Suggested Topics within your search.
Suggested Topics within your search.
- Data protection
- Computer security 40
- Security measures 10
- Law and legislation 7
- Privacy, Right of 7
- Computer networks 6
- Information technology 6
- Management 5
- COMPUTERS / Security / General 3
- Digital watermarking 3
- Access control 2
- Artificial intelligence 2
- Business enterprises 2
- Business intelligence 2
- Computer Security 2
- Computer crimes 2
- Confidentiality 2
- Cyberterrorism 2
- Data processing 2
- Emergency management 2
- European Union 2
- Government Regulation 2
- Planning 2
- Prevention 2
- Trade secrets 2
- legislation & jurisprudence 2
- Archives 1
- Backup processing alternatives 1
- Business planning 1
- COMPUTERS / Computer Graphics / Game Programming & Design 1
-
1
Cloud computing security foundations and challenges /
Published 2021Table of Contents: “…2.7 ITU-T Cloud Computing Reference Architecture -- 2.7.1 Cloud Computing Actors -- 2.7.2 Layered Architecture -- 2.7.3 ITU-T Cloud Computing Functional Reference Architecture -- 2.8 Network Requirements for Cloud Computing -- 2.9 Summary -- References -- Chapter 3 Cloud Security Baselines -- 3.1 Introduction -- 3.2 An Overview of Computer Security -- 3.3 Vulnerabilities and Attacks -- 3.3.1 Application Layer -- 3.3.2 Operating System Layer -- 3.3.3 Hypervisor, Storage, Hardware, and Network -- 3.3.4 Cloud Security Mechanisms -- 3.3.4.1 Data Security -- 3.3.4.2 Digital Signature…”
Taylor & Francis
OCLC metadata license agreement
Electronic eBook -
2
Information assurance and computer security
Published 2006Subjects: “…Computer security.…”
An electronic book accessible through the World Wide Web; click to view
Electronic Conference Proceeding eBook -
3
Information assurance handbook : effective computer security and risk management strategies /
Published 2015Subjects:Book -
4
Information assurance for the entrerprise : a roadmap to information security /
Published 2007Subjects: “…Computer security.…”
Book -
5
Information assurance for the enterprise : a roadmap to information security /
Published 2007Subjects: “…Computer security.…”
Book -
6
Data privacy in the information age
Published 2000Subjects: “…Computer security.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
7
Black hat physical device security exploiting hardware and software /
Published 2005Subjects: “…Computer security.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
8
Papers from the first European workshop on technological & security issues in digital rights management (EuDiRights)
Published 2007Subjects: “…Computer security.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
9
A process for developing a common vocabulary in the information security area
Published 2007Subjects: “…Computer security.…”
An electronic book accessible through the World Wide Web; click to view
Electronic Conference Proceeding eBook -
10
Comptia Security+ 2008 in depth
Published 2009Subjects: “…Computer security.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
11
Information security policy, processes, and practices /
Published 2008Subjects: “…Computer security.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
12
Getting started with FortiGate /
Published 2013Subjects: “…Computer security.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
13
A practical guide to managing information security
Published 2004Subjects: “…Computer security Management.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
14
Information security management principles
Published 2013Subjects: “…Computer security Management.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
15
Technology and privacy the new landscape /
Published 1997Subjects: “…Computer security.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
16
Finding and fixing vulnerabilities in information systems the vulnerability assessment & mitigation methodology /
Published 2003Subjects: “…Computer security.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
17
Privacy protection and computer forensics
Published 2004Subjects: “…Computer security.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
18
Techniques and applications of digital watermarking and content protection
Published 2003Subjects: “…Computer security.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
19
Implementing database security and auditing
Published 2005Subjects: “…Computer security.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
20
Digital watermarking and steganography
Published 2008Subjects: “…Computer security.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook