21
by Calles, Miguel A.
Published 2020
Apress
Table of Contents: ...Chapter 1: Introduction to Cloud Computing Security -- Chapter 2: Performing a Risk Assessment...

22
by Kanneganti, Ramarao
Published 2008
Manning
Table of Contents: ...pt. I. SOA Basics -- 1. SOA requires new approaches to security -- 2. Getting started with web...

23
Published 2018
O'Reilly Media, Inc.
Subjects: ...Computer networks / Security measures / http://id.loc.gov/authorities/subjects/sh94001277...

24
by Collins, J. D.
Published 2014
BCS Learning & Development
..."Security architects are responsible for maintaining the security of an organisation's computer...

25
by Merkow, Mark S.
Published 2014
Pearson Education
Subjects: ...Computer security...

26
by Rhodes-Ousley, Mark
Published 2013
McGraw Hill Education
Table of Contents: ... -- Chapter 3: Compliance with Standards, Regulations, and Laws -- Information Security Standards -- COBIT...

27
by Oaks, Scott
Published 2001
O'Reilly
Subjects: ...Computer security...

28
by Hayden, Lance
Published 2010
McGraw Hill
Table of Contents: ...1. What is a security metric? -- 2. Designing effective security metrics -- 3. Understanding data...

29
by Hoopes, John
Published 2009
Syngress Pub.
Subjects: ...COMPUTERS / Internet / Security / bisacsh...

30
by Shackleford, Dave
Published 2013
Wiley
Table of Contents: ...Fundamentals of virtualization security -- Securing hypervisors -- Designing virtual networks...

31
by Dennison, Justin
Published 2024
Packt Publishing
Subjects: ...Computer networks / Security measures / http://id.loc.gov/authorities/subjects/sh94001277...

32
by Osterhage, Wolfgang
Published 2011
CRC Press
Table of Contents: .... Security policy...

33
by Speed, Tim
Published 2003
Digital Press
Table of Contents: ...The Internet and Security; The Security Review Process; Cryptography; Secure Networks; Protecting...

34
by Rice, Liz, Hausenblas, Michael
Published 2018
O'Reilly Media
Subjects: ...Computer networks / Security measures / http://id.loc.gov/authorities/subjects/sh94001277...

35
by Zabicki, Roman
Published 2019
Pragmatic Bookshelf
Subjects: ...Computer networks / Security measures / http://id.loc.gov/authorities/subjects/sh94001277...

36
by Kang, Meng-Chow
Published 2014
CRC Press/Taylor & Francis
Table of Contents: .... Responsive security -- 5. Conclusions and implications...

37
by Niles, Kitty
Published 2002
Addison Wesley Professional
Subjects: ...Computer networks / Security measures / http://id.loc.gov/authorities/subjects/sh94001277...

38
by Stackpole, Bill
Published 2010
Auerbach
Subjects: ...Computer security / Management...

39
by Peikari, Cyrus
Published 2004
O'Reilly & Associates
Subjects: ...COMPUTERS / Internet / Security / bisacsh...

40
by Schneier, Bruce
Published 2008
Wiley Pub.
Table of Contents: ...Terrorism and security -- National security policy -- Airline travel -- Privacy and surveillance...