Suggested Topics within your search.
Suggested Topics within your search.
- Data processing
- Computer security 378
- Security measures 229
- Administrative agencies 97
- Data protection 91
- Computer networks 80
- Business 66
- Management 53
- Access control 50
- Evaluation 45
- Information technology 40
- Computer crimes 33
- Computers 32
- Government policy 30
- Law and legislation 27
- Prevention 23
- Medical records 19
- Risk assessment 18
- Software maintenance 17
- Electronic data processing departments 16
- Information resources management 16
- Automation 14
- Government information 14
- Investigation 14
- Cryptography 13
- Standards 13
- Machine learning 12
- Artificial intelligence 11
- Small business 11
- Database security 10
-
1
Cybersecurity and decision makers : data security and digital trust /
Published 2020Subjects: Full Text (via Skillsoft)
Electronic eBook -
2
Cloud security a comprehensive guide to secure cloud computing /
Published 2010Subjects: Online Access (A-Z Journals and Newspapers)
Electronic eBook -
3
Information security the proposed Computer Security Enhancement Act of 1999 : statement of Keith A. Rhodes, Director, Office of Computer and Information Technology Assessment, Acco...
Published 1999Subjects: “…Computer security United States.…”
Government Document Microfilm Book -
4
Evading EDR : sensors, telemetry, and how to bypass them /
Published 2024Subjects: “…Penetration testing (Computer security)…”
Full Text (via O'Reilly/Safari)
Electronic eBook -
5
Enterprise security architecture : a business-driven approach /
Published 2005Subjects: “…Computer security.…”
Full Text (via Taylor & Francis)
Electronic eBook -
6
Cyberbiosecurity a new field to deal with emerging threats /
Published 2023Subjects: Full Text (via Springer)
Electronic eBook -
7
Executive's Cybersecurity Program Handbook A Comprehensive Guide to Building and Operationalizing a Complete Cybersecurity Program /
Published 2023Subjects: “…Computer security.…”
Full Text (via O'Reilly/Safari)
eBook -
8
The new school of information security /
Published 2008Subjects: Full Text (via O'Reilly/Safari)
eBook -
9
Information security policies, procedures, and standards : a practitioner's reference /
Published 2016Subjects: Full Text (via Taylor & Francis)
Electronic eBook -
10
Information security policies, procedures, and standards : a practitioner's reference /
Published 2016Subjects: Full Text (via Skillsoft)
Electronic eBook -
11
Penetration Testing For Dummies /
Published 2020Subjects: “…Computer security.…”
Full Text (via Skillsoft)
Electronic eBook -
12
Enterprise security architecture a business-driven approach /
Published 2005Subjects: “…Computer security.…”
Online Access (A-Z Journals and Newspapers)
Electronic eBook -
13
CISO's guide to penetration testing : a framework to plan, manage, and maximize benefits /
Published 2012Subjects: “…Penetration testing (Computer security)…”
Full Text (via Taylor & Francis)
Electronic eBook -
14
-
15
Enterprise security : a data-centric approach to securing the enterprise : a guide to applying data-centric security concepts for securing enterprise data to enable an agile enterp...
Published 2013Subjects: “…Computer security.…”
Full Text (via O'Reilly/Safari)
eBook -
16
Privacy is power : why and how you should take back control of your data /
Published 2021Subjects: Full Text (via ProQuest)
Electronic eBook -
17
The security risk assessment handbook : a complete guide for performing security risk assessments /
Published 2021Subjects: Full Text (via O'Reilly/Safari)
Electronic eBook -
18
The security risk assessment handbook : a complete guide for performing security risk assessments /
Published 2011Subjects: Full Text (via Skillsoft)
Electronic eBook -
19
Certification and security in inter-organizational E-services : IFIP TC-11 second International Workshop on Certification and Security in Inter-Organizational E-Services (CSES), Wo...
Published 2005Subjects: “…Computer security Congresses.…”
Full Text (via Springer)
Conference Proceeding eBook -
20
The Secure online business handbook : e-Commerce, IT functionality, & business continuity /
Published 2004Subjects: “…Computer security Handbooks, manuals, etc.…”
Full Text (via EBSCO)
eBook