3
3.0
May 4, 2022
05/22
by
Brown, Dan, 1964-
texts
eye 3
favorite 0
comment 0
2 volumes ; 23 cm
Topics: Computer security -- Fiction, Computer security
8
8.0
Jan 22, 2021
01/21
by
Howard, Doug
texts
eye 8
favorite 1
comment 0
xxvi, 305 p. : 24 cm
Topics: Computer security, Computer security -- Forecasting
3
3.0
texts
eye 3
favorite 0
comment 0
1 online resource (176 pages)
Topics: Computer security -- Congresses, Computer security
4
4.0
texts
eye 4
favorite 0
comment 0
1 online resource (200 pages)
Topics: Computer security -- Congresses, Computer security
1
1.0
Feb 16, 2022
02/22
by
Computer Security Foundations Workshop (2nd : 1988 : Franconia, N.H.)
texts
eye 1
favorite 0
comment 0
1 online resource (viii, 141 pages) :
Topics: Computer security -- Congresses, Computer security
8
8.0
Oct 12, 2021
10/21
by
Spitzner, Lance
texts
eye 8
favorite 1
comment 0
xxvi, 452 p. ill. : 24 cm. +
Topics: Computer security, Hackers, Firewalls (Computer security)
3
3.0
Apr 30, 2022
04/22
by
Chappelle, David, author
texts
eye 3
favorite 0
comment 0
1 online resource (103 pages)
Topics: Computer security, Computer Security, Sécurité informatique
3
3.0
Nov 6, 2020
11/20
by
Schneier, Bruce, 1963-
texts
eye 3
favorite 0
comment 0
x, 315 pages : c1994
Topics: Macintosh (Computer) -- Security measures, Computer security
Many computer security policies are written relatively vaguely. In many ways this is intentional to allow for easier access to all the functionality of the computer network. However, too much leeway allows users, without a need to access many of the network functions, the ability to execute functions that might cause harm to the system or provide access to information they have no need to see. With this in mind, this paper takes a look at computer security. We start with a brief history of...
Topics: Computer security, Profiling, Computer security policy
7
7.0
Dec 27, 2019
12/19
by
Stefanek, George L
texts
eye 7
favorite 0
comment 0
p. cm
Topic: Computer security
58
58
Oct 24, 2021
10/21
by
Dr. Mike Murphy
movies
eye 58
favorite 1
comment 0
A starting point for discussion of information systems security, including the CIA Triad.
Topic: computer security
Fastrack to Computer Security
Topic: Computer Security
9
9.0
Oct 11, 2021
10/21
by
Bishop, Matt (Matthew A.)
texts
eye 9
favorite 0
comment 0
xli, 1084 p. : 24 cm
Topic: Computer security
8
8.0
Feb 10, 2021
02/21
by
Smith, Richard E., 1952-
texts
eye 8
favorite 0
comment 0
1 online resource
Topic: Computer security
12
12
Jun 15, 2021
06/21
by
Stamp, Mark
texts
eye 12
favorite 0
comment 0
xxi, 390 p. : 25 cm
Topic: Computer security
24
24
Nov 9, 2021
11/21
by
Dr. Mike Murphy
movies
eye 24
favorite 1
comment 0
Overview of symmetric key encryption, with a demonstration of using GPG to perform symmetric key encryption on the command line.
Topic: computer security
45
45
Mar 28, 2017
03/17
by
Oldehoeft, Arthur E.
texts
eye 45
favorite 0
comment 0
202
202
Mar 13, 2012
03/12
by
Dieter Gollmann
texts
eye 202
favorite 1
comment 1
favoritefavoritefavoritefavoritefavorite ( 1 reviews )
Topic: Computer security.
279
279
Jun 18, 2012
06/12
by
Amoroso, Edward G
texts
eye 279
favorite 4
comment 0
Includes bibliographical references (p. 357-387) and index
Topic: Computer security
9
9.0
Feb 6, 2019
02/19
by
Xiao, Yang
texts
eye 9
favorite 1
comment 0
420 p. : 25 cm
Topic: Computer security
17
17
texts
eye 17
favorite 1
comment 0
vii,753p. : 26 cm
Topic: Computer security
2
2.0
Apr 12, 2022
04/22
by
Colarik, Andrew M
texts
eye 2
favorite 0
comment 0
xiii, 170 p. : 22 cm
Topic: Computer security
8
8.0
Oct 20, 2020
10/20
by
Ciampa, Mark D
texts
eye 8
favorite 1
comment 0
xv, 248 pages : 24 cm
Topic: Computer security
78
78
Dec 4, 2019
12/19
by
Merkow, Mark S
texts
eye 78
favorite 0
comment 0
xxvii, 420 p. : 24 cm
Topic: Computer security
Customized web inquiry has meant its achievement in enhancing the evaluation of distinctive pursuit administrations on the web. The verification uncovers that client's unwillingness to tell their own data amid hunt has turns into a noteworthy blockade for the wide develop of PWS. In this we think about private security in PWS applications that representation client wants as progressive client profiles. Sum up profile by questions while reference client indicated a private necessity utilizing a...
Topic: Computer Security
59
59
Jul 27, 2010
07/10
by
Gateway
texts
eye 59
favorite 0
comment 0
"Survive & thrive."
Topic: Computer security
5
5.0
Nov 22, 2020
11/20
by
MacDonald, Richard
texts
eye 5
favorite 1
comment 0
416 pages ; 24 cm
Topic: Computer security
7
7.0
Aug 6, 2020
08/20
by
Honeynet Project
texts
eye 7
favorite 3
comment 0
xvii, 328 pages : 24 cm
Topic: Computer security
4
4.0
Nov 28, 2021
11/21
by
Hoffman, Lance J
texts
eye 4
favorite 0
comment 0
xiii, 255 p. : 24 cm
Topic: Computer security
38
38
Feb 21, 2017
02/17
by
Roback, Edward
texts
eye 38
favorite 0
comment 0
Secure pursuit strategies over encoded cloud information enable an approved client to inquiry information documents of enthusiasm by submitting scrambled question catchphrases to the cloud server in a protection safeguarding way. In any case, practically speaking, the returned question results might be mistaken or deficient in the exploitative cloud condition. For instance, the cloud server may deliberately preclude some qualified outcomes to spare computational assets and correspondence...
Topic: Computer Security
61
61
Sep 7, 2010
09/10
by
Walker, Andy (Andy G.), 1967-
texts
eye 61
favorite 2
comment 0
Includes index
Topic: Computer security
25
25
texts
eye 25
favorite 0
comment 0
xviii, 714 p. : 24 cm
Topic: Computer security
3
3.0
Apr 20, 2022
04/22
by
Furnell, Steven, 1970-
texts
eye 3
favorite 1
comment 0
xiii, 240 p. : 24 cm
Topic: Computer security
Fastrack to Computer Security
Topic: Computer Security
43
43
Aug 8, 2019
08/19
by
Graff, Mark
texts
eye 43
favorite 0
comment 0
xx, 202 p. : 23 cm
Topic: Computer security
1
1.0
Mar 9, 2022
03/22
by
Gralla, Preston
texts
eye 1
favorite 0
comment 0
vii, 275 p. : 23 cm
Topic: Computer security
73
73
May 8, 2017
05/17
by
Swanson, Marianne; Lennon, Elizabeth B.
texts
eye 73
favorite 0
comment 0
140
140
Feb 21, 2017
02/17
by
Swanson, Marianne; Lennon, Elizabeth B.
texts
eye 140
favorite 0
comment 0
3
3.0
Mar 18, 2022
03/22
by
Gollmann, Dieter
texts
eye 3
favorite 1
comment 0
xix, 436 p. : 24 cm
Topic: Computer security
Governments, military, organizations, financial institutions, universities and other businesses collected, process and store a large amount of confidential information and data on computers and transmit that data over networks to other computers. With the continuous rapid growth of volume and sophistication of cyberattacks, quick attempts are required to secure sensitive business and personal information, as well as to protect national security. The paper details about the nature of cyberspace...
Topic: Computer Security
61
61
Oct 24, 2021
10/21
by
Dr. Mike Murphy
movies
eye 61
favorite 0
comment 0
Definitions of threats, vulnerabilities, and controls as they apply to information security.
Topic: computer security
119
119
Jan 9, 2020
01/20
by
Tapeworm
texts
eye 119
favorite 1
comment 0
1 online resource (230 pages) :
Topic: Computer security
Folkscanomy Miscellaneous
372
372
Dec 30, 2015
12/15
by
European Symposium on Research in Computer Security (6th : 2000 : Toulouse, France); Cuppens, Frédéric
texts
eye 372
favorite 0
comment 0
Computer Security - ESORICS 2000: 6th European Symposium on Research in Computer Security, Toulouse, France, October 4-6, 2000. Proceedings Author: Frédéric Cuppens, Yves Deswarte, Dieter Gollmann, Michael Waidner Published by Springer Berlin Heidelberg ISBN: 978-3-540-41031-7 DOI: 10.1007/10722599 Table of Contents: Checking Secure Interactions of Smart Card Applets Verification of a Formal Security Model for Multiapplicative Smart Cards How Much Negotiation and Detail Can Users Handle?...
Topic: Computer security
20
20
texts
eye 20
favorite 0
comment 0
xxxvi, 665 pages : 24 cm +
Topic: Computer security
IoT is a modest way to elevate our production and yield with the help of internet. We can supervise and control and communicate with the help of internet. Internet Of Things imagines a future physical and digital entities are to be linked by proper information and communication technologies which will sanction new class of applications and services. In this survey we will ensure a survey of applications and research difficulties for Internet Of Things in Healthcare. Shivani Ramesh Sharma...
Topic: Computer Security
479
479
Nov 22, 2010
11/10
by
Russell, Deborah; Gangemi, G. T
texts
eye 479
favorite 4
comment 0
"Computer security." -- Cover
Topic: Computer security
40
40
Feb 8, 2019
02/19
by
Howard, Michael, 1965-
texts
eye 40
favorite 2
comment 0
xxi, 281 p. : 24 cm
Topic: Computer security
53
53
May 28, 2018
05/18
by
Khan, Arshad
texts
eye 53
favorite 3
comment 0
258 pages : 23 cm
Topic: Computer security
332
332
Mar 16, 2010
03/10
by
Time-Life Books
texts
eye 332
favorite 8
comment 0
Bibliography: p. 122-124
Topic: Computer security