Computer networks - Security measures.
Overview
Works: | 463 works in 221 publications in 221 languages |
---|
Titles
Inside network perimeter security : = the definitive guide to firewalls, VPNs, routers, and intrusion detection systems /
by:
(Language materials, printed)
The Tao of network security monitoring : = beyond intrusion detection /
by:
(Language materials, printed)
Nessus, Snort, & Ethereal power tools : = customizing open source security applications /
by:
(Language materials, printed)
CYA = securing Exchange Server 2003 and Outlook Web Access : cover your a** by getting it right the first time /
by:
(Language materials, printed)
Foundations of security analysis and design II = FOSAD 2001/2002 tutorial lectures /
by:
(Language materials, printed)
Safe and secure = secure your home network, and protect your privacy online /
by:
(Language materials, printed)
Security in fixed and wireless networks : = an introduction to securing data communications /
by:
(Language materials, printed)
The art of software security assessment : = identifying and preventing software vulnerabilities /
by:
(Language materials, printed)
Special ops = host and network security for Microsoft, UNIX, and Oracle /
by:
(Language materials, printed)
Impacts and Risk Assessment of Technology for Internet Security = Enabled Information Small-Medium Enterprises (TEISMES) /
by:
(Language materials, printed)
Policies and Research in Identity Management = First IFIP WG11.6 Working Conference on Policies and Research in Identity Management (IDMAN'07), RSM Erasmus University, Rotterdam, The Netherlands, October 11-12, 2007/
by:
(Language materials, printed)
The Making of Information Systems = Software Engineering and Management in a Globalized World /
by:
(Language materials, printed)
Visualization for Computer Security = 5th International Workshop, VizSec 2008, Cambridge, MA, USA, September 15, 2008. Proceedings /
by:
(Language materials, printed)
Foundations of security analysis and design II = FOSAD 2001/2002 turorial lectures /
by:
(Language materials, printed)
Querying databases privately = a new approach to private information retrieval /
by:
(Language materials, printed)
Secure networking - CQRE [Secure] '99 = International Exhibition and Congress, Dusseldorf, Germany, November 30-December 2, 1999 : proceedings /
by:
(Language materials, printed)
Network intrusion detection and prevention = concepts and techniques /
by:
(Language materials, printed)
Home and small business guide to protecting your computer network, electronic assets, and privacy
by:
(Language materials, printed)
Cyber-security and global information assurance = threat analysis and response solutions /
by:
(Electronic resources)
Cyber security standards, practices and industrial applications = systems and methodologies /
by:
(Electronic resources)
Network security, administration, and management = advancing technology and practice /
by:
(Electronic resources)
Computer-mediated communication across cultures = international interactions in online environments /
by:
(Electronic resources)
Health-care telematics in Germany = design and application of a security analysis method /
by:
(Electronic resources)
Foundations and practice of security = 4th Canada-France MITACS Workshop, FPS 2011, Paris, France, May 12-13, 2011 : revised selected papers /
by:
(Electronic resources)
Critical infrastructure protection = information infrastructure models, analysis, and defense /
by:
(Electronic resources)
Security-aware systems applications and software development methods
by:
(Language materials, printed)
Strategic and practical approaches for information security governance = technologies and applied solutions /
by:
(Language materials, printed)
Optimizing information security and advancing privacy assurance = new technologies /
by:
(Language materials, printed)
Engineering secure two-party computation protocols = design, optimization, and applications of efficient secure function evaluation /
by:
(Electronic resources)
Wars of disruption and resilience = cybered conflict, power, and national security /
by:
(Electronic resources)
Theory and practice of cryptography solutions for secure information systems
by:
(Electronic resources)
Professional penetration testing DUP_1 = creating and operating a formal hacking lab /
by:
(Electronic resources)
Security risk management DUP_1 = building an information security risk management program from the ground up /
by:
(Electronic resources)
Network intrusion analysis DUP_1 = methodologies, tools, and techniques for incident analysis and response /
by:
(Electronic resources)
The basics of cyber warfare = understanding the fundamentals of cyber warfare in theory and practice /
by:
(Electronic resources)
The basics of information security = understanding the fundamentals of InfoSec in theory and practice /
by:
(Electronic resources)
Topics in cryptology - CT-RSA 2014 = the Cryptographer's track at the RSA Conference 2014, San Francisco, CA, USA, February 25-28, 2014 : proceedings /
by:
(Electronic resources)
Network hardening = an automated approach to improving network security /
by:
(Electronic resources)
Cyberpatterns = unifying design patterns with security and attack patterns /
by:
(Electronic resources)
Engineering secure future internet services and systems = current research /
by:
(Electronic resources)
Architecting user-centric privacy-as-a-set-of-services = digital identity-related privacy framework /
by:
(Electronic resources)
Bio-inspiring cyber security and cloud services = trends and innovations /
by:
(Electronic resources)
Security risks in social media technologies = safe practices in public service applications /
by:
(Electronic resources)
Defense against the black arts = how hackers do what they do and how to protect against it /
by:
(Electronic resources)
Authentication in insecure environments = using visual cryptography and non-transferable credentials in practise /
by:
(Electronic resources)
10 don'ts on our digital devices = the non-techie's survival guide to cyber security and privacy /
by:
(Electronic resources)
A practical guide to TPM 2.0 = using the new Trusted Platform Module in the new age of security /
by:
(Electronic resources)
Handbook of research on digital crime, cyberspace security, and information assurance /
by:
(Electronic resources)
Handbook of research on threat detection and countermeasures in network security /
by:
(Electronic resources)
The basics of information security = understanding the fundamentals of InfoSec in theory and practice /
by:
(Electronic resources)
Professional penetration testing = creating and learning in a hacking lab /
by:
(Electronic resources)
Cyber operations = building, defending, and attacking modern computer networks /
by:
(Electronic resources)
Security intelligence = a practitioner's guide to solving enterprise security challenges /
by:
(Electronic resources)
Virtuality and capabilities in a world of ambient intelligence = new challenges to privacy and data protection /
by:
(Electronic resources)
Cybersecurity for hospitals and healthcare facilities = a guide to detection and prevention /
by:
(Electronic resources)
The second economy = the race for trust, treasure and time in the cybersecurity war /
by:
(Electronic resources)
From hacking to report writing = an introduction to security and penetration testing /
by:
(Electronic resources)
Cyber security, simply, make it happen = leveraging digitization through IT security /
by:
(Electronic resources)
What every engineer should know about cyber security and digital forensics
by:
(Electronic resources)
CCSP self-study : = Cisco secure intrusion detection system (CSIDS) /
by:
(Language materials, printed)
Securing Web services with WS-Security : = demystifying WS-Security, WS-Policy, SAML, XML Signature, and XML Encryption /
by:
(Language materials, printed)
Disappearing cryptography : = information hiding : steganography & watermarking /
by:
(Language materials, printed)
Policy-based network management : = solutions for the next generation /
by:
(Language materials, printed)
Internet security made easy : = a plain-English guide to protecting yourself and your company online /
by:
(Language materials, printed)
The art of software security testing : = identifying software security flaws /
by:
(Language materials, printed)
Cisco security professional's guide to secure intrusion detection systems
by:
(Language materials, printed)
Securing Web services with WS-Security = demystifying WS-Security, WS-Policy, SAML, XML Signature, and XML Encryption /
by:
(Language materials, printed)
Inside network perimeter security = the definitive guide to firewalls, VPNs, routers, and intrusion detection systems /
by:
(Language materials, printed)
Querying databases privately = a new approach to private information retrieval /
by:
(Language materials, printed)
IT security governance guidebook with security program metrics on CD-ROM /
by:
(Language materials, printed)
ISA server and beyond = real world security solutions for Microsoft enterprise networks /
by:
(Language materials, printed)
Disappearing cryptography = information hiding : steganography & watermarking /
by:
(Language materials, printed)
Current security management & ethical issues of information technology
by:
(Language materials, printed)
The Internet under crisis conditions = learning from September 11/
by:
(Language materials, printed)
Information assurance : = dependability and security in networked systems /
by:
(Language materials, printed)
Exploiting online games : = cheating massively distributed systems /
by:
(Language materials, printed)
Information assurance = dependability and security in networked systems /
by:
(Language materials, printed)
Disappearing cryptography = information hiding : steganography & watermarking /
by:
(Language materials, printed)
Integrated security systems design = concepts, specifications, and implementation /
by:
(Language materials, printed)
Information assurance in computer networks = methods, models, and architectures for network security : international workshop MMM-ACNS 2001, St. Petersburg, Russia, May 21-23, 2001/
by:
(Language materials, printed)
The payment card industry compliance process for lodging establishments : = a technology primer developed by the American Hotel & Lodging Association's Technology and E-Business Committee ; funded by the American Hotel & Lodging Educational Foundation /
by:
(Language materials, printed)
Cisco router and switch forensics = investigating and analyzing malicious network activity /
by:
(Electronic resources)
Digital forensics for network, Internet, and cloud computing = a forensic evidence guide for moving targets and data /
by:
(Electronic resources)
Situational awareness in computer network defense = principles, methods and applications /
by:
(Language materials, printed)
Digital identity and access management = technologies and frameworks /
by:
(Language materials, printed)
Information assurance and security technologies for risk assessment and threat management = advances /
by:
(Language materials, printed)
Privacy, intrusion detection, and response = technologies for protecting networks /
by:
(Language materials, printed)
Continuous authentication using biometrics = data, models, and metrics /
by:
(Language materials, printed)
Advanced persistent threat = understanding the danger and how to protect your organization /
by:
(Electronic resources)
Hacking web apps = detecting and preventing web application security problems /
by:
(Electronic resources)
PCI compliance DUP_1 = understand and implement effective PCI data security standard compliance /
by:
(Electronic resources)
Windows registry forensics DUP_1 = advanced digital forensic analysis of the Windows registry /
by:
(Electronic resources)
A New host-based hybrid IDS architecture - a mind of its own : = the know-how of host-based hybrid intrusion detection system architecture using machine learning algorithms with feature selection /
by:
(Language materials, printed)
Architectures and protocols for secure information technology infrastructures /
by:
(Electronic resources)
Security, privacy, trust, and resource management in mobile and wireless communications /
by:
(Electronic resources)
Risk centric threat modeling = process for attack simulation and threat analysis /
by:
(Electronic resources)
Secure ICT service provisioning for cloud, mobile and beyond = ESARIS: the answer to the demands of industrialized IT production balancing between buyers and providers /
by:
(Electronic resources)
Operations research, engineering, and cyber security = trends in applied mathematics and technology /
by:
(Electronic resources)
Handbook of system safety and security = cyber risk and risk management, cyber security, threat analysis, functional safety, software systems, and cyber physical systems /
by:
(Electronic resources)
Engineering information security : = the application of systems engineering concepts to achieve information assurance /
by:
(Electronic resources)
The new era in U.S. national security = an introduction to emerging threats and challenges /
by:
(Electronic resources)
Guide to security in SDN and NFV = challenges, opportunities, and applications /
by:
(Electronic resources)
Privileged attack vectors = building effective cyber-defense strategies to protect organizations /
by:
(Electronic resources)
Transactions on computational science XXXI = special issue on signal processing and security in distributed systems /
by:
(Electronic resources)
SDN and NFV security = security analysis of software-defined networking and network function virtualization /
by:
(Electronic resources)
Contemporary identity and access management architectures = emerging research and opportunities /
by:
(Electronic resources)
A guide to the National Initiative for Cybersecurity Education (NICE) cybersecurity workforce framework (2.0)
by:
(Electronic resources)
Security and privacy in cyber-physical systems = foundations, principles, and applications /
by:
(Electronic resources)
Wireless communications security = solutions for the internet of things /
by:
(Electronic resources)
The NICE cyber security framework = cyber security intelligence and analytics /
by:
(Electronic resources)
Cyber operations = building, defending, and attacking modern computer networks /
by:
(Electronic resources)
Advanced methodologies and technologies in system security, information privacy, and forensics
by:
(Electronic resources)
Countering cyber attacks and preserving the integrity and availability of critical systems
by:
(Electronic resources)
A study of black hole attack solutions : = on AODV routing protocol in MANET /
by:
(Electronic resources)
Theoretical and experimental methods for defending against DDoS attacks /
by:
(Electronic resources)
The information systems security officer's guide : = establishing and managing a cyber security program /
by:
(Electronic resources)
Cybersecurity and secure information systems = challenges and solutions in smart environments /
by:
(Electronic resources)
Designing a HIPAA-compliant security operations center = a guide to detecting and responding to healthcare breaches and events /
by:
(Electronic resources)
Implementing computational intelligence techniques for security systems design
by:
(Electronic resources)
Stochastic models in reliability, network security and system safety = essays dedicated to Professor Jinhua Cao on the occasion of his 80th birthday /
by:
(Electronic resources)
Privileged attack vectors = building effective cyber-defense strategies to protect organizations /
by:
(Electronic resources)
Identification of pathogenic social media accounts = from data to intelligence to prediction /
by:
(Electronic resources)
The theory of hash functions and random oracles = an approach to modern cryptography /
by:
(Electronic resources)
Digital transformation, cyber security and resilience of modern societies
by:
(Electronic resources)
Multi-site network and security services with NSX-T = implement network security, stateful services, and operations /
by:
(Electronic resources)
Co-governed sovereignty network = legal basis and its prototype & applications with MIN architecture /
by:
(Electronic resources)
Security and trust management = 16th International Workshop, STM 2020, Guildford, UK, September 17-18, 2020 : proceedings /
by:
(Electronic resources)
Serverless security = understand, assess, and implement secure and reliable applications in AWS, Microsoft Azure, and Google Cloud /
by:
(Electronic resources)
Data breach preparation and response = breaches are certain, impact is not /
by:
(Electronic resources)
Advanced persistent security = a cyberwarfare approach to implementing adaptive enterprise protection, detection, and reaction strategies /
by:
(Electronic resources)
Handbook of research on machine and deep learning applications for cyber security
by:
(Electronic resources)
The security of critical infrastructures = risk, resilience and defense /
by:
(Electronic resources)
Rational cybersecurity for business = the security leaders' guide to business alignment /
by:
(Electronic resources)
Detection of false data injection attacks in smart grid cyber-physical systems
by:
(Electronic resources)
Cross-layer design for secure and resilient cyber-physical systems = a decision and game theoretic approach /
by:
(Electronic resources)
Cyber security = 17th China Annual Conference, CNCERT 2020, Beijing, China, August 12, 2020 : revised selected papers /
by:
(Electronic resources)
Protocols, strands, and logic = essays dedicated to Joshua Guttman on the the occasion of his 66.66th birthday /
by:
(Electronic resources)
Understand, manage, and measure cyber risk = practical solutions for creating a sustainable cyber program /
by:
(Electronic resources)
Cybersecurity of digital service chains = challenges, methodologies, and tools /
by:
(Electronic resources)
Security and resilience in intelligent data-centric systems and communication networks
by:
(Electronic resources)
Countering cyberterrorism = the confluence of artificial intelligence, cyber forensics and digital policing in US and UK national cybersecurity /
by:
(Electronic resources)
Winning the national security AI competition = a practical guide for government and industry leaders /
by:
(Electronic resources)
Azure security for critical workloads = implementing modern security controls for authentication, authorization and auditing /
by:
(Electronic resources)
Wireshark for network forensics = an essential guide for IT and cloud professionals /
by:
(Electronic resources)
Recent advanced in image security technologies = intelligent image, signal, and video processing /
by:
(Electronic resources)
Understand, manage, and measure cyber risk® = practical solutions for creating a sustainable cyber program /
by:
(Electronic resources)
Handbook of research on cybersecurity issues and challenges for business and FinTech applications
by:
(Electronic resources)
Fundamentals of information security = a complete go-to guide for beginners to understand all the aspects of information security /
by:
(Electronic resources)
Safe performance in a world of global networks = case studies, collaborative practices and governance principles /
by:
(Electronic resources)
Pro Spring security = securing Spring Framework 6 and Boot 3-based Java applications /
by:
(Electronic resources)
Enterprise cyber risk management as a value creator = leverage cybersecurity for competitive advantage /
by:
(Electronic resources)
The basics of IT audit = purposes, processes, and practical information /
by:
(Electronic resources)
Cyber security on Azure = an IT professionals guide to Microsoft Azure security center /
by:
(Electronic resources)
Network Performance and Security = Testing and Analyzing Using Open Source and Low-Cost Tools /
by:
(Electronic resources)
The basics of digital privacy = simple tools to protect your personal information and your identity online /
by:
(Electronic resources)
Autonomous cyber deception = reasoning, adaptive planning, and evaluation of HoneyThings /
by:
(Electronic resources)
Hacking web intelligence : = open source intelligence and web reconnaissance concepts and techniques /
by:
(Electronic resources)
Security operations center guidebook : = a practical guide for a successful SOC /
by:
(Electronic resources)
Five technological forces disrupting security : = how cloud, social, mobile, big data and IoT are transforming physical security in the digital age /
by:
(Electronic resources)
Navigating new cyber risks = how businesses can plan, build and manage safe spaces in the digital age /
by:
(Electronic resources)
Transactions on computational science XXXV = special issue on signal processing and security in distributed systems /
by:
(Electronic resources)
How to defeat advanced malware = new tools for protection and forensics /
by:
(Electronic resources)
How to define and build an effective cyber threat intelligence capability
by:
(Electronic resources)
Safety of web applications = risks, encryption and handling vulnerabilities with PHP /
by:
(Electronic resources)
The CISO'S next frontier = AI, post-quantum cryptography and advanced security paradigms /
by:
(Electronic resources)
Information security technologies in the decentralized distributed networks
by:
(Electronic resources)
Secure web application development = a hands-on guide with Python and Django /
by:
(Electronic resources)
Intelligent network management and control = intelligent security, multi-criteria optimization, cloud computing, Internet of Vehicles, intelligent radio /
by:
(Electronic resources)
Emerging ICT technologies and cybersecurity = from AI and ML to other futuristic technologies /
by:
(Electronic resources)
The NICE cyber security framework = cyber security intelligence and analytics /
by:
(Electronic resources)
24 deadly sins of software security = programming flaws and how to fix them /
by:
(Electronic resources)
Privacy preservation in distributed systems = algorithms and applications /
by:
(Electronic resources)
Show more
Fewer
Subjects