Search alternatives:
international security » national security
internal security » internet security, national security
internet securite » internet security

1
by Mason, Andrew G.
Published 2001
Cisco Press
Table of Contents: ...pt. I. Internal Security Fundamentals -- Ch. 1. Internet Security -- Ch. 2. Basic Cisco Router...

2
by Bates, Regis J.
Published 2015
Syngress
Table of Contents: ... attacks; Security concerns; Security policy needs; Vulnerability detection and auditing; Is the system...

3
by Vacca, John R.
Published 2013
Syngress
Table of Contents: ...Using a Generator to Represent the Elements of GF(2n)GF(23) is a Finite Field; 6. The Internal...

4
by Abaimov, Stanislav, 1989- author
Published 2020
CRC Press
Subjects: ...Security, International / fast...

5
by Mitnick, Kevin, Simon, William L.
Published 2002
Wiley
Table of Contents: ...Foreword -- Preface -- Introduction -- Part I : Behind the scenes -- Security's weakest link...

6
by Baum, David
Published 2022
O'Reilly Media, Inc.
Subjects: ...Internet / Sécurité / Mesures...

7
by Peiris, Chris, Kudrati, Abbas, Pillai, Binil
Published 2022
John Wiley & Sons, Inc.
Table of Contents: ...Security Development Lifecycle (SDL) 193 -- Protecting the Hybrid Cloud Infrastructure 194 -- Azure...

8
by Kaeo, Merike
Published 2003
Cisco Press
Subjects: ...Internet / Sécurité / Mesures...

9
Published 2022
Palgrave Macmillan
Table of Contents: ... -- 6. Changing Threats And Challenges In International Relations: Debating (In)Securities And Ways...

10
by Gonzalez, Deborah
Published 2015
Butterworth-Heinemann
Table of Contents: ... RESPONSE; BONUS: TEN IT SECURITY MYTHS; SECURITY/RISK MANAGEMENT APPS; CHAPTER 2 -- INTERNAL AND EXTERNAL...

11
by Czagan, Dawid
Published 2024
Packt Publishing Ltd.
Subjects: ...Internet / Sécurité / Mesures...

12
Published 2018
O'Reilly Media, Inc.
Subjects: ...Internet / Sécurité / Mesures...

13
by Datt, Samir
Published 2016
Packt Publishing
Table of Contents: ...); Internet application protocols; Understanding network security; Types of threats; Internal threats...

14
by Winkler, Ira
Published 2007
Syngress
Table of Contents: ... 5. What Makes a Master; Mastering Computer Security; Chapter 6. Knights and Dragons; The FUD Factor...

15
by Yang, Christopher C.
Published 2013
Academic Press
Table of Contents: ...-level architecture and design of a decision engine for marine safety and security -- chapter 6. Criminal...

16
Published 2019
O'Reilly Media, Inc.
Subjects: ...Sécurité informatique...

17
Published 2021
Routledge
Table of Contents: ... cyber security: a small-state approach to building international cyber cooperation -- Seeking a new...

18
by Bravo, Cesar
Published 2022
Packt Publishing, Limited
Table of Contents: ...Types of USB HID attacks -- A false sense of security -- Protecting against USB HID attacks...

19
by Russell, David L.
Published 2015
John Wiley & Sons
Table of Contents: ... Arrival and Security Procedures While Moored; Internal Security; Perimeter Security and Restricted Areas...

20
by Dwivedi, Himanshu
Published 2010
McGraw-Hill
Table of Contents: ...Cover Page -- Mobile Application Security -- Copyright Page -- About the Authors -- Dedication...