Suggested Topics within your search.
Suggested Topics within your search.
- Computer security
- Operating systems (Computers) 6
- Computer networks 5
- Security measures 5
- Directory services (Computer network technology) 3
- Software configuration management 3
- Application software 1
- COMPUTERS / Computer Graphics / Game Programming & Design 1
- COMPUTERS / Information Technology 1
- COMPUTERS / Security / General 1
- CORBA (Computer architecture) 1
- Cloud computing 1
- Computer hackers 1
- Data protection 1
- Distributed operating systems (Computers) 1
- Information resources management 1
- Macintosh (Computer) 1
- Programming 1
- SQL (Computer program language) 1
-
1
Linux on IBM e-server zSeries and S/390 best security practices /
Published 2004Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
2
Developing secure distributed systems with CORBA
Published 2002Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
3
-
4
Mac security bible
Published 2010Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
5
Group policy fundamentals, security, and the managed desktop /
Published 2010Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
6
Group policy fundamentals, security, and the managed desktop /
Published 2013Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
7
Group policy : fundamentals, security, and the managed desktop /
Published 2015Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
8
SQL injection attacks and defense
Published 2012Table of Contents: “…-- Testing for SQL injection -- Reviewing code for SQL injection -- Exploiting SQL injection -- Blind SQL injection exploitation -- Exploiting the operating system -- Advanced topics -- Code-level defenses -- Platform level defenses -- Confirming and recovering from SQL injection attacks.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
9
-
10
Hacking for dummies
Published 2013Table of Contents: “…Hacking network hosts -- pt. IV. Hacking operating systems -- pt. V. Hacking applications -- pt. …”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
11
Cloud computing security foundations and challenges /
Published 2021Table of Contents: “…2.7 ITU-T Cloud Computing Reference Architecture -- 2.7.1 Cloud Computing Actors -- 2.7.2 Layered Architecture -- 2.7.3 ITU-T Cloud Computing Functional Reference Architecture -- 2.8 Network Requirements for Cloud Computing -- 2.9 Summary -- References -- Chapter 3 Cloud Security Baselines -- 3.1 Introduction -- 3.2 An Overview of Computer Security -- 3.3 Vulnerabilities and Attacks -- 3.3.1 Application Layer -- 3.3.2 Operating System Layer -- 3.3.3 Hypervisor, Storage, Hardware, and Network -- 3.3.4 Cloud Security Mechanisms -- 3.3.4.1 Data Security -- 3.3.4.2 Digital Signature…”
Taylor & Francis
OCLC metadata license agreement
Electronic eBook