrew

    Published 2019
    Subjects: “…Computer security Examinations Study guides.…”
    Full text (MFA users only)
    Electronic eBook
  12. 452

    Deter, disrupt, or deceive : assessing cyber conflict as an intelligence contest

    Published 2023
    Subjects: “…Cyber intelligence (Computer security)…”
    Full text (MFA users only)
    Electronic eBook
  13. 453
  14. 454

    Stealing the network : how to own an identity

    Published 2005
    Subjects: “…Computer security Fiction.…”
    Full text (MFA users only)
    Electronic eBook
  15. 455

    Papers from the first European Workshop on Technological & Security Issues in Digital Rights Management (EuDiRights '06)

    Published 2007
    Subjects: “…Computer security Congresses.…”
    Full text (MFA users only)
    Electronic Conference Proceeding eBook
  16. 456

    The Definitive Guide to the C & A Transformation Process. by Mehan, Julie E.

    Published 2009
    Subjects: “…Computer security.…”
    Full text (MFA users only)
    Electronic eBook
  17. 457

    Formal models and techniques for analyzing security protocols

    Published 2011
    Subjects: “…Computer security.…”
    Full text (MFA users only)
    Electronic eBook
  18. 458

    SQL injection attacks and defense by Clarke, Justin

    Published 2012
    Subjects: “…Computer security.…”
    Full text (MFA users only)
    Electronic eBook
  19. 459

    The complete guide to physical security by Baker, Paul R., 1958-

    Published 2013
    Subjects: “…Computer security.…”
    Full text (MFA users only)
    Electronic eBook
  20. 460

    Relation based access control by Zhang, Rui

    Published 2010
    Subjects: “…Computer security.…”
    Full text (MFA users only)
    Electronic eBook