Search Results
Suggested Topics within your search.
Suggested Topics within your search.
- Security measures
- Computer networks 5,613
- Computer security 4,490
- Prevention 2,959
- Government policy 1,384
- Data protection 1,197
- Terrorism 1,082
- Information technology 975
- Law and legislation 948
- Internet 937
- Management 933
- National security 841
- Access control 818
- Cyberterrorism 814
- Evaluation 800
- Computer crimes 741
- Aeronautics, Commercial 724
- Safety measures 648
- Data encryption (Computer science) 610
- Airports 604
- Cyberspace 501
- Data processing 461
- Cloud computing 443
- Computers 429
- Transportation 418
- Business enterprises 417
- Airline passenger security screening 406
- Nuclear facilities 406
- Privacy, Right of 377
- Cyberinfrastructure 351
-
1
Self-sovereign identity decentralized digital identity and verifiable credentials /
Published 2021Online Access (A-Z Journals and Newspapers)
Electronic eBook -
2
Cybersecurity for executives a practical guide /
Published 2014Online Access (A-Z Journals and Newspapers)
Electronic eBook -
3
Bug bounty bootcamp the guide to finding and reporting web vulnerabilities /
Published 2021Online Access (A-Z Journals and Newspapers)
Electronic eBook -
4
Security log management identifying patterns in the chaos /
Published 2006Online Access (A-Z Journals and Newspapers)
Electronic eBook -
5
CompTIA Security+ certification study guide (Exam SYO-601) /
Published 2022Online Access (A-Z Journals and Newspapers)
Electronic eBook -
6
CEH certified ethical hacker all-in-one exam guide
Published 2022Online Access (A-Z Journals and Newspapers)
Electronic eBook -
7
The hardware hacking handbook breaking embedded security with hardware attacks /
Published 2022Online Access (A-Z Journals and Newspapers)
Electronic eBook -
8
Cryptography, information theory, and error-correction a handbook for the 21st century /
Published 2021Online Access (A-Z Journals and Newspapers)
Electronic eBook -
9
-
10
CompTIA PenTest+ certification all-in-one exam guide Exam PT0-002 /
Published 2022Online Access (A-Z Journals and Newspapers)
Electronic eBook -
11
Cyber threat! how to manage the growing risk of cyber attacks /
Published 2014Online Access (A-Z Journals and Newspapers)
Electronic eBook -
12
-
13
CISSP certified information systems security professional study guide.
Published 2012Online Access (A-Z Journals and Newspapers)
Electronic eBook -
14
Hacking the art of exploitation /
Published 2003Online Access (A-Z Journals and Newspapers)
Electronic eBook -
15
Implementing SSH strategies for optimizing the Secure Shell /
Published 2004Online Access (A-Z Journals and Newspapers)
Electronic eBook -
16
-
17
Cyber security management a governance, risk and compliance framework /
Published 2014Online Access (A-Z Journals and Newspapers)
Electronic eBook -
18
Security architect careers in IT service management /
Published 2014Online Access (A-Z Journals and Newspapers)
Electronic eBook -
19
CSA guide to cloud computing implementing cloud privacy and security /
Published 2015Online Access (A-Z Journals and Newspapers)
Electronic eBook -
20
Managing online risk apps, mobile, and social media security /
Published 2015Online Access (A-Z Journals and Newspapers)
Electronic eBook