61
by Wilkins, Sean
Published 2011
Cisco Press
Subjects: ...Computer networks / Security measures / Examinations / fast...

62
by Burton, James D., Dubrawsky, Ido, Osipov, Vitaly, Baumrucker, C. Tate
Published 2003
Syngress Publishing
Subjects: ...Computer security...

63
by Sullivan, Chad
Published 2005
Cisco
Subjects: ...Computer networks / Security measures / http://id.loc.gov/authorities/subjects/sh94001277...

64
by Peterson, Andrew
Published 2016
O'Reilly Media
Subjects: ...Computer networks / Security measures / http://id.loc.gov/authorities/subjects/sh94001277...

65
by Brotherston, Lee, Berlin, Amanda
Published 2017
O'Reilly Media
Table of Contents: ...Creating a security program -- Asset management and documentation -- Policies -- Standards...

66
by Salmon, Arthur, Levesque, Warun, McLafferty, Michael
Published 2017
Packt Publishing
Table of Contents: ...Security Information and Event Management (SIEM) -- Splunk -- Alert status -- IDS versus IPS...

67
by Knox, David
Published 2010
McGraw-Hill
Subjects: ...Computer security...

68
by Sadiqui, Ali
Published 2020
Wiley-ISTE
Table of Contents: ...Introduction -- 1. Fundamentals of Network Security -- 2. Securing Network Devices -- 3...

69
by Konheim, Alan G.
Published 2007
Wiley-Interscience
Table of Contents: ...COMPUTER SECURITY AND CRYPTOGRAPHY; CONTENTS; FOREWORD; PREFACE; ABOUT THE AUTHOR; CHAPTER 1...

70
by Lehtinen, Rick
Published 2006
O'Reilly
Table of Contents: ...Introduction -- Some security history -- Computer system security and access controls -- Viruses...

71
by Easttom, Chuck
Published 2011
Pearson
Table of Contents: ...Introduction to computer security -- Networks and the internet -- Cyber stalking, fraud, and abuse...

72
by Easttom, Chuck
Published 2016
Pearson
Subjects: ...Computer security...

73
by Blount, Sumner
Published 2010
IT Governance Pub.
Table of Contents: ... COMPUTING -- A REFRESHER; CHAPTER 2: CLOUD SECURITY AND COMPLIANCE -- SETTING THE STAGE; CHAPTER 3: SECURITY...

74
by Mather, Tim
Published 2009
O'Reilly
Table of Contents: ...Introduction -- What is cloud computing? -- Infrastructure security -- Data security and storage...

75
by Priyam, Prashant
Published 2018
Packt Publishing
Table of Contents: ...Fault tolerance at EBS -- RAID 0 -- RAID 1 -- Encryption in EBS -- S3 -- Security in S3 -- AWS...

76
by Furnell, Steven
Published 2010
IT Governance Pub.
Table of Contents: ...-mail: Can we live without it?; Chapter 2: E-mail threats and attacks; Chapter 3: Securing the client...

77
by Canavan, Tom
Published 2011
Wiley Pub.
Table of Contents: ... This Book; Tools You Will Need; Summary; Chapter 1: Introduction to CMS Security and Operations; Target...

78
by Barrett, Diane
Published 2009
Pearson
...CompTIA security plus...

79
by Marty, Raffael
Published 2009
Addison-Wesley
Subjects: ...Computer security...

80
by Vladimirov, Andrew A.
Published 2010
IT Governance Pub.
Table of Contents: ...Introduction -- Ch. 1. Information security auditing and strategy -- Ch. 2. Security auditing...