Search Results - "computer security"
Suggested Topics within your search.
Suggested Topics within your search.
- Computer security 23
- Data protection
- Digital watermarking 3
- Security measures 3
- Computer networks 2
- Information technology 2
- Management 2
- Artificial intelligence 1
- COMPUTERS / Computer Graphics / Game Programming & Design 1
- COMPUTERS / Information Technology 1
- COMPUTERS / Security / General 1
- Certification 1
- Cloud computing 1
- Computer crimes 1
- Cryptography 1
- Data integrity 1
- Data processing 1
- Database security 1
- Forensic sciences 1
- Privacy, Right of 1
- Risk assessment 1
- Software protection 1
- Watermarks 1
-
1
Cloud computing security foundations and challenges /
Published 2021Table of Contents: “…2.7 ITU-T Cloud Computing Reference Architecture -- 2.7.1 Cloud Computing Actors -- 2.7.2 Layered Architecture -- 2.7.3 ITU-T Cloud Computing Functional Reference Architecture -- 2.8 Network Requirements for Cloud Computing -- 2.9 Summary -- References -- Chapter 3 Cloud Security Baselines -- 3.1 Introduction -- 3.2 An Overview of Computer Security -- 3.3 Vulnerabilities and Attacks -- 3.3.1 Application Layer -- 3.3.2 Operating System Layer -- 3.3.3 Hypervisor, Storage, Hardware, and Network -- 3.3.4 Cloud Security Mechanisms -- 3.3.4.1 Data Security -- 3.3.4.2 Digital Signature…”
Taylor & Francis
OCLC metadata license agreement
Electronic eBook -
2
Information assurance and computer security
Published 2006Subjects: “…Computer security.…”
An electronic book accessible through the World Wide Web; click to view
Electronic Conference Proceeding eBook -
3
Data privacy in the information age
Published 2000Subjects: “…Computer security.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
4
Black hat physical device security exploiting hardware and software /
Published 2005Subjects: “…Computer security.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
5
Papers from the first European workshop on technological & security issues in digital rights management (EuDiRights)
Published 2007Subjects: “…Computer security.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
6
A process for developing a common vocabulary in the information security area
Published 2007Subjects: “…Computer security.…”
An electronic book accessible through the World Wide Web; click to view
Electronic Conference Proceeding eBook -
7
Comptia Security+ 2008 in depth
Published 2009Subjects: “…Computer security.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
8
Information security policy, processes, and practices /
Published 2008Subjects: “…Computer security.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
9
Getting started with FortiGate /
Published 2013Subjects: “…Computer security.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
10
A practical guide to managing information security
Published 2004Subjects: “…Computer security Management.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
11
Information security management principles
Published 2013Subjects: “…Computer security Management.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
12
Technology and privacy the new landscape /
Published 1997Subjects: “…Computer security.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
13
Finding and fixing vulnerabilities in information systems the vulnerability assessment & mitigation methodology /
Published 2003Subjects: “…Computer security.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
14
Privacy protection and computer forensics
Published 2004Subjects: “…Computer security.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
15
Techniques and applications of digital watermarking and content protection
Published 2003Subjects: “…Computer security.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
16
Implementing database security and auditing
Published 2005Subjects: “…Computer security.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
17
Digital watermarking and steganography
Published 2008Subjects: “…Computer security.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
18
Crackproof your software the best ways to protect your software against crackers /
Published 2002Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
19
Identity, security and democracy the wider social and ethical implications of automated systems for human identification /
Published 2009Subjects: “…Computer security Congresses.…”
An electronic book accessible through the World Wide Web; click to view
Electronic Conference Proceeding eBook -
20
Intelligent watermarking techniques
Published 2004Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook