Predložene teme unutar tvoje pretrage.
Predložene teme unutar tvoje pretrage.
- Data protection
- Computer security 81
- Security measures 20
- Law and legislation 16
- Privacy, Right of 16
- Computer networks 12
- Information technology 12
- Management 10
- COMPUTERS / Security / General 6
- Computer Security 6
- Confidentiality 6
- Digital watermarking 6
- European Union 6
- Government Regulation 6
- legislation & jurisprudence 6
- Access control 4
- Artificial intelligence 4
- Business enterprises 4
- Business intelligence 4
- Computer crimes 4
- Cyberterrorism 4
- Data processing 4
- Emergency management 4
- Planning 4
- Prevention 4
- Trade secrets 4
- Databases 3
- Databases, Genetic 3
- Human genetics 3
- Informed Consent 3
-
1
Cloud computing security foundations and challenges /
Izdano 2021Sadržaj: “…2.7 ITU-T Cloud Computing Reference Architecture -- 2.7.1 Cloud Computing Actors -- 2.7.2 Layered Architecture -- 2.7.3 ITU-T Cloud Computing Functional Reference Architecture -- 2.8 Network Requirements for Cloud Computing -- 2.9 Summary -- References -- Chapter 3 Cloud Security Baselines -- 3.1 Introduction -- 3.2 An Overview of Computer Security -- 3.3 Vulnerabilities and Attacks -- 3.3.1 Application Layer -- 3.3.2 Operating System Layer -- 3.3.3 Hypervisor, Storage, Hardware, and Network -- 3.3.4 Cloud Security Mechanisms -- 3.3.4.1 Data Security -- 3.3.4.2 Digital Signature…”
Taylor & Francis
OCLC metadata license agreement
Elektronički e-knjiga -
2
Cloud computing security foundations and challenges /
Izdano 2021Sadržaj: “…2.7 ITU-T Cloud Computing Reference Architecture -- 2.7.1 Cloud Computing Actors -- 2.7.2 Layered Architecture -- 2.7.3 ITU-T Cloud Computing Functional Reference Architecture -- 2.8 Network Requirements for Cloud Computing -- 2.9 Summary -- References -- Chapter 3 Cloud Security Baselines -- 3.1 Introduction -- 3.2 An Overview of Computer Security -- 3.3 Vulnerabilities and Attacks -- 3.3.1 Application Layer -- 3.3.2 Operating System Layer -- 3.3.3 Hypervisor, Storage, Hardware, and Network -- 3.3.4 Cloud Security Mechanisms -- 3.3.4.1 Data Security -- 3.3.4.2 Digital Signature…”
Taylor & Francis
OCLC metadata license agreement
Elektronički e-knjiga -
3
Information assurance and computer security
Izdano 2006Teme: “…Computer security.…”
An electronic book accessible through the World Wide Web; click to view
Elektronički Izvještaj sastanka e-knjiga -
4
Information assurance and computer security
Izdano 2006Teme: “…Computer security.…”
An electronic book accessible through the World Wide Web; click to view
Elektronički Izvještaj sastanka e-knjiga -
5
Information assurance handbook : effective computer security and risk management strategies /
Izdano 2015Teme:Knjiga -
6
Information assurance handbook : effective computer security and risk management strategies /
Izdano 2015Teme:Knjiga -
7
Information assurance for the entrerprise : a roadmap to information security /
Izdano 2007Teme: “…Computer security.…”
Knjiga -
8
Information assurance for the enterprise : a roadmap to information security /
Izdano 2007Teme: “…Computer security.…”
Knjiga -
9
Data privacy in the information age
Izdano 2000Teme: “…Computer security.…”
An electronic book accessible through the World Wide Web; click to view
Elektronički e-knjiga -
10
Black hat physical device security exploiting hardware and software /
Izdano 2005Teme: “…Computer security.…”
An electronic book accessible through the World Wide Web; click to view
Elektronički e-knjiga -
11
Papers from the first European workshop on technological & security issues in digital rights management (EuDiRights)
Izdano 2007Teme: “…Computer security.…”
An electronic book accessible through the World Wide Web; click to view
Elektronički e-knjiga -
12
A process for developing a common vocabulary in the information security area
Izdano 2007Teme: “…Computer security.…”
An electronic book accessible through the World Wide Web; click to view
Elektronički Izvještaj sastanka e-knjiga -
13
Comptia Security+ 2008 in depth
Izdano 2009Teme: “…Computer security.…”
An electronic book accessible through the World Wide Web; click to view
Elektronički e-knjiga -
14
Information security policy, processes, and practices /
Izdano 2008Teme: “…Computer security.…”
An electronic book accessible through the World Wide Web; click to view
Elektronički e-knjiga -
15
Getting started with FortiGate /
Izdano 2013Teme: “…Computer security.…”
An electronic book accessible through the World Wide Web; click to view
Elektronički e-knjiga -
16
Getting started with FortiGate /
Izdano 2013Teme: “…Computer security.…”
An electronic book accessible through the World Wide Web; click to view
Elektronički e-knjiga -
17
Information assurance for the enterprise : a roadmap to information security /
Izdano 2007Teme: “…Computer security.…”
Knjiga -
18
Information assurance for the entrerprise : a roadmap to information security /
Izdano 2007Teme: “…Computer security.…”
Knjiga -
19
Data privacy in the information age
Izdano 2000Teme: “…Computer security.…”
An electronic book accessible through the World Wide Web; click to view
Elektronički e-knjiga -
20
Black hat physical device security exploiting hardware and software /
Izdano 2005Teme: “…Computer security.…”
An electronic book accessible through the World Wide Web; click to view
Elektronički e-knjiga