81
by Reid, Paul
Published 2003
Pearson
Subjects: ...Computer networks / Security measures / http://id.loc.gov/authorities/subjects/sh94001277...

82
by Bosworth, Seymour
Published 2009
John Wiley & Sons
Table of Contents: ...Ethical decision making and high technology / James Landon Linderman -- Security policy guidelines...

83
by Stewart, James Michael
Published 2011
Wiley Pub.
Subjects: ...Computer networks / Security measures / Examinations / fast...

84
by Dulaney, Emmett A.
Published 2014
J. Wiley & Sons
Subjects: ...Computer networks / Security measures / Examinations / fast...

85
by Winkler, Ira, Gomes, Araceli Treu
Published 2017
Syngress
Table of Contents: ...What is advanced persistent security? -- Cyberwarfare concepts -- What is proaction? -- Risk...

86
by Vladimirov, Andrew A., Gavrilenko, Konstantin V., Mikhailovsky, Andrei A.
Published 2014
IT Governance Publishing
Subjects: ...Computer security...

87
by Lam, Kevin
Published 2004
Microsoft Press
Subjects: ...COMPUTERS / Internet / Security / bisacsh...

88
by More, Josh, Stieber, Anthony J., Liu, Chris
Published 2016
Syngress is an imprint of Elsevier
Subjects: ...Computer security / Vocational guidance...

89
by Ransome, James F., Misra, Anmol, Schoenfield, Brook S. E.
Published 2014
CRC Press, Taylor & Francis Group
Table of Contents: ...The secure development lifecycle -- Security assessment (A1): SDL activities and best practices...

90
by Bose, S., Vijayakumar, P.
Published 2016
Pearson
Subjects: ...Computer security...

91
Published 2017
CRC Press
Table of Contents: ...Cloud security key management: cloud user controls / Weiyu Jiang, Jingqiang Lin, Zhan Wang, Bo Chen...

92
by Slade, Robert
Published 2006
Syngress
Table of Contents: ... by Fred Cohen, Security Posture, University of New Haven; Foreword by Hal Tipton, CISSP, ISSAP, ISSMP...

93
by Dubrawsky, Ido
Published 2010
Syngress
Subjects: ...COMPUTERS / Internet / Security / bisacsh...

94
by Cheswick, William, Bellovin, Steven, Rubin, Aviel
Published 2003
Addison-Wesley Professional
Subjects: ...Computer security / Management...

95
by Copeland, Marshall
Published 2017
Apress
Table of Contents: ...Part I: All Business Roles.- Chapter 1: Cybersecurity: How Security Vulnerabilities Affect Your...

96
by Shiflett, Chris
Published 2006
O'Reilly
Subjects: ...COMPUTERS / Internet / Security / bisacsh...

97
by Jha, Raghbendra
Published 2016
Edward Elgar Pub.
Table of Contents: ... Timmer (2012), 'Behavioral Dimensions of Food Security', Proceedings of the National Academy of Sciences...

98
Published 2021
Addison-Wesley Professional
Subjects: ...Computer security / Management...

99
by Winkler, Ira
Published 2022
John Wiley
Subjects: ...Business enterprises / Computer networks / Security measures / http://id.loc.gov/authorities...

100
Published 2022
CRC Press
Table of Contents: ...1. Information Security Introduction. 2. History and Background of IS. 3. Security in Personal...