Search Results - "computer security"

Refine Results
  1. 1

    Cloud computing security foundations and challenges /

    Published 2021
    Table of Contents: “…2.7 ITU-T Cloud Computing Reference Architecture -- 2.7.1 Cloud Computing Actors -- 2.7.2 Layered Architecture -- 2.7.3 ITU-T Cloud Computing Functional Reference Architecture -- 2.8 Network Requirements for Cloud Computing -- 2.9 Summary -- References -- Chapter 3 Cloud Security Baselines -- 3.1 Introduction -- 3.2 An Overview of Computer Security -- 3.3 Vulnerabilities and Attacks -- 3.3.1 Application Layer -- 3.3.2 Operating System Layer -- 3.3.3 Hypervisor, Storage, Hardware, and Network -- 3.3.4 Cloud Security Mechanisms -- 3.3.4.1 Data Security -- 3.3.4.2 Digital Signature…”
    Taylor & Francis
    OCLC metadata license agreement
    Electronic eBook
  2. 2

    Information assurance and computer security

    Published 2006
    Subjects: “…Computer security.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic Conference Proceeding eBook
  3. 3

    Information assurance for the enterprise : a roadmap to information security / by Schou, Corey

    Published 2007
    Subjects: “…Computer security.…”
    Book
  4. 4

    Data privacy in the information age by Klosek, Jacqueline, 1972-

    Published 2000
    Subjects: “…Computer security.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  5. 5

    Black hat physical device security exploiting hardware and software / by Miller, Drew

    Published 2005
    Subjects: “…Computer security.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  6. 6
  7. 7

    A process for developing a common vocabulary in the information security area

    Published 2007
    Subjects: “…Computer security.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic Conference Proceeding eBook
  8. 8

    Comptia Security+ 2008 in depth by Ciampa, Mark D.

    Published 2009
    Subjects: “…Computer security.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  9. 9

    Information security policy, processes, and practices /

    Published 2008
    Subjects: “…Computer security.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  10. 10

    Getting started with FortiGate / by Fabbri, Rosato

    Published 2013
    Subjects: “…Computer security.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  11. 11

    A practical guide to managing information security by Purser, Steve

    Published 2004
    Subjects: “…Computer security Management.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  12. 12

    Information security management principles by Alexander, David

    Published 2013
    Subjects: “…Computer security Management.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  13. 13

    Technology and privacy the new landscape /

    Published 1997
    Subjects: “…Computer security.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  14. 14
  15. 15

    Privacy protection and computer forensics by Caloyannides, Michael A.

    Published 2004
    Subjects: “…Computer security.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  16. 16
  17. 17

    Implementing database security and auditing by Ben-Natan, Ron

    Published 2005
    Subjects: “…Computer security.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  18. 18

    Digital watermarking and steganography

    Published 2008
    Subjects: “…Computer security.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  19. 19
  20. 20

    Identity, security and democracy the wider social and ethical implications of automated systems for human identification /

    Published 2009
    Subjects: “…Computer security Congresses.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic Conference Proceeding eBook