5
5.0
texts
eye 5
favorite 0
comment 0
1 online resource (176 pages)
Topics: Computer security -- Congresses, Computer security
6
6.0
texts
eye 6
favorite 0
comment 0
1 online resource (200 pages)
Topics: Computer security -- Congresses, Computer security
10
10.0
Jan 22, 2021
01/21
by
Howard, Doug
texts
eye 10
favorite 1
comment 0
xxvi, 305 p. : 24 cm
Topics: Computer security, Computer security -- Forecasting
1
1.0
Feb 16, 2022
02/22
by
Computer Security Foundations Workshop (2nd : 1988 : Franconia, N.H.)
texts
eye 1
favorite 0
comment 0
1 online resource (viii, 141 pages) :
Topics: Computer security -- Congresses, Computer security
3
3.0
Nov 6, 2020
11/20
by
Schneier, Bruce, 1963-
texts
eye 3
favorite 0
comment 0
x, 315 pages : c1994
Topics: Macintosh (Computer) -- Security measures, Computer security
4
4.0
Apr 30, 2022
04/22
by
Chappelle, David, author
texts
eye 4
favorite 1
comment 0
1 online resource (103 pages)
Topics: Computer security, Computer Security, Sécurité informatique
2
2.0
Jun 30, 2022
06/22
by
Harrison, Jim
texts
eye 2
favorite 0
comment 0
xl, 1011 p. : 23 cm. +
Topics: Computer security -- Software, Computer security -- Management
14
14
Oct 12, 2021
10/21
by
Spitzner, Lance
texts
eye 14
favorite 3
comment 0
xxvi, 452 p. ill. : 24 cm. +
Topics: Computer security, Hackers, Firewalls (Computer security)
Many computer security policies are written relatively vaguely. In many ways this is intentional to allow for easier access to all the functionality of the computer network. However, too much leeway allows users, without a need to access many of the network functions, the ability to execute functions that might cause harm to the system or provide access to information they have no need to see. With this in mind, this paper takes a look at computer security. We start with a brief history of...
Topics: Computer security, Profiling, Computer security policy
11
11
Feb 6, 2019
02/19
by
Xiao, Yang
texts
eye 11
favorite 1
comment 0
420 p. : 25 cm
Topic: Computer security
3
3.0
Jun 1, 2022
06/22
by
McGraw, Gary, 1966-
texts
eye 3
favorite 1
comment 0
xxxvi, 408 p. : 24 cm +
Topic: Computer security
47
47
Mar 28, 2017
03/17
by
Oldehoeft, Arthur E.
texts
eye 47
favorite 0
comment 0
207
207
Mar 13, 2012
03/12
by
Dieter Gollmann
texts
eye 207
favorite 1
comment 1
favoritefavoritefavoritefavoritefavorite ( 1 reviews )
Topic: Computer security.
289
289
Jun 18, 2012
06/12
by
Amoroso, Edward G
texts
eye 289
favorite 4
comment 0
Includes bibliographical references (p. 357-387) and index
Topic: Computer security
2
2.0
Apr 12, 2022
04/22
by
Colarik, Andrew M
texts
eye 2
favorite 0
comment 0
xiii, 170 p. : 22 cm
Topic: Computer security
18
18
texts
eye 18
favorite 1
comment 0
vii,753p. : 26 cm
Topic: Computer security
4
4.0
texts
eye 4
favorite 1
comment 0
148 pages ; 28 x 23 cm
Topic: Computer security
6
6.0
Nov 14, 2019
11/19
by
Ciampa, Mark D
texts
eye 6
favorite 0
comment 0
xv, 240 pages ; 24 cm
Topic: Computer security
Source: removedNEL
33
33
Feb 15, 2012
02/12
by
Rita C. Summers
texts
eye 33
favorite 1
comment 0
25
25
Oct 10, 2018
10/18
by
Ciampa, Mark D
texts
eye 25
favorite 0
comment 0
xiv, 202 pages : 24 cm
Topic: Computer security
Source: removedNEL
7
7.0
Dec 2, 2020
12/20
by
Penfold, R. R. C
texts
eye 7
favorite 0
comment 0
192 pages ; 22 cm
Topic: Computer security
59
59
Apr 11, 2012
04/12
by
National Research Council (U.S.). Computer Science and Telecommunications Board. System Security Study Committee
texts
eye 59
favorite 0
comment 0
Includes bibliographical references (p. 216-240)
Topic: Computer security
44
44
Feb 8, 2019
02/19
by
Howard, Michael, 1965-
texts
eye 44
favorite 3
comment 0
xxi, 281 p. : 24 cm
Topic: Computer security
500
500
Nov 22, 2010
11/10
by
Russell, Deborah; Gangemi, G. T
texts
eye 500
favorite 5
comment 0
"Computer security." -- Cover
Topic: Computer security
335
335
Mar 16, 2010
03/10
by
Time-Life Books
texts
eye 335
favorite 9
comment 0
Bibliography: p. 122-124
Topic: Computer security
54
54
May 28, 2018
05/18
by
Khan, Arshad
texts
eye 54
favorite 3
comment 0
258 pages : 23 cm
Topic: Computer security
Folkscanomy Miscellaneous
380
380
Dec 30, 2015
12/15
by
European Symposium on Research in Computer Security (6th : 2000 : Toulouse, France); Cuppens, Frédéric
texts
eye 380
favorite 0
comment 0
Computer Security - ESORICS 2000: 6th European Symposium on Research in Computer Security, Toulouse, France, October 4-6, 2000. Proceedings Author: Frédéric Cuppens, Yves Deswarte, Dieter Gollmann, Michael Waidner Published by Springer Berlin Heidelberg ISBN: 978-3-540-41031-7 DOI: 10.1007/10722599 Table of Contents: Checking Secure Interactions of Smart Card Applets Verification of a Formal Security Model for Multiapplicative Smart Cards How Much Negotiation and Detail Can Users Handle?...
Topic: Computer security
4
4.0
May 28, 2022
05/22
by
Cofta, Piotr
texts
eye 4
favorite 0
comment 0
p. cm
Topic: Computer security
20
20
texts
eye 20
favorite 0
comment 0
xxxvi, 665 pages : 24 cm +
Topic: Computer security
IoT is a modest way to elevate our production and yield with the help of internet. We can supervise and control and communicate with the help of internet. Internet Of Things imagines a future physical and digital entities are to be linked by proper information and communication technologies which will sanction new class of applications and services. In this survey we will ensure a survey of applications and research difficulties for Internet Of Things in Healthcare. Shivani Ramesh Sharma...
Topic: Computer Security
Customized web inquiry has meant its achievement in enhancing the evaluation of distinctive pursuit administrations on the web. The verification uncovers that client's unwillingness to tell their own data amid hunt has turns into a noteworthy blockade for the wide develop of PWS. In this we think about private security in PWS applications that representation client wants as progressive client profiles. Sum up profile by questions while reference client indicated a private necessity utilizing a...
Topic: Computer Security
9
9.0
Oct 20, 2020
10/20
by
Ciampa, Mark D
texts
eye 9
favorite 1
comment 0
xv, 248 pages : 24 cm
Topic: Computer security
60
60
Jul 27, 2010
07/10
by
Gateway
texts
eye 60
favorite 0
comment 0
"Survive & thrive."
Topic: Computer security
6
6.0
Nov 28, 2021
11/21
by
Hoffman, Lance J
texts
eye 6
favorite 0
comment 0
xiii, 255 p. : 24 cm
Topic: Computer security
7
7.0
Nov 22, 2020
11/20
by
MacDonald, Richard
texts
eye 7
favorite 1
comment 0
416 pages ; 24 cm
Topic: Computer security
80
80
Dec 4, 2019
12/19
by
Merkow, Mark S
texts
eye 80
favorite 0
comment 0
xxvii, 420 p. : 24 cm
Topic: Computer security
11
11
Aug 6, 2020
08/20
by
Honeynet Project
texts
eye 11
favorite 3
comment 0
xvii, 328 pages : 24 cm
Topic: Computer security
29
29
Nov 9, 2021
11/21
by
Dr. Mike Murphy
movies
eye 29
favorite 1
comment 0
Overview of symmetric key encryption, with a demonstration of using GPG to perform symmetric key encryption on the command line.
Topic: computer security
98
98
Oct 24, 2021
10/21
by
Dr. Mike Murphy
movies
eye 98
favorite 1
comment 0
A starting point for discussion of information systems security, including the CIA Triad.
Topic: computer security
Fastrack to Computer Security
Topic: Computer Security
11
11
Oct 11, 2021
10/21
by
Bishop, Matt (Matthew A.)
texts
eye 11
favorite 0
comment 0
xli, 1084 p. : 24 cm
Topic: Computer security
13
13
Jun 15, 2021
06/21
by
Stamp, Mark
texts
eye 13
favorite 0
comment 0
xxi, 390 p. : 25 cm
Topic: Computer security
8
8.0
Dec 27, 2019
12/19
by
Stefanek, George L
texts
eye 8
favorite 1
comment 0
p. cm
Topic: Computer security
10
10.0
Feb 10, 2021
02/21
by
Smith, Richard E., 1952-
texts
eye 10
favorite 1
comment 0
1 online resource
Topic: Computer security
1
1.0
Mar 9, 2022
03/22
by
Gralla, Preston
texts
eye 1
favorite 0
comment 0
vii, 275 p. : 23 cm
Topic: Computer security
4
4.0
May 28, 2022
05/22
by
Boulanger, Jean-Louis, author
texts
eye 4
favorite 0
comment 0
viii, 181 pages : 25 cm
Topic: Computer security
77
77
May 8, 2017
05/17
by
Swanson, Marianne; Lennon, Elizabeth B.
texts
eye 77
favorite 0
comment 0
115
115
Oct 24, 2021
10/21
by
Dr. Mike Murphy
movies
eye 115
favorite 0
comment 0
Definitions of threats, vulnerabilities, and controls as they apply to information security.
Topic: computer security
Governments, military, organizations, financial institutions, universities and other businesses collected, process and store a large amount of confidential information and data on computers and transmit that data over networks to other computers. With the continuous rapid growth of volume and sophistication of cyberattacks, quick attempts are required to secure sensitive business and personal information, as well as to protect national security. The paper details about the nature of cyberspace...
Topic: Computer Security
143
143
Feb 21, 2017
02/17
by
Swanson, Marianne; Lennon, Elizabeth B.
texts
eye 143
favorite 0
comment 0