Suggested Topics within your search.
Suggested Topics within your search.
- Data protection
- Computer networks 707
- Security measures 647
- Computer security 434
- Information technology 160
- Prevention 108
- Management 97
- Access control 93
- Government policy 91
- Law and legislation 91
- Business enterprises 83
- Privacy, Right of 74
- Data encryption (Computer science) 73
- Standards 52
- Cyberterrorism 50
- Cyberspace 49
- Internet 49
- Computer crimes 47
- Evaluation 44
- Computers 43
- Cloud computing 37
- Administrative agencies 35
- Data and Information Security 35
- Data processing 33
- Computer Communication Networks 31
- Computer networks  28
- Computer science 28
- Consumer protection 26
- Online identity theft 26
- Credit cards 25
-
1
-
2
Hacking exposed Cisco networks : Cisco security secrets & solutions /
Published 2006Subjects: “…Computer networks Security measures.…”
Full Text (via Skillsoft)
Electronic eBook -
3
Information security for managers
Published 2013Subjects: Online Access (A-Z Journals and Newspapers)
Electronic eBook -
4
Privileged attack vectors : building effective cyber-defense strategies to protect organizations /
Published 2020Subjects: Full Text (via Skillsoft)
Electronic eBook -
5
Serverless security : understand, assess, and implement secure and reliable applications in AWS, Microsoft Azure, and Google Cloud /
Published 2020Subjects: Full Text (via Skillsoft)
Electronic eBook -
6
Privileged attack vectors : building effective cyber-defense strategies to protect organizations /
Published 2018Subjects: Full Text (via Skillsoft)
Electronic eBook -
7
Legal guide to cybersecurity research /
Published 2013Subjects: “…Computer networks Law and legislation United States.…”
Book -
8
Security technology, disaster recovery and business continuity : international conferences, SecTech and DRBC 2010, held as part of the Future Generation Information Technology Conf...
Published 2010Subjects: Full Text (via Springer)
Conference Proceeding eBook -
9
Interception of electronic communications in the Czech Republic and Slovakia /
Published 2016Subjects: “…Computer networks Access control Czech Republic.…”
Full Text (via ProQuest)
eBook -
10
PCI compliance : understand and implement effective PCI data security standard compliance /
Published 2015Subjects: Full Text (via Skillsoft)
Electronic eBook -
11
CMS security handbook the comprehensive guide for WordPress, Joomla!, Drupal, and Plone /
Published 2011Subjects: “…Computer networks Security measures.…”
Online Access (A-Z Journals and Newspapers)
Electronic eBook -
12
Hacking exposed Cisco networks Cisco security secrets & solutions /
Published 2006Subjects: “…Computer networks Security measures.…”
Online Access (A-Z Journals and Newspapers)
Electronic eBook -
13
Information security policy development for compliance : ISO/IEC 27001, NIST SP 800-53, HIPAA standard, PCI DSS V2.0, and AUP V5.0 /
Published 2013Subjects: Full Text (via Skillsoft)
Electronic eBook -
14
Preventing good people from doing bad things : implementing least privilege /
Published 2011Subjects: “…Computer networks Security measures.…”
Full Text (via Skillsoft)
Electronic eBook -
15
Insider threat : protecting the enterprise from sabotage, spying, and theft /
Published 2006Subjects: “…Computer networks Security measures.…”
Full Text (via Skillsoft)
Electronic eBook -
16
-
17
Preventing good people from doing bad things : implementing least privilege /
Published 2011Subjects: “…Computer networks Security measures.…”
Full Text (via O'Reilly/Safari)
Electronic eBook -
18
Counter hack reloaded : a step-by-step guide to computer attacks and effective defenses /
Published 2005Subjects: “…Computer networks Security measures.…”
Full Text (via O'Reilly/Safari)
eBook -
19
-
20