Showing 1 - 20 results of 43 for search '"computer security"', query time: 0.05s Refine Results
  1. 1

    Cloud computing security foundations and challenges /

    Published 2021
    Table of Contents: “…2.7 ITU-T Cloud Computing Reference Architecture -- 2.7.1 Cloud Computing Actors -- 2.7.2 Layered Architecture -- 2.7.3 ITU-T Cloud Computing Functional Reference Architecture -- 2.8 Network Requirements for Cloud Computing -- 2.9 Summary -- References -- Chapter 3 Cloud Security Baselines -- 3.1 Introduction -- 3.2 An Overview of Computer Security -- 3.3 Vulnerabilities and Attacks -- 3.3.1 Application Layer -- 3.3.2 Operating System Layer -- 3.3.3 Hypervisor, Storage, Hardware, and Network -- 3.3.4 Cloud Security Mechanisms -- 3.3.4.1 Data Security -- 3.3.4.2 Digital Signature…”
    Taylor & Francis
    OCLC metadata license agreement
    Electronic eBook
  2. 2

    Information assurance and computer security

    Published 2006
    Subjects: “…Computer security.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic Conference Proceeding eBook
  3. 3

    Information assurance handbook : effective computer security and risk management strategies / by Schou, Corey

    Published 2015
    Subjects:
    Book
  4. 4

    Information assurance for the entrerprise : a roadmap to information security / by Schou, Corey

    Published 2007
    Subjects: “…Computer security.…”
    Book
  5. 5

    Information assurance for the enterprise : a roadmap to information security / by Schou, Corey

    Published 2007
    Subjects: “…Computer security.…”
    Book
  6. 6

    Data privacy in the information age by Klosek, Jacqueline, 1972-

    Published 2000
    Subjects: “…Computer security.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  7. 7

    Black hat physical device security exploiting hardware and software / by Miller, Drew

    Published 2005
    Subjects: “…Computer security.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  8. 8
  9. 9

    A process for developing a common vocabulary in the information security area

    Published 2007
    Subjects: “…Computer security.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic Conference Proceeding eBook
  10. 10

    Comptia Security+ 2008 in depth by Ciampa, Mark D.

    Published 2009
    Subjects: “…Computer security.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  11. 11

    Information security policy, processes, and practices /

    Published 2008
    Subjects: “…Computer security.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  12. 12

    Getting started with FortiGate / by Fabbri, Rosato

    Published 2013
    Subjects: “…Computer security.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  13. 13

    A practical guide to managing information security by Purser, Steve

    Published 2004
    Subjects: “…Computer security Management.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  14. 14

    Information security management principles by Alexander, David

    Published 2013
    Subjects: “…Computer security Management.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  15. 15

    Technology and privacy the new landscape /

    Published 1997
    Subjects: “…Computer security.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  16. 16
  17. 17

    Privacy protection and computer forensics by Caloyannides, Michael A.

    Published 2004
    Subjects: “…Computer security.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  18. 18
  19. 19

    Implementing database security and auditing by Ben-Natan, Ron

    Published 2005
    Subjects: “…Computer security.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  20. 20

    Digital watermarking and steganography

    Published 2008
    Subjects: “…Computer security.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook