Showing 1 - 20 results of 725 for search '"Computer security."', query time: 0.12s Refine Results
  1. 1

    BackTrack 4 : assuring security by penetration testing / by Ali, Shakeel

    Published 2011
    Subjects:
    Full Text (via O'Reilly/Safari)
    Electronic eBook
  2. 2
  3. 3

    Information security the proposed Computer Security Enhancement Act of 1999 : statement of Keith A. Rhodes, Director, Office of Computer and Information Technology Assessment, Acco... by Rhodes, Keith A.

    Published 1999
    Subjects: “…Computer security United States.…”
    Government Document Microfilm Book
  4. 4

    The state of the art in intrusion prevention and detection

    Published 2014
    Subjects: “…Computer security.…”
    Online Access (A-Z Journals and Newspapers)
    Electronic eBook
  5. 5

    Journal of cybersecurity education, research & practice

    Published 2016
    Subjects: “…Computer security Periodicals.…”
    Online Access (A-Z Journals and Newspapers)
    Electronic Journal
  6. 6

    Managing risk in information systems, second edition / by Gibson, Darril

    Published 2015
    Subjects: “…Computer security.…”
    Full Text (via Skillsoft)
    Electronic eBook
  7. 7

    Managing risk and information security : protect to enable / by Harkins, Malcolm

    Published 2013
    Subjects: “…Computer security.…”
    Full Text (via O'Reilly/Safari)
    Electronic eBook
  8. 8

    Assessment of access control systems by Hu, Vincent C.

    Published 2006
    Subjects: “…Computer security Access control.…”
    Online Access
    Online Access
    Government Document Electronic eBook
  9. 9

    Integrating a Usable Security Protocol into User Authentication Services Design Process. by Braz, Christina

    Published 2018
    Subjects: “…Computer security.…”
    Full Text (via Taylor & Francis)
    eBook
  10. 10

    Linux firewalls : attack detection and response with iptables, psad, and fwsnort / by Rash, Michael

    Published 2007
    Subjects:
    Full Text (via Skillsoft)
    Electronic eBook
  11. 11

    Role mining in business : taming role-based access control administration / by Colantonio, Alessandro

    Published 2012
    Subjects:
    Full Text (via Skillsoft)
    Electronic eBook
  12. 12
  13. 13

    Security threat mitigation and response : understanding Cisco security MARS / by Tesch, Dale

    Published 2006
    Subjects:
    Full Text (via O'Reilly/Safari)
    Electronic eBook
  14. 14
  15. 15
  16. 16
  17. 17
  18. 18

    Penetration testing basics : a quick-start guide to breaking into systems / by Messier, Ric

    Published 2016
    Subjects: “…Penetration testing (Computer security)…”
    Full Text (via Skillsoft)
    Electronic eBook
  19. 19

    The DevSecOps playbook : deliver continuous security at speed / by Mack, Sean D.

    Published 2024
    Subjects: “…Computer security.…”
    Full Text (via O'Reilly/Safari)
    Electronic eBook
  20. 20

    The DevSecOps playbook : deliver continuous security at speed / by Mack, Sean D.

    Published 2023
    Subjects: “…Computer security.…”
    Streaming Audio (via O'Reilly/Safari)
    Electronic Audio
Search Tools: RSS Feed Save Search