Suggested Topics within your search.
Suggested Topics within your search.
- Access control
- Computer security 669
- Computers 403
- Security measures 352
- Computer networks 326
- Data protection 149
- Data encryption (Computer science) 73
- Evaluation 56
- Administrative agencies 54
- Privacy, Right of 52
- Government policy 51
- Data processing 50
- Prevention 49
- Penetration testing (Computer security) 41
- Internet 39
- Computer crimes 38
- Cryptography 38
- Law and legislation 36
- Electronic information resources 30
- Information technology 28
- Management 28
- Electronic government information 27
- Standards 27
- Testing 25
- Medical records 24
- Cyberterrorism 21
- Computer systems 19
- Cyberspace 17
- Electronic commerce 14
- Passwords 14
-
1
BackTrack 4 : assuring security by penetration testing /
Published 2011Subjects: Full Text (via O'Reilly/Safari)
Electronic eBook -
2
Metasploit for beginners : create a threat-free environment with the best-in-class tool /
Published 2017Subjects: Full Text (via O'Reilly/Safari)
eBook -
3
Information security the proposed Computer Security Enhancement Act of 1999 : statement of Keith A. Rhodes, Director, Office of Computer and Information Technology Assessment, Acco...
Published 1999Subjects: “…Computer security United States.…”
Government Document Microfilm Book -
4
The state of the art in intrusion prevention and detection
Published 2014Subjects: “…Computer security.…”
Online Access (A-Z Journals and Newspapers)
Electronic eBook -
5
Journal of cybersecurity education, research & practice
Published 2016Subjects: “…Computer security Periodicals.…”
Online Access (A-Z Journals and Newspapers)
Electronic Journal -
6
Managing risk in information systems, second edition /
Published 2015Subjects: “…Computer security.…”
Full Text (via Skillsoft)
Electronic eBook -
7
Managing risk and information security : protect to enable /
Published 2013Subjects: “…Computer security.…”
Full Text (via O'Reilly/Safari)
Electronic eBook -
8
Assessment of access control systems
Published 2006Subjects: “…Computer security Access control.…”
Online Access
Online Access
Government Document Electronic eBook -
9
Integrating a Usable Security Protocol into User Authentication Services Design Process.
Published 2018Subjects: “…Computer security.…”
Full Text (via Taylor & Francis)
eBook -
10
Linux firewalls : attack detection and response with iptables, psad, and fwsnort /
Published 2007Subjects: Full Text (via Skillsoft)
Electronic eBook -
11
Role mining in business : taming role-based access control administration /
Published 2012Subjects: Full Text (via Skillsoft)
Electronic eBook -
12
-
13
Security threat mitigation and response : understanding Cisco security MARS /
Published 2006Subjects: Full Text (via O'Reilly/Safari)
Electronic eBook -
14
-
15
-
16
-
17
-
18
Penetration testing basics : a quick-start guide to breaking into systems /
Published 2016Subjects: “…Penetration testing (Computer security)…”
Full Text (via Skillsoft)
Electronic eBook -
19
The DevSecOps playbook : deliver continuous security at speed /
Published 2024Subjects: “…Computer security.…”
Full Text (via O'Reilly/Safari)
Electronic eBook -
20
The DevSecOps playbook : deliver continuous security at speed /
Published 2023Subjects: “…Computer security.…”
Streaming Audio (via O'Reilly/Safari)
Electronic Audio