在您的搜寻 主题建议
在您的搜寻 主题建议
- Security measures
- Computer security 327
- Computer networks 289
- Internet 34
- Prevention 32
- Firewalls (Computer security) 28
- Computer hackers 26
- Information technology 26
- Access control 24
- Computer crimes 24
- Computers 20
- Data protection 20
- Examinations 20
- COMPUTERS / Security / General 18
- Management 17
- Certification 16
- Cyberterrorism 16
- Data encryption (Computer science) 16
- Penetration testing (Computer security) 16
- Business enterprises 14
- Electronic data processing personnel 14
- Cloud computing 12
- Testing 12
- Mobile computing 10
- Electronic data processing departments 8
- Investigation 8
- Operating systems (Computers) 8
- Application software 6
- Auditing 6
- COMPUTERS / Computer Graphics / Game Programming & Design 6
-
1
-
2
-
3
Essential computer security everyone's guide to e-mail, internet, and wireless security /
出版 2006主题: “...Computer security....”
An electronic book accessible through the World Wide Web; click to view
电子 电子书 -
4
-
5
-
6
Cloud computing security foundations and challenges /
出版 2021书本目录: “...2.7 ITU-T Cloud Computing Reference Architecture -- 2.7.1 Cloud Computing Actors -- 2.7.2 Layered Architecture -- 2.7.3 ITU-T Cloud Computing Functional Reference Architecture -- 2.8 Network Requirements for Cloud Computing -- 2.9 Summary -- References -- Chapter 3 Cloud Security Baselines -- 3.1 Introduction -- 3.2 An Overview of Computer Security -- 3.3 Vulnerabilities and Attacks -- 3.3.1 Application Layer -- 3.3.2 Operating System Layer -- 3.3.3 Hypervisor, Storage, Hardware, and Network -- 3.3.4 Cloud Security Mechanisms -- 3.3.4.1 Data Security -- 3.3.4.2 Digital Signature...”
Taylor & Francis
OCLC metadata license agreement
电子 电子书 -
7
Essential computer security everyone's guide to e-mail, internet, and wireless security /
出版 2006主题: “...Computer security....”
An electronic book accessible through the World Wide Web; click to view
电子 电子书 -
8
Cloud computing security foundations and challenges /
出版 2021书本目录: “...2.7 ITU-T Cloud Computing Reference Architecture -- 2.7.1 Cloud Computing Actors -- 2.7.2 Layered Architecture -- 2.7.3 ITU-T Cloud Computing Functional Reference Architecture -- 2.8 Network Requirements for Cloud Computing -- 2.9 Summary -- References -- Chapter 3 Cloud Security Baselines -- 3.1 Introduction -- 3.2 An Overview of Computer Security -- 3.3 Vulnerabilities and Attacks -- 3.3.1 Application Layer -- 3.3.2 Operating System Layer -- 3.3.3 Hypervisor, Storage, Hardware, and Network -- 3.3.4 Cloud Security Mechanisms -- 3.3.4.1 Data Security -- 3.3.4.2 Digital Signature...”
Taylor & Francis
OCLC metadata license agreement
电子 电子书 -
9
-
10
-
11
Untangle network security : secure your network against threats and vulnerabilities using the unparalleled Untangle NGFW /
出版 2014主题: “...Computer security Security measures....”
An electronic book accessible through the World Wide Web; click to view
电子 电子书 -
12
Untangle network security : secure your network against threats and vulnerabilities using the unparalleled Untangle NGFW /
出版 2014主题: “...Computer security Security measures....”
An electronic book accessible through the World Wide Web; click to view
电子 电子书 -
13
-
14
-
15
-
16
-
17
Cloud security a comprehensive guide to secure cloud computing /
出版 2010主题: “...Cloud computing Security measures....”
An electronic book accessible through the World Wide Web; click to view
电子 电子书 -
18
Cloud security a comprehensive guide to secure cloud computing /
出版 2010主题: “...Cloud computing Security measures....”
An electronic book accessible through the World Wide Web; click to view
电子 电子书 -
19
-
20