Search alternatives:
"secularity" » "peculiarity", "secularism"
"regularity" » "regularly"

1
Published 2022
Wiley
Table of Contents: ...Front Matter -- Securing Cloud-Based Enterprise Applications and Its Data / Subhradip Debnath...

2
by Sud, Raman
Published 2004
Que Certification
Subjects: ...COMPUTERS / Internet / Security / bisacsh...

3
by Hausman, Kalani Kirk
Published 2003
Que Certification
Subjects: ...COMPUTERS / Internet / Security / bisacsh...

4
by Kearney, Paul
Published 2010
IT Governance Pub.
Table of Contents: ...: People are Helpful and Trusting; Chapter 6: Harnessing Human Qualities to Improve Security; Chapter 7...

5
by Mason, Andrew G.
Published 2001
Cisco Press
Table of Contents: ...pt. I. Internal Security Fundamentals -- Ch. 1. Internet Security -- Ch. 2. Basic Cisco Router...

6
by Rosenberg, Jonathan B.
Published 2004
SAMS
Subjects: ...COMPUTERS / Internet / Security / bisacsh...

7
by Halleen, Gary
Published 2007
Cisco Press
Table of Contents: ... scenarios -- Ch. 4. Securing CS-MARS -- Ch. 5. Rules, reports, and queries -- Ch. 6. Incident investigation...

8
by Harrington, Jan L.
Published 2005
Morgan Kaufmann Publishers
Table of Contents: ...In the beginning -- Basic security architecture -- Physical security -- Information gathering...

9
by Kadrich, Mark
Published 2007
Addison-Wesley
Subjects: ...Computer security...

10
by Shackleford, Dave
Published 2013
Wiley
Table of Contents: ...Fundamentals of virtualization security -- Securing hypervisors -- Designing virtual networks...

11
by Bellovin, Steven M.
Published 2016
Addison-Wesley
Subjects: ...Computer security...

12
by Hoopes, John
Published 2009
Syngress Pub.
Subjects: ...COMPUTERS / Internet / Security / bisacsh...

13
by Wu, Hanqing, Zhao, Liz
Published 2015
Taylor & Francis, CRC Press
Table of Contents: ...Section 1. Our view of the security world -- section 2. Safetyon the client script -- section 3...

14
Published 2018
O'Reilly Media, Inc.
Subjects: ...Computer networks / Security measures / http://id.loc.gov/authorities/subjects/sh94001277...

15
by Osterhage, Wolfgang
Published 2011
CRC Press
Table of Contents: .... Security policy...

16 Subjects: ...Computer networks / Security measures / http://id.loc.gov/authorities/subjects/sh94001277...

17
by Kerr, William A.
Published 2023
Edward Elgar Publishing
Table of Contents: ...Contents: Preface -- 1. The three pillars of food security - availability, adequate income...

18
by Dennison, Justin
Published 2024
Packt Publishing
Subjects: ...Computer networks / Security measures / http://id.loc.gov/authorities/subjects/sh94001277...

19
by Hayden, Lance
Published 2010
McGraw Hill
Table of Contents: ...1. What is a security metric? -- 2. Designing effective security metrics -- 3. Understanding data...

20
by Furnell, Steven
Published 2009
IT Governance Pub.
Subjects: ...Mobile computing / Security measures...