Suggested Topics within your search.
Suggested Topics within your search.
- Data protection
- Computer security 72
- Security measures 18
- Law and legislation 16
- Privacy, Right of 16
- Information technology 12
- Computer networks 10
- Management 10
- Computer Security 6
- Confidentiality 6
- Digital watermarking 6
- European Union 6
- Government Regulation 6
- legislation & jurisprudence 6
- Access control 4
- Artificial intelligence 4
- Business enterprises 4
- Business intelligence 4
- COMPUTERS / Security / General 4
- Computer crimes 4
- Cyberterrorism 4
- Data processing 4
- Emergency management 4
- Planning 4
- Prevention 4
- Trade secrets 4
- Databases 3
- Databases, Genetic 3
- Human genetics 3
- Informed Consent 3
-
1
Cloud computing security foundations and challenges /
Published 2021Table of Contents: “…2.7 ITU-T Cloud Computing Reference Architecture -- 2.7.1 Cloud Computing Actors -- 2.7.2 Layered Architecture -- 2.7.3 ITU-T Cloud Computing Functional Reference Architecture -- 2.8 Network Requirements for Cloud Computing -- 2.9 Summary -- References -- Chapter 3 Cloud Security Baselines -- 3.1 Introduction -- 3.2 An Overview of Computer Security -- 3.3 Vulnerabilities and Attacks -- 3.3.1 Application Layer -- 3.3.2 Operating System Layer -- 3.3.3 Hypervisor, Storage, Hardware, and Network -- 3.3.4 Cloud Security Mechanisms -- 3.3.4.1 Data Security -- 3.3.4.2 Digital Signature…”
Taylor & Francis
OCLC metadata license agreement
Electronic eBook -
2
Cloud computing security foundations and challenges /
Published 2021Table of Contents: “…2.7 ITU-T Cloud Computing Reference Architecture -- 2.7.1 Cloud Computing Actors -- 2.7.2 Layered Architecture -- 2.7.3 ITU-T Cloud Computing Functional Reference Architecture -- 2.8 Network Requirements for Cloud Computing -- 2.9 Summary -- References -- Chapter 3 Cloud Security Baselines -- 3.1 Introduction -- 3.2 An Overview of Computer Security -- 3.3 Vulnerabilities and Attacks -- 3.3.1 Application Layer -- 3.3.2 Operating System Layer -- 3.3.3 Hypervisor, Storage, Hardware, and Network -- 3.3.4 Cloud Security Mechanisms -- 3.3.4.1 Data Security -- 3.3.4.2 Digital Signature…”
Taylor & Francis
OCLC metadata license agreement
Electronic eBook -
3
Information assurance and computer security
Published 2006Subjects: “…Computer security.…”
An electronic book accessible through the World Wide Web; click to view
Electronic Conference Proceeding eBook -
4
Information assurance and computer security
Published 2006Subjects: “…Computer security.…”
An electronic book accessible through the World Wide Web; click to view
Electronic Conference Proceeding eBook -
5
Data privacy in the information age
Published 2000Subjects: “…Computer security.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
6
Black hat physical device security exploiting hardware and software /
Published 2005Subjects: “…Computer security.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
7
Papers from the first European workshop on technological & security issues in digital rights management (EuDiRights)
Published 2007Subjects: “…Computer security.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
8
A process for developing a common vocabulary in the information security area
Published 2007Subjects: “…Computer security.…”
An electronic book accessible through the World Wide Web; click to view
Electronic Conference Proceeding eBook -
9
Comptia Security+ 2008 in depth
Published 2009Subjects: “…Computer security.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
10
Information security policy, processes, and practices /
Published 2008Subjects: “…Computer security.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
11
Getting started with FortiGate /
Published 2013Subjects: “…Computer security.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
12
Getting started with FortiGate /
Published 2013Subjects: “…Computer security.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
13
Data privacy in the information age
Published 2000Subjects: “…Computer security.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
14
Black hat physical device security exploiting hardware and software /
Published 2005Subjects: “…Computer security.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
15
Papers from the first European workshop on technological & security issues in digital rights management (EuDiRights)
Published 2007Subjects: “…Computer security.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
16
A process for developing a common vocabulary in the information security area
Published 2007Subjects: “…Computer security.…”
An electronic book accessible through the World Wide Web; click to view
Electronic Conference Proceeding eBook -
17
Comptia Security+ 2008 in depth
Published 2009Subjects: “…Computer security.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
18
Information security policy, processes, and practices /
Published 2008Subjects: “…Computer security.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
19
A practical guide to managing information security
Published 2004Subjects: “…Computer security Management.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
20
Information security management principles
Published 2013Subjects: “…Computer security Management.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook