Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks
- Security measures 272
- Computer security 246
- Computer hackers 28
- Examinations 28
- Prevention 28
- Access control 24
- Certification 24
- Firewalls (Computer security) 24
- Electronic data processing personnel 22
- Computer crimes 20
- Computers 20
- Penetration testing (Computer security) 16
- Information technology 14
- Business enterprises 12
- Cyberterrorism 12
- Internet 12
- Management 12
- Testing 12
- COMPUTERS / Security / General 10
- Data encryption (Computer science) 10
- Data protection 10
- Computer programs 6
- Evaluation 6
- Forensic sciences 6
- Investigation 6
- Application software 4
- Auditing 4
- COMPUTERS / Computer Graphics / Game Programming & Design 4
- Cloud computing 4
-
1
Cloud computing security foundations and challenges /
Published 2021Table of Contents: “…2.7 ITU-T Cloud Computing Reference Architecture -- 2.7.1 Cloud Computing Actors -- 2.7.2 Layered Architecture -- 2.7.3 ITU-T Cloud Computing Functional Reference Architecture -- 2.8 Network Requirements for Cloud Computing -- 2.9 Summary -- References -- Chapter 3 Cloud Security Baselines -- 3.1 Introduction -- 3.2 An Overview of Computer Security -- 3.3 Vulnerabilities and Attacks -- 3.3.1 Application Layer -- 3.3.2 Operating System Layer -- 3.3.3 Hypervisor, Storage, Hardware, and Network -- 3.3.4 Cloud Security Mechanisms -- 3.3.4.1 Data Security -- 3.3.4.2 Digital Signature…”
Taylor & Francis
OCLC metadata license agreement
Electronic eBook -
2
Cloud computing security foundations and challenges /
Published 2021Table of Contents: “…2.7 ITU-T Cloud Computing Reference Architecture -- 2.7.1 Cloud Computing Actors -- 2.7.2 Layered Architecture -- 2.7.3 ITU-T Cloud Computing Functional Reference Architecture -- 2.8 Network Requirements for Cloud Computing -- 2.9 Summary -- References -- Chapter 3 Cloud Security Baselines -- 3.1 Introduction -- 3.2 An Overview of Computer Security -- 3.3 Vulnerabilities and Attacks -- 3.3.1 Application Layer -- 3.3.2 Operating System Layer -- 3.3.3 Hypervisor, Storage, Hardware, and Network -- 3.3.4 Cloud Security Mechanisms -- 3.3.4.1 Data Security -- 3.3.4.2 Digital Signature…”
Taylor & Francis
OCLC metadata license agreement
Electronic eBook -
3
The essential guide to home computer security
Published 2011Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
4
The essential guide to home computer security
Published 2011Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
5
-
6
-
7
Configuring ISA server 2000 building firewalls for windows 2000 /
Published 2001Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
8
Dr. Tom Shinder's configuring ISA Server 2004
Published 2005Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
9
Configuring ISA server 2000 building firewalls for windows 2000 /
Published 2001Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
10
Dr. Tom Shinder's configuring ISA Server 2004
Published 2005Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
11
Check Point NG VPN-1/Firewall-1 advanced configuration and troubleshooting /
Published 2003Subjects: “…Computer security Computer programs.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
12
Check Point NG VPN-1/Firewall-1 advanced configuration and troubleshooting /
Published 2003Subjects: “…Computer security Computer programs.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
13
Mission-critical network planning
Published 2003Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
14
Mission-critical network planning
Published 2003Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
15
Cybersecurity today and tomorrow pay now or pay later /
Published 2002Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
16
Cybersecurity today and tomorrow pay now or pay later /
Published 2002Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
17
Snort 2.0 intrusion detection
Published 2003Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
18
Security sage's guide to hardening the network infrastructure
Published 2004Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
19
Invasion of privacy! big brother and the company hackers /
Published 2004Subjects: “…Computer security.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
20
Hacking the code ASP. NET web application security /
Published 2004Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook