Search Results - "Computer security."
Suggested Topics within your search.
Suggested Topics within your search.
- Computer security 465
- Security measures 270
- Computer networks 199
- Computer Security 184
- Data protection 58
- Access control 36
- Computer crimes 36
- Penetration testing (Computer security) 36
- Prevention 34
- Information technology 31
- Management 30
- Computers 29
- Hackers 26
- Internet 26
- Law and legislation 21
- Examinations 20
- Cloud computing 19
- Firewalls (Computer security) 19
- Certification 17
- Business enterprises 16
- Cryptography 16
- Electronic data processing personnel 16
- Data processing 15
- Cyberterrorism 14
- Privacy, Right of 14
- Computer software 13
- Data encryption (Computer science) 12
- Cyber intelligence (Computer security) 11
- Investigation 11
- Cyberspace 10
-
161
Summary of discussions at a planning meeting on cyber-security and the insider threat to classified information
Published 2000Subjects: “…Computer security.…”
Full text (MFA users only)
Electronic eBook -
162
Information security : policy, processes, and practices
Published 2008Subjects: “…Computer security.…”
Full text (MFA users only)
Electronic eBook -
163
IBM rational application developer V6 portlet application development and portal tools
Published 2005Subjects: “…Computer security.…”
Full text (MFA users only)
Electronic eBook -
164
Putting the latest z/OS security features to work
Published 2002Subjects: “…Computer security.…”
Full text (MFA users only)
Electronic eBook -
165
BigNum Math : Implementing Cryptographic Multiple Precision Arithmetic.
Published 2006Subjects: “…Computer security.…”
Full text (MFA users only)
Electronic eBook -
166
Penetration Testing with BackBox.
Published 2014Subjects: “…Penetration testing (Computer security)…”
Full text (MFA users only)
Electronic eBook -
167
Procuring penetration testing services.
Published 2014Subjects: “…Penetration testing (Computer security)…”
Full text (MFA users only)
Electronic eBook -
168
Solving Cyber Risk : Protecting Your Company and Society.
Published 2018Subjects: “…Computer security.…”
Full text (MFA users only)
Electronic eBook -
169
Hands-on artificial intelligence for cybersecurity : implement smart AI systems for preventing cyber attacks and detecting threats and network anomalies
Published 2019Subjects: “…Computer security.…”
Full text (MFA users only)
Electronic eBook -
170
Cybersecurity Law, standards and regulations
Published 2020Subjects: “…Computer security Law and legislation.…”
Full text (MFA users only)
Electronic eBook -
171
The Cybersecurity Body of Knowledge : The ACM/IEEE/AIS/IFIP Recommendations for a Complete Curriculum in Cybersecurity.
Published 2020Subjects: “…Computer security Study and teaching.…”
Full text (MFA users only)
Electronic eBook -
172
Cybersecurity for Commercial Vehicles.
Published 2018Subjects: “…Computer security.…”
Full text (MFA users only)
Electronic eBook -
173
Finding and fixing vulnerabilities in information systems : the vulnerability assessment & mitigation methodology
Published 2003Subjects: “…Computer security.…”
Full text (MFA users only)
Electronic eBook -
174
Privacy protection and computer forensics
Published 2004Subjects: “…Computer security.…”
Full text (MFA users only)
Electronic eBook -
175
Innocent code : a security wake-up call for Web programmers
Published 2004Subjects: “…Computer security.…”
Full text (MFA users only)
Electronic eBook -
176
Best Practices in Computer Network Defense : Incident Detection and Response.
Published 2014Subjects: “…Computer security.…”
Full text (MFA users only)
Electronic eBook -
177
Security for service oriented architectures
Published 2014Subjects: “…Computer security.…”
Full text (MFA users only)
Electronic eBook -
178
The art of memory forensics : detecting malware and threats in Windows, Linux, and Mac memory
Published 2014Subjects: “…Computer security.…”
Full text (MFA users only)
Electronic eBook -
179
Information security analytics : finding security insights, patterns, and anomalies in big data
Published 2015Subjects: “…Computer security.…”
Full text (MFA users only)
Electronic eBook -
180
Essential skills for hackers
Published 2015Subjects: “…Computer security.…”
Full text (MFA users only)
Electronic eBook