Search alternatives:
"physician" » "physicians"

1
Published 2018
John Wiley & Sons
Table of Contents: ...Overview of security and privacy in cyber-physical systems -- Network security and privacy...

2
by Alibi, Mohamed
Published 2018
Packt Publishing Ltd.

3
by Das, Sajal K.
Published 2012
Morgan Kaufmann
... attacks on both cyber and cyber-physical infrastructure from anywhere in the world. This purpose...

4
Published 2017
Syngress is an imprint of Elsevier
..., cyber physical systems, tradeoffs between safety, security, and performance, as well as the current...

5
by Noble, Joshua J.
Published 2009
O'Reilly Media, Inc.
Table of Contents: ... revisited -- openFrameworks -- Sound and audio -- Physical input -- Programming graphics -- Bitmaps...

6
by Andress, Jason
Published 2019
No Starch Press
Table of Contents: ... Are Access Controls? -- Implementing Access Controls -- Access Control Models -- Physical Access Controls...

7
by Dittner, Rogier
Published 2006
Syngress
Table of Contents: ... Clustering -- Chapter 5 Physical to Virtual Migrations -- Chapter 6 Server Consolidation -- Chapter 7 Cool...

8
by Sheikh, Ahmed F.
Published 2020
Apress
Table of Contents: ... -- Physical Security -- Physical Barriers -- Environmental Issues -- Fire Suppression -- Electromagnetic...

9
by Chapple, Mike, Seidl, David
Published 2021
Sybex
Table of Contents: .... Malicious Code -- Chapter 4. Social Engineering, Physical, and Password Attacks -- Chapter 5. Security...

10
by Linn, Heather, Nutting, Ray
Published 2022
McGraw-Hill Education
Table of Contents: ... Engineering and Physical Attacks -- Physical Security and Social Engineering -- Social Engineering...

11
by Lehtinen, Rick
Published 2006
O'Reilly
Table of Contents: ... vulnerabilities -- Encryption -- Communications and network security -- Physical security and biometrics...

12
by Andress, Jason
Published 2014
Syngress
Table of Contents: ...; Mitigating risks; Physical; Logical and technical controls; Administrative; Incident response; Preparation...

13
by Bachrach, Daniel G., Rzeszut, Eric J.
Published 2014
Apress
Table of Contents: ... of Tailgating; How to Combat Social Engineering; Additional Reading; Chapter 10: Don't Forget the Physical...

14
by Dhanjani, Nitesh
Published 2015
O'Reilly
Table of Contents: ...: The WeMo Switch -- Conclusion -- Chapter 4. Blurred Lines-When the Physical Space Meets the Virtual Space...

15
by Gordon, Adam
Published 2014
CRC Press
Table of Contents: ... business continuity planning (BCP) & disaster recovery planning (DRP) -- Domain 6. Physical security...

16
by Long, Johnny
Published 2008
Syngress
Table of Contents: ... -- Chapter 4: Dumpster Diving -- Chapter 5: Physical Security -- Chapter 6: Death of a Road Warrior...

17
by Dulaney, Emmett A.
Published 2011
Wiley Pub.
Table of Contents: ... and application security -- Cryptography basics -- Cryptography implementation -- Physical and hardware-based...

18
by Trost, Ryan
Published 2010
Addison-Wesley
Table of Contents: ... detection -- Web application firewalls -- Wireless IDS/IPS -- Physical intrusion detection...

19
by Dalziel, Henry
Published 2015
Elsevier
Table of Contents: ... -- Physical and environmental security management -- Security operations management -- Communications security...

20
by Brotherston, Lee, Berlin, Amanda
Published 2017
O'Reilly Media
Table of Contents: ... and frameworks -- Physical security -- Microsoft Windows infrastructure -- Unix application servers -- Endpoints...