Suggested Topics within your search.
Suggested Topics within your search.
- Prevention
- Computer security 21
- Security measures 16
- Computer networks 15
- Computer crimes 12
- Cyberterrorism 8
- Computer hackers 3
- Corporations 3
- Business enterprises 2
- COMPUTERS / Security / General 2
- Data protection 2
- Government policy 2
- Penetration testing (Computer security) 2
- Terrorism 2
- Application software 1
- COMPUTERS / Disaster Recovery 1
- Civil defense 1
- Computer software 1
- Computer viruses 1
- Cyberspace 1
- Hacking 1
- Information networks 1
- Information technology 1
- LAW / Forensic Science 1
- Law and legislation 1
- MATHEMATICS / General 1
- Planning 1
- Protection 1
- Public utilities 1
- Spam (Electronic mail) 1
-
1
Zen and the art of information security
Published 2007Subjects: “…Computer security.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
2
-
3
Toward a safer and more secure cyberspace
Published 2007Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
4
Cyber security and IT infrastructure protection /
Published 2014Subjects: “…Computer security.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
5
Selected papers from Kaspersky Lab's CyberSecurity for the Next Generation Conference 2013 /
Published 2014Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
6
Cyber blockades /
Published 2014Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
7
The defendeŕs dilemma : charting a course toward cybersecurity /
Published 2015Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
8
Web application defender's cookbook battling hackers and protecting users /
Published 2013Subjects: “…Computer security.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
9
Terrorist use of cyberspace and cyber terrorism : new challenges and reponses /
Published 2015Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
10
The basics of hacking and penetration testing ethical hacking and penetration testing made easy /
Published 2013Subjects: “…Penetration testing (Computer security)…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
11
Cyber-security threats, actors, and dynamic mitigation /
Published 2021Subjects: “…Computer security. 22061…”
Taylor & Francis
OCLC metadata license agreement
Electronic eBook -
12
CYBERSECURITY LESSONS FROM COVID-19.
Published 2021Subjects: “…Computer security. 37333…”
Taylor & Francis
OCLC metadata license agreement
Electronic eBook -
13
Degunking your email, snam, and viruses
Published 2004Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
14
At the nexus of cybersecurity and public policy : some basic concepts and issues /
Published 2014Subjects: “…Computer security United States.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
15
Network attacks & exploitation : a framework /
Published 2015Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
16
Cyber security culture : counteracting cyber threats through organizational learning and training /
Published 2013Subjects:Book -
17
Hacking web apps detecting and preventing web application security problems /
Published 2012Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
18
Cyber threat! : how to manage the growing risk of cyber attacks /
Published 2014Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
19
Cybersecurity law /
Published 2017Subjects: “…Computer security Law and legislation United States.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
20
Comprehensive approach as 'sine qua non' for critical infrastructure protection /
Published 2015Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook