1
Published 2022
Wiley
Table of Contents: ...Front Matter -- Securing Cloud-Based Enterprise Applications and Its Data / Subhradip Debnath...

2
by Sud, Raman
Published 2004
Que Certification
Subjects: ...COMPUTERS / Internet / Security / bisacsh...

3
by Hausman, Kalani Kirk
Published 2003
Que Certification
Subjects: ...COMPUTERS / Internet / Security / bisacsh...

4
by Kearney, Paul
Published 2010
IT Governance Pub.
Table of Contents: ...: People are Helpful and Trusting; Chapter 6: Harnessing Human Qualities to Improve Security; Chapter 7...

5
by Rosenberg, Jonathan B.
Published 2004
SAMS
Subjects: ...COMPUTERS / Internet / Security / bisacsh...

6
by Mason, Andrew G.
Published 2001
Cisco Press
Table of Contents: ...pt. I. Internal Security Fundamentals -- Ch. 1. Internet Security -- Ch. 2. Basic Cisco Router...

7
by Halleen, Gary
Published 2007
Cisco Press
Table of Contents: ... scenarios -- Ch. 4. Securing CS-MARS -- Ch. 5. Rules, reports, and queries -- Ch. 6. Incident investigation...

8
by Hoopes, John
Published 2009
Syngress Pub.
Subjects: ...COMPUTERS / Internet / Security / bisacsh...

9
by Shackleford, Dave
Published 2013
Wiley
Table of Contents: ...Fundamentals of virtualization security -- Securing hypervisors -- Designing virtual networks...

10
by Bellovin, Steven M.
Published 2016
Addison-Wesley
Subjects: ...Computer security...

11
by Wu, Hanqing, Zhao, Liz
Published 2015
Taylor & Francis, CRC Press
Table of Contents: ...Section 1. Our view of the security world -- section 2. Safetyon the client script -- section 3...

12
by Viega, John
Published 2009
O'Reilly Media
Table of Contents: ...The security industry is broken --; Security : nobody cares! --; It's easier to get "owned" than...

13
by Oram, Andrew
Published 2009
O'Reilly
Subjects: ...COMPUTERS / Internet / Security / bisacsh...

14
by Schneier, Bruce
Published 2008
Wiley Pub.
Table of Contents: ...Terrorism and security -- National security policy -- Airline travel -- Privacy and surveillance...

15
by Long, Josh
Published 2019
Pearson
Subjects: ...Computer networks / Security measures / http://id.loc.gov/authorities/subjects/sh94001277...

16
by Kanneganti, Ramarao
Published 2008
Manning
Table of Contents: ...pt. I. SOA Basics -- 1. SOA requires new approaches to security -- 2. Getting started with web...

17
by Kang, Meng-Chow
Published 2014
CRC Press/Taylor & Francis
Table of Contents: .... Responsive security -- 5. Conclusions and implications...

18
by Niles, Kitty
Published 2002
Addison Wesley Professional
Subjects: ...Computer networks / Security measures / http://id.loc.gov/authorities/subjects/sh94001277...

19
by Collins, J. D.
Published 2014
BCS Learning & Development
..."Security architects are responsible for maintaining the security of an organisation's computer...

20
by Calles, Miguel A.
Published 2020
Apress
Table of Contents: ...Chapter 1: Introduction to Cloud Computing Security -- Chapter 2: Performing a Risk Assessment...