Nearby SUBJECTS are:
Result Page   Prev Next
Save   Media Year
Computer networks -- Security measures.;Computer networks -- Access control : Kaplan, James M; Department of Information Technology Services; COMPUTER FILE     
      Beyond Cybersecurity : Protecting Your Digital Business Kaplan, James M  COMPUTER FILE 2015
Computer networks -- Security measures.;Computer networks -- Design and construction.;Computer security : Ye, Nong; Department of Information Technology Services; COMPUTER FILE     
      Secure Computer and Network Systems : Modeling, Analysis and Design Ye, Nong  COMPUTER FILE 2008
Computer networks -- Security measures.;Computer networks -- Standards.;Information technology -- Management : DeLuccia IV, James J; Department of Information Technology Services; COMPUTER FILE     
      IT Compliance and Controls : Best Practices for Implementation DeLuccia IV, James J  COMPUTER FILE 2008
Computer networks - Security measures - Computer programs : Syngress Media, Inc. Staff; Department of Information Technology Services; COMPUTER FILE     
      CheckPoint NG VPN 1/Firewall 1 : Advanced Configuration and Troubleshooting Syngress Media, Inc. Staff  COMPUTER FILE 2003
Computer networks -- Security measures.;Computer security    
      Adaptive Security Management Architecture Tiller, James S  COMPUTER FILE 2010
      Buffer Overflow Attacks : Detect, Exploit, Prevent Deckard, Jason  COMPUTER FILE 2005
      Computer and Information Security Handbook Vacca, John R  COMPUTER FILE 2009
      Contested Technologies : Xenotransplantation and Human Embryonic Stem Cells Persson, Anders  COMPUTER FILE 2008
8 additional entries    
Computer networks -- Security measures.;Computer security.;Computer hackers : Contos, Brian T; Department of Information Technology Services; COMPUTER FILE     
      Enemy at the Water Cooler : True Stories of Insider Threats and Enterprise Security Management Countermeasures Contos, Brian T  COMPUTER FILE 2006
Computer networks -- Security measures.;Computer security.;Computer software -- Development : Takanen, Ari; Department of Information Technology Services; COMPUTER FILE     
      Fuzzing for Software Security Testing and Quality Assurance Takanen, Ari  COMPUTER FILE 2008
Computer networks -- Security measures.;Computer security.;Computers -- Access control.;Multidisciplinary design optimization : Mjolsnes, Stig F; Department of Information Technology Services; COMPUTER FILE     
      A Multidisciplinary Introduction to Information Security Mjolsnes, Stig F  COMPUTER FILE 2011
Computer networks -- Security measures.;Computer security.;Cyberterrorism -- Prevention    
      Selected papers from Kaspersky Lab's CyberSecurity for the Next Generation Conference 2013 Furnell, Steven  COMPUTER FILE 2014
      Toward a Safer and More Secure Cyberspace Goodman, Seymour E  COMPUTER FILE 2007
Computer networks -- Security measures.;Computer security.;Data encryption (Computer science)    
      Securing Information and Communications Systems : Principles, Technologies, and Applications Lopez, Javier  COMPUTER FILE 2008
      Understanding Bitcoin : Cryptography, Engineering and Economics Franco, Pedro  COMPUTER FILE 2014
Computer networks -- Security measures.;Computer security -- Evaluation -- Methodology : Manzuik, Steve; Department of Information Technology Services; COMPUTER FILE     
      Network Security Assessment Manzuik, Steve  COMPUTER FILE 2006
Computer networks -- Security measures.;Computer security.;Forensic sciences : Carbone, Fernando; Department of Information Technology Services; COMPUTER FILE     
      Computer Forensics with FTK Carbone, Fernando  COMPUTER FILE 2014
Computer networks -- Security measures.;Computer security.;Information resources management : Dalziel, Henry; Department of Information Technology Services; COMPUTER FILE     
      Infosec Management Fundamentals Dalziel, Henry  COMPUTER FILE 2015
Computer networks -- Security measures.;Computer security.;Information visualization : Azzam, Tarek; Department of Information Technology Services; COMPUTER FILE     
      Data Visualization, Part 2 : New Directions for Evaluation, Number 140 Azzam, Tarek  COMPUTER FILE 2013
Computer networks -- Security measures.;Computer security.;Instant messaging.;Peer-to-peer architecture (Computer networks) : Sachs, Marcus; Department of Information Technology Services; COMPUTER FILE     
      Securing IM and P2P Applications for the Enterprise Sachs, Marcus  COMPUTER FILE 2005
Computer networks -- Security measures.;Computer security -- Management : Osborne, Mark; Department of Information Technology Services; COMPUTER FILE     
      How to Cheat at Managing Information Security Osborne, Mark  COMPUTER FILE 2006
Computer networks -- Security measures.;Computer security.;Open source software : Caswell, Brian; Department of Information Technology Services; COMPUTER FILE     
      Nessus, Snort, and Ethereal Power Tools : Customizing Open Source Security Applications Caswell, Brian  COMPUTER FILE 2005
Computer networks -- Security measures.;Computer security.;Penetration testing (Computer security) : Hutchens, Justin; Department of Information Technology Services; COMPUTER FILE     
      Kali Linux Network Scanning Cookbook Hutchens, Justin  COMPUTER FILE 2014
Computer networks -- Security measures.;Computer security -- Testing.;Computers -- Access control : Cardwell, Kevin; Department of Information Technology Services; COMPUTER FILE     
      Building Virtual Pentesting Labs for Advanced Penetration Testing Cardwell, Kevin  COMPUTER FILE 2014
Computer networks -- Security measures.;Computer security.;Web servers -- Security measures : Wotring, Brian; Department of Information Technology Services; COMPUTER FILE     
      Host Integrity Monitoring Using Osiris and Samhain : Using Osiris and Samhain Wotring, Brian  COMPUTER FILE 2005
Computer networks -- Security measures.;Computer security.;Web sites -- Security measures : Cross, Michael; Department of Information Technology Services; COMPUTER FILE     
      Developer's Guide to Web Application Security Cross, Michael  COMPUTER FILE 2007
Computer networks -- Security measures.;Computers -- Security : Pérez, André; Department of Information Technology Services; COMPUTER FILE     
      Network Security Pérez, André  COMPUTER FILE 2014
Computer networks -- Security measures -- Congreses : International Workshop on Graphical Models for Security; 中央研究院; 電子書     
      Graphical models for security : second International Workshop, GraMSec 2015, Verona, Italy, July 13, 2015 : revised selected papers / edited by Sjouke Mauw, Barbara Kordy, Sushil Jajodia International Workshop on Graphical Models for Security  電子書 2016
Computer networks -- Security measures -- Congresses    
      Achieving systems safety [electronic resource] : proceedings of the twentieth Safety-Critical Systems Symposium, Bristol, UK, 7-9th February 2012 / edited by Chris Dale, Tom Anderson Safety-Critical Systems Symposium  電子書 2012
      Advances in computer science and information technology [electronic resource] : first International Conference on Computer Science and Information Technology, CCSIT 2011, Bangalore, India, January 2-4, 2011 : proceedings. Part I / edited by Natarajan Meghanathan, Brajesh Kumar Kaushik, Dhinaharan Nagamalai International Conference on Computer Science and Information Technology  電子書 2011
      Advances in computing and information technology [electronic resource] : proceedings of the Second International Conference on Advances in Computing and Information Technology (ACITY) July 13-15, 2012, Chennai, India. Volume 1 / edited by Natarajan Meghanathan, Dhinaharan Nagamalai, Nabendu Chaki ACITY 2012  電子書 2012
      Advances in cryptology - EUROCRYPT 2014 [electronic resource] : 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Copenhagen, Denmark, May 11-15, 2014 : proceedings / edited by Phong Q. Nguyen, Elisabeth Oswald EUROCRYPT (Conference)  COMPUTER FILE 2014
489 additional entries    
Computer networks -- Security measures -- Congresses.;Computer networks -- Mathematical models -- Congresses : Butenko, S; Department of Information Technology Services; COMPUTER FILE     
      Examining Robustness and Vulnerability of Networked Systems Butenko, S  COMPUTER FILE 2014
Computer networks -- Security measures -- Congresses.;Computer security -- Congresses : Hansal, Alexander; Department of Information Technology Services; COMPUTER FILE     
      Oracle Siebel CRM 8 Installation and Management : Install, Configure, and Manage a Robust Customer Relationship Management System Using Siebel CRM Hansal, Alexander  COMPUTER FILE 2010
Computer networks -- Security measures -- Congresses.;Computer security -- Congresses.;Computers -- Access control -- Congresses.;Computers -- Access control -- Evaluation -- Congresses : Sims, April C; Department of Information Technology Services; COMPUTER FILE     
      Oracle Database 11g – Underground Advice for Database Administrators : Underground Advice for Database Administrators Sims, April C  COMPUTER FILE 2010
Computer networks -- Security measures -- Congresses.;Computer security -- Congresses.;Data protection -- Congresses : Seroter, Richard; Department of Information Technology Services; COMPUTER FILE     
      Applied Architecture Patterns on the Microsoft Platform Seroter, Richard  COMPUTER FILE 2010
Computer networks -- Security measures -- Congresses.;Computer security -- Congresses.;Information networks -- Security measures -- Congresses.;Data protection -- Congresses.;Cyberterrorism -- Prevention -- Congresses : Čaleta, D; Department of Information Technology Services; COMPUTER FILE     
      Comprehensive Approach as "Sine Qua Non" for Critical Infrastructure Protection Čaleta, D  COMPUTER FILE 2014
Computer networks -- Security measures -- Congresses.;Data encryption (Computer science) -- Congresses.;Public key infrastructure (Computer security) -- Congresses : Edwards, Jason; Department of Information Technology Services; COMPUTER FILE     
      IBM Cognos 8 Planning Edwards, Jason  COMPUTER FILE 2009
Computer networks -- Security measures -- Congresses.;Data protection -- Congresses : Silvestri, Gaspare Aristide; Department of Information Technology Services; COMPUTER FILE     
      Citrix XenDesktop 5.6 Cookbook Silvestri, Gaspare Aristide  COMPUTER FILE 2013
Computer networks -- Security measures -- Congresses.;Information warfare -- Congresses : Carvalho, F.D; Department of Information Technology Services; COMPUTER FILE     
      Cyberwar-Netwar : Security in the Information Age Carvalho, F.D  COMPUTER FILE 2006
Computer networks --Security measures. Cryptography. Internet : Wayner, Peter,; 中央研究院; 電子書     
      Disappearing cryptography [electronic resource] : information hiding : steganography & watermarking / Peter Wayner Wayner, Peter,  電子書 2009
Computer networks -- Security measures.;Cyberspace -- Security measures : Voeller, John G; Department of Information Technology Services; COMPUTER FILE     
      Cyber Security Voeller, John G  COMPUTER FILE 2014
Computer networks -- Security measures -- Data processing    
      Artificial intelligence paradigms for smart cyber-physical systems [electronic resource] / Ashish Kumar Luhach and Atilla Elçi, editors   COMPUTER FILE 2021
      Cyber-risk informatics : engineering evaluation with data sciencef / Mehmet Sahinoglu, PhD Sahinoglu, Mehmet,  電子書 2016
Computer networks -- Security measures.;Data protection.;Web sites -- Security measures : Canavan, Tom; Department of Information Technology Services; COMPUTER FILE     
      CMS Security Handbook : The Comprehensive Guide for WordPress, Joomla, Drupal, and Plone Canavan, Tom  COMPUTER FILE 2011
Computer networks -- Security measures -- Design : Ben Mahmoud, Mohamed Slim; 中央研究院; 電子書     
      Risk propagation assessment for network security [electronic resource] : application to airport communication network design / Mohamed Slim Ben Mahmoud, Nicolas Larrieu, Alain Pirovano Ben Mahmoud, Mohamed Slim  電子書 2013
Computer networks -- Security measures -- Design.;Aeronautics -- Communication systems -- Design and construction : Larrieu, Nicolas; Department of Information Technology Services; COMPUTER FILE     
      Risk Propagation Assessment for Network Security : Application to Airport Communication Network Design Larrieu, Nicolas  COMPUTER FILE 2013
Computer networks -- Security measures -- Developing countries : 中央研究院; COMPUTER FILE     
      Securing government information and data in developing countries [electronic resource] / Saleem Zoughbi [editor]   COMPUTER FILE 2017
Computer networks -- Security measures -- Dictionaries    
      The information security dictionary [electronic resource] : defining the terms that define security for E-business, Internet, information, and wireless technology / by Urs E. Gattiker Gattiker, Urs E  電子書 c2004
      Internet security dictionary [electronic resource] / Vir V. Phoha Phoha, Vir V  電子書 c2002
Computer networks -- Security measures.;Distributed operating systems (Computers) -- Security measures.;Electronic data processing -- Distributed processing : Xiao, Yang; Department of Information Technology Services; COMPUTER FILE     
      Security in Distributed and Networking. . V1 Xiao, Yang  COMPUTER FILE 2007
Computer networks -- Security measures -- Economic aspects -- Congresses : 中央研究院; 電子書     
      Economics of information security and privacy [electronic resource] / edited by Tyler Moore, David Pym, Christos Ioannidis   電子書 2010
Computer networks -- Security measures.;Electronic countermeasures : Bejtlich, Richard; Department of Information Technology Services; COMPUTER FILE     
      Practice of Network Security Monitoring : Understanding Incident Detection and Response Bejtlich, Richard  COMPUTER FILE 2013
Computer networks -- Security measures -- Europe : Cremonini, Leon; Euro-Am Studies Lib, Modern History Library ; PRINTED     
      Benchmarking security and trust in Europe and the US / Leon Cremonini and Lorenzo Valeri Cremonini, Leon; LIB USE ONLY   PRINTED 2003
Computer networks -- Security measures -- European Union countries : 中央研究院; 電子書     
      Privacy, data protection and cybersecurity in Europe / edited by Wolf J. Schunemann, Max-Otto Baumann   電子書 2017
Computer networks -- Security measures -- Evaluation    
      Network security assessment / Chris McNab McNab, Chris; AVAILABLE   PRINTED 2004
      Vulnerability Analysis and Defense for the Internet [electronic resource] / edited by Abhishek Singh, Baibhav Singh, Hirosh Joseph   電子書 2008
Computer networks -- Security measures -- Examinations -- Study guides    
      70 tips and tricks for mastering the CISSP exam / by R. Sarma Danturthi Danturthi, R. Sarma,  COMPUTER FILE 2020
      CCNA Security Study Guide : Exam 210-260 McMillan, Troy  COMPUTER FILE 2018
      CISA [electronic resource] : certified information systems auditor study guide / David Cannon with Brian T. O'Hara and Allen Keele Cannon, David  COMPUTER FILE c2016
      Cisco access control security : AAA administrative services / Brandon Carroll Carroll, Brandon; DUE 01-02-19   PRINTED c2004
10 additional entries    
Computer networks -- Security measures -- Examinations -- Study guides.;Computer networks -- Security measures -- Examinations, questions, etc : Syngress Media, Inc. Staff; Department of Information Technology Services; COMPUTER FILE     
      Security + Study Guide and DVD Training System Syngress Media, Inc. Staff  COMPUTER FILE 2003
Computer networks -- Security measures -- Examinations -- Study guides.;Computer security -- Examinations -- Study guides : Vallabhaneni, S. Rao; Department of Information Technology Services; COMPUTER FILE     
      CISSP Practice : 2,250 Questions, Answers, and Explanations for Passing the Test Vallabhaneni, S. Rao  COMPUTER FILE 2011
Computer networks -- Security measures -- Examinations -- Study guides.;Computers -- Access control -- Examinations -- Study guides.;Administrative agencies -- Information resources management -- Security measures -- United States -- Examinations -- Study guides.;Telecommunications engineers -- Certification -- United States : Howard, Patrick D; Department of Information Technology Services; COMPUTER FILE     
      Official (ISC)2 Guide to the CAP CBK Howard, Patrick D  COMPUTER FILE 2012
Result Page   Prev Next