101
by Toroman, Mustafa, Janetscheck, Tom
Published 2022
Packt Publishing
Table of Contents: ...Table of Contents An Introduction to Azure Security Governance and Security Managing Cloud...

102
by Coombs, Ted
Published 2022
Tantor Media, Inc.
Subjects: ...Computer networks / Security measures / http://id.loc.gov/authorities/subjects/sh94001277...

103
by Carpenter, Perry, Roer, Kai
Published 2022
John Wiley & Sons, Inc.
Subjects: ...Computer networks / Security measures / http://id.loc.gov/authorities/subjects/sh94001277...

104
by Winkler, Ira
Published 2022
Tantor Media, Inc.
Subjects: ...Business enterprises / Computer networks / Security measures / http://id.loc.gov/authorities...

105
by Hibberd, Gary
Published 2022
IT Governance Publishing
Subjects: ...Internet / Security measures...

106
by Carpenter, Perry, Roer, Kai
Published 2022
Ascent Audio
Subjects: ...Computer networks / Security measures / http://id.loc.gov/authorities/subjects/sh94001277...

107
by Agarwala, Ramgopal
Published 1997
World Bank
Subjects: ...Social security / China / Finance...

108
by Carpenter, Perry
Published 2019
Wiley
Subjects: ...Computer networks / Security measures / http://id.loc.gov/authorities/subjects/sh94001277...

109
by Bingley, Richard
Published 2015
IT Governance Publishing
Table of Contents: ...1. Becoming an entrepreneur in the security business -- 2. Becoming a developed security manager...

110
by Marty, Raffael
Published 2015
O'Reilly Media
Subjects: ...Computer networks / Security measures / http://id.loc.gov/authorities/subjects/sh94001277...

111
by El-Bawab, Abd El-Monem A.
Published 2014
Packt Publishing
Table of Contents: ... on information security; The CIA triad; Types of attacks; Types of controls; Defense in depth; Introducing...

112
by Garbis, Jason, Chapman, Jerry W.
Published 2021
Apress
Table of Contents: ... -- Next-Generation Firewalls -- Security Information and Event Management -- Web Server and Web...

113
Published 2021
CRC Press
Subjects: ...COMPUTERS / Internet / Security / bisacsh...

114 Table of Contents: ... -- Simulations and Security Processes -- Access Analytics -- Security and Text Mining -- Security Intelligence...

115
by Krausz, Michael
Published 2009
IT Governance Pub.
Table of Contents: ... the damage; Past or future?; Initiate an investigation, secure all evidence; Evaluate evidence; Draft...

116
by Krausz, Michael
Published 2014
IT Governance Press
Table of Contents: ...: Treatment using ISO27001; Assess the damage; Past or future?; Initiate an investigation, secure all evidence...

117
by Wang, Jie, Kissel, Zachary A.
Published 2015
Wiley
Subjects: ...Computer networks / Security measures / http://id.loc.gov/authorities/subjects/sh94001277...

118
by Vyncke, Eric
Published 2007
Cisco Press
Table of Contents: ...pt. I. Vulnerabilities and mitigation techniques -- Ch. 1. Introduction to security -- Ch. 2...

119
by Barrett, Daniel J.
Published 2003
O'Reilly
Subjects: ...COMPUTERS / Internet / Security / bisacsh...

120
by Bauer, Michael D.
Published 2005
O'Reilly
Subjects: ...Computer security...