Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks
- Security measures
- Computer security 247
- Prevention 30
- Computer hackers 26
- Firewalls (Computer security) 24
- Computer crimes 22
- Access control 20
- Examinations 20
- Certification 16
- Computers 16
- Penetration testing (Computer security) 16
- Electronic data processing personnel 14
- Information technology 14
- Management 13
- Business enterprises 12
- COMPUTERS / Security / General 12
- Cyberterrorism 12
- Data encryption (Computer science) 12
- Data protection 12
- Internet 12
- Testing 12
- Computer programs 6
- Corporations 6
- Evaluation 6
- Forensic sciences 6
- Investigation 6
- Application software 4
- Auditing 4
- COMPUTERS / Computer Graphics / Game Programming & Design 4
-
1
-
2
-
3
Cloud computing security foundations and challenges /
Published 2021Table of Contents: “…2.7 ITU-T Cloud Computing Reference Architecture -- 2.7.1 Cloud Computing Actors -- 2.7.2 Layered Architecture -- 2.7.3 ITU-T Cloud Computing Functional Reference Architecture -- 2.8 Network Requirements for Cloud Computing -- 2.9 Summary -- References -- Chapter 3 Cloud Security Baselines -- 3.1 Introduction -- 3.2 An Overview of Computer Security -- 3.3 Vulnerabilities and Attacks -- 3.3.1 Application Layer -- 3.3.2 Operating System Layer -- 3.3.3 Hypervisor, Storage, Hardware, and Network -- 3.3.4 Cloud Security Mechanisms -- 3.3.4.1 Data Security -- 3.3.4.2 Digital Signature…”
Taylor & Francis
OCLC metadata license agreement
Electronic eBook -
4
Cloud computing security foundations and challenges /
Published 2021Table of Contents: “…2.7 ITU-T Cloud Computing Reference Architecture -- 2.7.1 Cloud Computing Actors -- 2.7.2 Layered Architecture -- 2.7.3 ITU-T Cloud Computing Functional Reference Architecture -- 2.8 Network Requirements for Cloud Computing -- 2.9 Summary -- References -- Chapter 3 Cloud Security Baselines -- 3.1 Introduction -- 3.2 An Overview of Computer Security -- 3.3 Vulnerabilities and Attacks -- 3.3.1 Application Layer -- 3.3.2 Operating System Layer -- 3.3.3 Hypervisor, Storage, Hardware, and Network -- 3.3.4 Cloud Security Mechanisms -- 3.3.4.1 Data Security -- 3.3.4.2 Digital Signature…”
Taylor & Francis
OCLC metadata license agreement
Electronic eBook -
5
The essential guide to home computer security
Published 2011Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
6
The essential guide to home computer security
Published 2011Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
7
-
8
-
9
Information assurance handbook : effective computer security and risk management strategies /
Published 2015Subjects:Book -
10
Information assurance handbook : effective computer security and risk management strategies /
Published 2015Subjects:Book -
11
Configuring ISA server 2000 building firewalls for windows 2000 /
Published 2001Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
12
Dr. Tom Shinder's configuring ISA Server 2004
Published 2005Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
13
Configuring ISA server 2000 building firewalls for windows 2000 /
Published 2001Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
14
Dr. Tom Shinder's configuring ISA Server 2004
Published 2005Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
15
Check Point NG VPN-1/Firewall-1 advanced configuration and troubleshooting /
Published 2003Subjects: “…Computer security Computer programs.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
16
Check Point NG VPN-1/Firewall-1 advanced configuration and troubleshooting /
Published 2003Subjects: “…Computer security Computer programs.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
17
Cybersecurity today and tomorrow pay now or pay later /
Published 2002Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
18
Cybersecurity today and tomorrow pay now or pay later /
Published 2002Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
19
Snort 2.0 intrusion detection
Published 2003Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
20
Security sage's guide to hardening the network infrastructure
Published 2004Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook