1
Published 2022
Wiley
Table of Contents: ...Front Matter -- Securing Cloud-Based Enterprise Applications and Its Data / Subhradip Debnath...

2
by Sud, Raman
Published 2004
Que Certification
Subjects: ...COMPUTERS / Internet / Security / bisacsh...

3
by Hausman, Kalani Kirk
Published 2003
Que Certification
Subjects: ...COMPUTERS / Internet / Security / bisacsh...

4
by Kearney, Paul
Published 2010
IT Governance Pub.
Table of Contents: ...: People are Helpful and Trusting; Chapter 6: Harnessing Human Qualities to Improve Security; Chapter 7...

5
by Mason, Andrew G.
Published 2001
Cisco Press
Table of Contents: ...pt. I. Internal Security Fundamentals -- Ch. 1. Internet Security -- Ch. 2. Basic Cisco Router...

6
by Halleen, Gary
Published 2007
Cisco Press
Table of Contents: ... scenarios -- Ch. 4. Securing CS-MARS -- Ch. 5. Rules, reports, and queries -- Ch. 6. Incident investigation...

7
by Rosenberg, Jonathan B.
Published 2004
SAMS
Subjects: ...COMPUTERS / Internet / Security / bisacsh...

8
by Rice, Liz
Published 2020
O'Reilly Media
Subjects: ...Computer networks / Security measures / http://id.loc.gov/authorities/subjects/sh94001277...

9
by Hoffman, Billy
Published 2008
Addison-Wesley
Table of Contents: ...Ch. 1. Introduction to Ajax Security -- Ch. 2. The Heist -- Ch. 3. Web Attacks -- Ch. 4. Ajax...

10
by Oram, Andrew
Published 2009
O'Reilly
Subjects: ...COMPUTERS / Internet / Security / bisacsh...

11
by Bishop, Matt, Sullivan, Elisabeth, Ruppel, Michelle
Published 2019
Addison-Wesley
Table of Contents: ...Part I: Introduction: An Overview of Computer Security -- Part II: Foundations: Access Control...

12
by Krutz, Ronald L.
Published 2010
Wiley Pub.
Table of Contents: ...CLOUD SECURITY: A Comprenhensive Guide to Secure Cloud Computing; Contents at a Glance; About...

13
by Kadrich, Mark
Published 2007
Addison-Wesley
Subjects: ...Computer security...

14
by Gomo, Tendai, Dai, Jason, Alani, Mohammed M.
Published 2021
O'Reilly Media, Inc.
Subjects: ...Computer security / fast / (OCoLC)fst00872484...

15 Subjects: ...Computer networks / Security measures / http://id.loc.gov/authorities/subjects/sh94001277...

16
by Fry, Chris
Published 2009
O'Reilly Media, Inc.
Table of Contents: ...Security Monitoring; What This Book Is; Conventions Used in This Book; Using Code Examples; Safari...

17
by Calles, Miguel A.
Published 2020
Apress
Table of Contents: ...Chapter 1: Introduction to Cloud Computing Security -- Chapter 2: Performing a Risk Assessment...

18
Published 2018
O'Reilly Media, Inc.
Subjects: ...Computer networks / Security measures / http://id.loc.gov/authorities/subjects/sh94001277...

19
by Collins, J. D.
Published 2014
BCS Learning & Development
..."Security architects are responsible for maintaining the security of an organisation's computer...

20
by Merkow, Mark S.
Published 2014
Pearson Education
Subjects: ...Computer security...