Showing 1 - 20 results of 80 for search '"computer security"', query time: 0.04s Refine Results
  1. 1

    Cloud computing security foundations and challenges /

    Published 2021
    Table of Contents: “…2.7 ITU-T Cloud Computing Reference Architecture -- 2.7.1 Cloud Computing Actors -- 2.7.2 Layered Architecture -- 2.7.3 ITU-T Cloud Computing Functional Reference Architecture -- 2.8 Network Requirements for Cloud Computing -- 2.9 Summary -- References -- Chapter 3 Cloud Security Baselines -- 3.1 Introduction -- 3.2 An Overview of Computer Security -- 3.3 Vulnerabilities and Attacks -- 3.3.1 Application Layer -- 3.3.2 Operating System Layer -- 3.3.3 Hypervisor, Storage, Hardware, and Network -- 3.3.4 Cloud Security Mechanisms -- 3.3.4.1 Data Security -- 3.3.4.2 Digital Signature…”
    Taylor & Francis
    OCLC metadata license agreement
    Electronic eBook
  2. 2

    Cloud computing security foundations and challenges /

    Published 2021
    Table of Contents: “…2.7 ITU-T Cloud Computing Reference Architecture -- 2.7.1 Cloud Computing Actors -- 2.7.2 Layered Architecture -- 2.7.3 ITU-T Cloud Computing Functional Reference Architecture -- 2.8 Network Requirements for Cloud Computing -- 2.9 Summary -- References -- Chapter 3 Cloud Security Baselines -- 3.1 Introduction -- 3.2 An Overview of Computer Security -- 3.3 Vulnerabilities and Attacks -- 3.3.1 Application Layer -- 3.3.2 Operating System Layer -- 3.3.3 Hypervisor, Storage, Hardware, and Network -- 3.3.4 Cloud Security Mechanisms -- 3.3.4.1 Data Security -- 3.3.4.2 Digital Signature…”
    Taylor & Francis
    OCLC metadata license agreement
    Electronic eBook
  3. 3

    Information assurance and computer security

    Published 2006
    Subjects: “…Computer security.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic Conference Proceeding eBook
  4. 4

    Information assurance and computer security

    Published 2006
    Subjects: “…Computer security.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic Conference Proceeding eBook
  5. 5

    Data privacy in the information age by Klosek, Jacqueline, 1972-

    Published 2000
    Subjects: “…Computer security.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  6. 6

    Black hat physical device security exploiting hardware and software / by Miller, Drew

    Published 2005
    Subjects: “…Computer security.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  7. 7
  8. 8

    A process for developing a common vocabulary in the information security area

    Published 2007
    Subjects: “…Computer security.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic Conference Proceeding eBook
  9. 9

    Comptia Security+ 2008 in depth by Ciampa, Mark D.

    Published 2009
    Subjects: “…Computer security.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  10. 10

    Information security policy, processes, and practices /

    Published 2008
    Subjects: “…Computer security.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  11. 11

    Getting started with FortiGate / by Fabbri, Rosato

    Published 2013
    Subjects: “…Computer security.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  12. 12

    Getting started with FortiGate / by Fabbri, Rosato

    Published 2013
    Subjects: “…Computer security.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  13. 13

    Data privacy in the information age by Klosek, Jacqueline, 1972-

    Published 2000
    Subjects: “…Computer security.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  14. 14

    Black hat physical device security exploiting hardware and software / by Miller, Drew

    Published 2005
    Subjects: “…Computer security.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  15. 15
  16. 16

    A process for developing a common vocabulary in the information security area

    Published 2007
    Subjects: “…Computer security.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic Conference Proceeding eBook
  17. 17

    Comptia Security+ 2008 in depth by Ciampa, Mark D.

    Published 2009
    Subjects: “…Computer security.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  18. 18

    Information security policy, processes, and practices /

    Published 2008
    Subjects: “…Computer security.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  19. 19

    A practical guide to managing information security by Purser, Steve

    Published 2004
    Subjects: “…Computer security Management.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  20. 20

    Information security management principles by Alexander, David

    Published 2013
    Subjects: “…Computer security Management.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook