Toggle navigation
Campus Access
About MPG.eBooks
Skip to content
Search Tips
Home
>
Search: "Hygiene"
Language
English
Deutsch
Español
Français
Italiano
日本語
Nederlands
Português
Português (Brasil)
中文(简体)
中文(繁體)
Türkçe
עברית
Gaeilge
Cymraeg
Ελληνικά
Català
Euskara
Русский
Čeština
Suomi
Svenska
polski
Dansk
slovenščina
اللغة العربية
বাংলা
Galego
Tiếng Việt
Hrvatski
हिंदी
All Fields
Title
Person
Topic
ISBN/ISSN
Year
Collection
Advanced
Retain my current filters
dewey-ones:"005 - Computer programming, programs & data"
Showing
1
-
20
of
40
Search:
'"Hygiene"'
,
query time: 0.04s
Book List
0
Sort:
Relevance
Year Descending
Year Ascending
Author
Title
Read Now
1
Microsoft Exchange Server 2013 : connectivity, clients, and UM
by
Robichaux, Paul E.
Published 2013
Microsoft Press
Table of Contents:
“
... management -- Message
hygiene
and security -- Unified messaging -- Integrating Exchange 2013 with Lync Server...
”
Call Number:
QA76.9.C55
Read Now
2
Pro Exchange Administration : Understanding On-premises and Hybrid Exchange Deployments
by
Wesselius, Jaap
,
de Rooij, Michel
Published 2023
Apress
Table of Contents:
“
...: Publishing Exchange Server -- Chapter 7: Email Authentication -- Chapter 8: Message
Hygiene
and Security...
”
Read Now
3
Pro Exchange administration : understanding on-premises and hybrid Exchange deployments
by
Wesselius, Jaap
,
Rooij, Michel de
Published 2023
Apress
Table of Contents:
“
...: Publishing Exchange Server -- Chapter 7: Email Authentication -- Chapter 8: Message
Hygiene
and Security...
”
Call Number:
QA76.9.C55
Read Now
4
Mastering Microsoft 365 defender : implement Microsoft Defender for endpoint, identity, cloud apps, and Office 365 and respond to threats
by
Campbell, Ruairidh
,
Hedberg, Viktor
Published 2023
Packt Publishing
Table of Contents:
“
... Security
Hygiene
and Threat Awareness Extended Detection and Response with Microsoft 365 Defender Advanced...
”
Call Number:
QA76.9.A25
Read Now
5
Cyber minds : insights on cybersecurity across the cloud, data, artificial intelligence, blockchain, and IoT to keep you cyber safe
by
Rubinoff, Shira
Published 2020
Packt Publishing
Table of Contents:
“
...: Integrating Humans and Technology -- Four Steps to Cyber
Hygiene
-- Chapter 2: How Risky Behavior Leads...
”
Call Number:
QA76.9.A25
Read Now
6
Survey of data science
by
Mawata, Chris
Published 2024
Packt Publishing
“
... and analysis. You will learn about the importance of data
hygiene
, statistical foundations, and the power...
”
Call Number:
QA76.9.B45
Read Now
7
HCI for Cybersecurity, Privacy and Trust : 6th International Conference, HCI-CPT 2024, Held as Part of the 26th HCI International Conference, HCII 2024, Washington, DC, USA, June 2...
Published 2024
Springer Nature Switzerland
“
... on topics related to Cyber
Hygiene
, User Behavior and Security Awareness, and User Privacy and Security...
”
Read Now
8
HCI for Cybersecurity, Privacy and Trust : 6th International Conference, HCI-CPT 2024, Held as Part of the 26th HCI International Conference, HCII 2024, Washington, DC, USA, June 2...
Published 2024
Springer Nature Switzerland
“
... on topics related to Cyber
Hygiene
, User Behavior and Security Awareness, and User Privacy and Security...
”
Read Now
9
The CISO’s Transformation : Security Leadership in a High Threat Landscape
by
Badhwar, Raj
Published 2021
Springer International Publishing
Table of Contents:
“
...? -- Importance of 1:1 Conversations -- The Cyber
Hygiene
Mantra -- Cybersecurity lessons from the breach...
”
Read Now
10
Pro Exchange 2019 and 2016 Administration : For Exchange On-Premises and Office 365
by
de Rooij, Michel
,
Wesselius, Jaap
Published 2022
Apress
“
... security, message
hygiene
(CEO fraud, for example), and compliance Know the infrastructure changes...
”
Read Now
11
Pro Exchange 2019 and 2016 Administration : for Exchange On-Premises and Office 365
by
Rooij, Michel de
,
Wesselius, Jaap
Published 2022
Apress
“
... security, message
hygiene
(CEO fraud, for example), and compliance Know the infrastructure changes...
”
Call Number:
QA76.9.C55
Read Now
12
Computer Security for the Home and Small Office
by
Greene, Thomas
Published 2004
Apress
“
..., with emphasis on system hardening, eliminating malware, user and Internet privacy, encryption, and data
hygiene
...
”
Read Now
13
Cybersecurity : attack and defense strategies : improve your security posture to mitigate risks and prevent attackers from infiltrating your system
by
Diogenes, Yuri
,
Ozkaya, Erdal
Published 2022
Packt Publishing
“
... with the key aspects of threat assessment and security
hygiene
, the current threat landscape and its challenges...
”
Call Number:
QA76.9.A25
Read Now
14
Securing microservices : protect sensitive data in transit and at rest
Published 2018
O'Reilly Media, Inc.
“
... to handle authorization and authentication, transport security, and patch
hygiene
Explore new technologies...
”
Call Number:
QA76.754
Read Now
15
Programming Languages and Systems : 17th European Symposium on Programming, ESOP 2008, Held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2008...
Published 2008
Springer Berlin Heidelberg
Table of Contents:
“
... and Update Languages -- Semantics -- A Theory of
Hygienic
Macros -- A Hybrid Denotational Semantics...
”
Read Now
16
Cyber Security and Digital Forensics : Select Proceedings of the International Conference, ReDCySec 2023
Published 2024
Springer Nature Singapore
Table of Contents:
“
...A Modest Approach Toward Cloud Security
Hygiene
-- A Survey on Path Key Establishment -- Credit...
”
Read Now
17
ECOOP 2014 -- Object-Oriented Programming : 28th European Conference, Uppsala, Sweden, July 28--August 1, 2014, Proceedings
Published 2014
Springer Berlin Heidelberg
Table of Contents:
“
... -- Retargetting Legacy Browser Extensions to Modern Extension Frameworks -- Capture-Avoiding and
Hygienic
Program...
”
Read Now
18
Data and Application Security : Developments and Directions
Published 2001
Springer US
Table of Contents:
“
... in OLAP Applications -- Algorithms and Experience in Increasing the Intelligibility and
Hygiene
of Access...
”
Read Now
19
Identity attack vectors : strategically designing and implementing identity security
by
Haber, Morey J.
,
Rolls, Darran
Published 2024
Apress
“
... security
hygiene
, the techniques that external and internal threat actors leverage, and the operational...
”
Call Number:
QA76.9.A25
Read Now
20
Secure IT Systems : 23rd Nordic Conference, NordSec 2018, Oslo, Norway, November 28-30, 2018, Proceedings
Published 2018
Springer International Publishing
Table of Contents:
“
... Management within Multi-Cloud Environments -- Cyber Security and Malware -- Cyber
Hygiene
: The Big Picture...
”
1
2
Back
Narrow Search
Remove Filters
Clear Filter
Classification: 005 - Computer programming, programs & data
Year of Publication
From:
To:
Classification
005 - Computer programming, programs & data
004 - Data processing & computer science
6
331 - Labor economics
6
330 - Economics
1
364 - Criminology
1
374 - Adult education
1
more ...
500 - Natural sciences & mathematics
1
658 - General management
1
745 - Decorative arts
1
see all ...
less ...
Language
English
39
German
1
Collection
O'Reilly
23
Springer eBooks 2005-
15
Springer Book Archives -2004
2
Author
Wesselius, Jaap
4
Haber, Morey J.
2
Magušić, Bojan
2
Moallem, Abbas
2
Rolls, Darran
2
Rooij, Michel de
2
more ...
de Rooij, Michel
2
ACI Learning
1
Abdelnour Nocera, José
1
Albuquerque, André
1
Badhwar, Raj
1
Batra, Usha
1
Beighley, Lynn
1
Bergmann Tiest, Wouter M.
1
Caixinha, Daniel
1
Campbell, Ruairidh
1
Carter, Jacquelyn
1
Cook, Ken
1
Dennison, Justin
1
Diogenes, Yuri
1
Dittrich, Klaus R.
1
Drossopoulou, Sophia
1
Eisenberg, J. David
1
Greene, Thomas
1
Gruschka, Nils
1
Hedberg, Viktor
1
Howard, Richard
1
Janca, Tanya
1
Jones, Richard
1
Kappers, Astrid M. L.
1
Kaufeld, John
1
Konomi, Shin'ichi
1
Kristín Lárusdóttir, Marta
1
Lowrie, Daniel
1
Magušić,, Bojan
1
Marcus, Aaron
1
Mawata, Chris
1
Mertz, David
1
Ozkaya, Erdal
1
Peltier, Nicolas
1
Petrie, Helen
1
Pezet, Don
1
Piccinno, Antonio
1
Robichaux, Paul E.
1
Rosenzweig, Elizabeth
1
Roy, Nihar Ranjan
1
Roychowdhury, Shubhadeep
1
Rubinoff, Shira
1
Sarkar, Tirthajyoti
1
Sofronie-Stokkermans, Viorica
1
Streitz, Norbert A.
1
Tanwar, Sudeep
1
Tari, Zahir
1
Tate, Bruce
1
Thomas, David
1
Thuraisingham, B.
1
Ulrich-Fuller, Laurie
1
Valim, José
1
Van Der Helm, Frans CT
1
Van Erp, Jan BF
1
Zenner, Roman
1
van de Riet, Reind
1
see all ...
less ...
Search Tools
Get RSS Feed
Share Search
https://ebooks.mpdl.mpg.de/ebooks/Search/Results?filter%5B%5D=dewey-ones%3A%22005+-+Computer+programming%2C+programs+%26+data%22&lookfor=%22Hygiene%22&type=AllFields
Send by Email
×
Loading...