Search alternatives:
internal security » internet securite, international security, national security

1
Published 2022
Palgrave Macmillan
Table of Contents: ... -- 6. Changing Threats And Challenges In International Relations: Debating (In)Securities And Ways...

2
by Winkler, Ira
Published 2007
Syngress
Table of Contents: ... 5. What Makes a Master; Mastering Computer Security; Chapter 6. Knights and Dragons; The FUD Factor...

3
by Datt, Samir
Published 2016
Packt Publishing
Table of Contents: ...); Internet application protocols; Understanding network security; Types of threats; Internal threats...

4
by Jones, Robert
Published 2006
O'Reilly
Subjects: ...COMPUTERS / Internet / Security / bisacsh...

5
Published 2021
Routledge
Table of Contents: ... cyber security: a small-state approach to building international cyber cooperation -- Seeking a new...

6
by Mehan, Julie E.
Published 2008
IT Governance
Table of Contents: ... OF CYBERSECURITY; CHAPTER 6: INCREASING INTERNATIONALISM: GOVERNANCE, LAWS, AND ETHICS; CHAPTER 7: STANDARDS: WHAT...

7
by Mirkovic, Jelena, Dietrich, Sven, Dittrich, David
Published 2004
Pearson
Subjects: ...Internet / Security measures...

8
by Gralla, Preston
Published 2006
Que Pub.
Table of Contents: ...How the Internet works -- How hackers break into your PC and how to protect against them -- How...

9
by Wilhelm, Thomas
Published 2011
Syngress/Elsevier
Subjects: ...COMPUTERS / Internet / Security / bisacsh...

10
by Kroll, Rainer
Published 2023
Springer International Publishing
Subjects: ...Crime Control and Security...

11
by Shimonski, Robert
Published 2015
Syngress
Table of Contents: ... Gathering Tools; Online Reconnaissance; The Internet Threat; Search Engines; Phishing; Tracking; Social...

12
by Barnett, Ryan C.
Published 2013
Wiley Pub., Inc.
Table of Contents: ...; Recipe 1-3: Installing the OWASP ModSecurity Core Rule Set (CRS); Recipe 1-4: Integrating Intrusion...

13
by Wells, Joseph T.
Published 2010
John Wiley & Sons
Table of Contents: ... Petterson -- No security in online advance fees / Dr. Ivo George Caytas -- The G.I. Hacker / Bruce L. Owdley...

14
by Lillard, Terrence
Published 2010
Syngress
Subjects: ...Computer security...

15
by Loewengart, Victoria
Published 2012
IT Governance Pub.
Subjects: ...COMPUTERS / Internet / Security / bisacsh...

16
by Jakobsson, Markus
Published 2008
Addison-Wesley
Table of Contents: ... models -- The educational aspect of security -- Surreptitious code and the law -- Crimeware and trusted...

17
by White, Adam
Published 2010
Palgrave Macmillan UK
Subjects: ...International Relations...

18
by Hoogenboom, Bob
Published 2010
Palgrave Macmillan UK
Subjects: ...International Relations...

19
by Huang, Keman
Published 2019
MIT Sloan Management Review
Subjects: ...Internet / Security measures...

20
by Hayden, Lance
Published 2010
McGraw Hill
Table of Contents: ...1. What is a security metric? -- 2. Designing effective security metrics -- 3. Understanding data...