Suggested Topics within your search.
Suggested Topics within your search.
- Computer security
- Security measures 312
- Computer networks 246
- Data protection 72
- Access control 44
- Internet 42
- Computer crimes 40
- Prevention 38
- Computer hackers 36
- Information technology 36
- Computers 34
- Management 29
- Cryptography 28
- Examinations 26
- Data encryption (Computer science) 24
- Certification 22
- Cyberterrorism 20
- Electronic data processing personnel 20
- COMPUTERS / Security / General 18
- Privacy, Right of 18
- Law and legislation 17
- Systems and Data Security 15
- Business enterprises 14
- Firewalls (Computer security) 14
- Operating systems (Computers) 12
- Computer science 11
- Cloud computing 10
- Computer software 10
- Database security 10
- Embedded computer systems 10
-
1
Essential computer security everyone's guide to e-mail, internet, and wireless security /
Published 2006Subjects: “…Computer security.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
2
Cloud computing security foundations and challenges /
Published 2021Table of Contents: “…2.7 ITU-T Cloud Computing Reference Architecture -- 2.7.1 Cloud Computing Actors -- 2.7.2 Layered Architecture -- 2.7.3 ITU-T Cloud Computing Functional Reference Architecture -- 2.8 Network Requirements for Cloud Computing -- 2.9 Summary -- References -- Chapter 3 Cloud Security Baselines -- 3.1 Introduction -- 3.2 An Overview of Computer Security -- 3.3 Vulnerabilities and Attacks -- 3.3.1 Application Layer -- 3.3.2 Operating System Layer -- 3.3.3 Hypervisor, Storage, Hardware, and Network -- 3.3.4 Cloud Security Mechanisms -- 3.3.4.1 Data Security -- 3.3.4.2 Digital Signature…”
Taylor & Francis
OCLC metadata license agreement
Electronic eBook -
3
Essential computer security everyone's guide to e-mail, internet, and wireless security /
Published 2006Subjects: “…Computer security.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
4
Cloud computing security foundations and challenges /
Published 2021Table of Contents: “…2.7 ITU-T Cloud Computing Reference Architecture -- 2.7.1 Cloud Computing Actors -- 2.7.2 Layered Architecture -- 2.7.3 ITU-T Cloud Computing Functional Reference Architecture -- 2.8 Network Requirements for Cloud Computing -- 2.9 Summary -- References -- Chapter 3 Cloud Security Baselines -- 3.1 Introduction -- 3.2 An Overview of Computer Security -- 3.3 Vulnerabilities and Attacks -- 3.3.1 Application Layer -- 3.3.2 Operating System Layer -- 3.3.3 Hypervisor, Storage, Hardware, and Network -- 3.3.4 Cloud Security Mechanisms -- 3.3.4.1 Data Security -- 3.3.4.2 Digital Signature…”
Taylor & Francis
OCLC metadata license agreement
Electronic eBook -
5
Information assurance and computer security
Published 2006Subjects: “…Computer security.…”
An electronic book accessible through the World Wide Web; click to view
Electronic Conference Proceeding eBook -
6
Risk management for computer security Protecting your network and information assets /
Published 2005Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
7
Information management & computer security.
Published 2007Subjects: “…Computer security.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
8
Information assurance and computer security
Published 2006Subjects: “…Computer security.…”
An electronic book accessible through the World Wide Web; click to view
Electronic Conference Proceeding eBook -
9
Risk management for computer security Protecting your network and information assets /
Published 2005Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
10
Information management & computer security.
Published 2007Subjects: “…Computer security.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
11
Best damn firewall book period
Published 2007Subjects: “…Firewalls (Computer security)…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
12
Security 2020 reduce security risks this decade /
Published 2011Subjects: “…Computer security.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
13
Security 2020 reduce security risks this decade /
Published 2011Subjects: “…Computer security.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
14
Best damn firewall book period
Published 2007Subjects: “…Firewalls (Computer security)…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
15
Untangle network security : secure your network against threats and vulnerabilities using the unparalleled Untangle NGFW /
Published 2014Subjects: “…Computer security Security measures.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
16
Untangle network security : secure your network against threats and vulnerabilities using the unparalleled Untangle NGFW /
Published 2014Subjects: “…Computer security Security measures.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
17
The essential guide to home computer security
Published 2011Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
18
The essential guide to home computer security
Published 2011Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
19
Computers at risk safe computing in the information age /
Published 1991Subjects: “…Computer security.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
20
Least privilege security for Windows 7, Vista, And XP secure desktops for regulatory compliance and business agility /
Published 2010Subjects: “…Computer security.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook