41
by Wu, Chwan-Hwa, Irwin, J. David
Published 2013
CRC Press
Table of Contents: ...; ; SECTION 5 -- CYBER SECURITY; ; Cyber Security Overview; Introduction; Security from a Global Perspective...

42
by Gajjar, Manish J.
Published 2017
Morgan Kaufmann is an imprint of Elsevier
Table of Contents: ... Faced by Mobile Computing Systems; Resource Poor; Less Secured/Reliable; Intermittent Connectivity...

43
by Dykstra, Josiah
Published 2016
O'Reilly Media
Table of Contents: ... analysis -- System security engineering -- Human-computer interaction and usable security -- Visualization...

44
Published 2022
Pearson IT Certification
Subjects: ...Computer networks / Security measures / http://id.loc.gov/authorities/subjects/sh94001277...

45
by Shannon, Michael J.
Published 2023
Cisco Press
Subjects: ...Computer networks / Security measures / Examinations / fast...

46
by Lakhani, Aamir
Published 2024
Pearson
Subjects: ...Computer networks / Security measures / http://id.loc.gov/authorities/subjects/sh94001277...

47
by Andress, Jason
Published 2019
No Starch Press
Table of Contents: ... Malware -- Operating System Security Tools -- Summary -- Exercises -- 12 MOBILE, EMBEDDED, AND INTERNET...

48
by Haines, Brad
Published 2008
Syngress Pub.
Subjects: ...Computer networks / Security measures / http://id.loc.gov/authorities/subjects/sh94001277...

49
by Waschke, Marvin
Published 2017
Apress
Table of Contents: ...1. What's biting us? -- 2. Why is computer security so weak? -- 3. How does computer security work...

50
Published 2013
Morgan Kaufmann/Elsevier
Table of Contents: .... Mobile and cloud computing -- part 4. Cyber crime and cyber terrorism -- part 5. Focus topics : from...

51
by Contos, Brian T.
Published 2006
Syngress
Table of Contents: ...: Enterprise Security Management (ESM) -- ESM in a Nutshell -- Key ESM Feature Requirements -- o Event...

52
by Kudrati, Abbas, Pillai, Binil
Published 2023
CRC Press
Subjects: ...Computer networks / Security measures / http://id.loc.gov/authorities/subjects/sh94001277...

53
by Cole, Eric
Published 2013
Syngress
Table of Contents: ... landscape: cloud and mobilization -- Proactive security and reputational ranking -- Focusing in on the right...

54
by Williams, Branden R.
Published 2022
CRC Press
Subjects: ...Computer networks / Security measures / http://id.loc.gov/authorities/subjects/sh94001277...

55
Published 2023
Expanding Security
Subjects: ...Computer networks / Security measures / Examinations / Study guides...

56
Published 2022
Pearson IT Certification
Subjects: ...Computer networks / Security measures / Examinations / fast...

57
by Sheikh, Ahmed F.
Published 2020
Apress
Table of Contents: ...: General Security Concepts and Trends -- Information Security Model -- Operational Model of Computer...

58
Published 2023
Microsoft Press
Subjects: ...Computer networks / Security measures / http://id.loc.gov/authorities/subjects/sh94001277...

59
by Dumka, Ankur
Published 2022
CRC Press
Table of Contents: ...1. Introduction to Wireless Sensor Network2. Security in Wireless Sensor Networks ⁰́₃ Background3...

60
by Firtman, Maximiliano R.
Published 2018
O'Reilly Media
Subjects: ...Computer networks / Security measures / http://id.loc.gov/authorities/subjects/sh94001277...