Toggle navigation
Campus Access
About MPG.eBooks
Skip to content
Search Tips
Home
>
Search: ((national security) or (internet securite))
Language
English
Deutsch
Español
Français
Italiano
日本語
Nederlands
Português
Português (Brasil)
中文(简体)
中文(繁體)
Türkçe
עברית
Gaeilge
Cymraeg
Ελληνικά
Català
Euskara
Русский
Čeština
Suomi
Svenska
polski
Dansk
slovenščina
اللغة العربية
বাংলা
Galego
Tiếng Việt
Hrvatski
हिंदी
All Fields
Title
Person
Topic
ISBN/ISSN
Year
Collection
Advanced
Retain my current filters
language:"English"
Search alternatives
:
internet securite »
internet security
Showing
1
-
20
of
31
Search:
'((national security) or (internet securite))'
,
query time: 0.85s
Book List
0
Sort:
Relevance
Year Descending
Year Ascending
Author
Title
Read Now
1
Cyber
security
and IT infrastructure protection
by
Vacca, John R.
Published 2013
Syngress
Table of Contents:
“
...Front Cover; Cyber
Security
and IT Infrastructure Protection; Copyright Page; Contents...
”
Call Number:
TK5105.875.I57
Read Now
2
Threat hunting in the cloud : defending AWS, Azure and other cloud platforms against cyberattacks
by
Peiris, Chris
,
Kudrati, Abbas
,
Pillai, Binil
Published 2022
John Wiley & Sons, Inc.
Table of Contents:
“
...
Security
Development Lifecycle (SDL) 193 -- Protecting the Hybrid Cloud Infrastructure 194 -- Azure...
”
Call Number:
QA76.9.A25
Read Now
3
Routledge companion to global cyber-
security
strategy
Published 2021
Routledge
Table of Contents:
“
...Malaysia: balancing
national
development,
national
security
, and cybersecurity policy -- Cyber...
”
Call Number:
UA163
Read Now
4
Intelligent systems for
security
informatics
by
Yang, Christopher C.
Published 2013
Academic Press
Table of Contents:
“
...-level architecture and design of a decision engine for marine safety and
security
-- chapter 6. Criminal...
”
Call Number:
QA76.9.A25
Read Now
5
Advanced persistent threat : understanding the danger and how to protect your organization
by
Cole, Eric
Published 2013
Syngress
Table of Contents:
“
... compromised? -- Risk based approach to
security
-- Protecting your data -- Prevention is ideal but detection...
”
Call Number:
TK5105.59
Read Now
6
Security
fundamentals
by
Bryan, Wes
Published 2024
Packt Publishing
Subjects:
“
...
Sécurité
informatique...
”
Call Number:
QA76.9.A25
Read Now
7
Schneier on
security
by
Schneier, Bruce
Published 2008
Wiley Pub.
Table of Contents:
“
...Terrorism and
security
--
National
security
policy -- Airline travel -- Privacy and surveillance...
”
Call Number:
QA76.9.A25
Read Now
8
Secure
operations and protections
by
Lakhani, Aamir
Published 2024
Pearson
Subjects:
“
...Computer
security
/ Management...
”
Call Number:
QA76.9.A25
Read Now
9
Exposed : how revealing your data and eliminating privacy increases trust and liberates humanity
by
Malisow, Ben
Published 2021
John Wiley & Sons, Inc.
Table of Contents:
“
... Intelligence/Military Confidentiality --
National
Security
vs. Governmental
Security
-- A Government Is Not a...
”
Call Number:
QA76.9.A25
Read Now
10
Cybersecurity Strategies and Best Practices : A Comprehensive Guide to Mastering Enterprise Cyber Defense Tactics and Techniques
by
Aslaner, Milad
Published 2024
Packt Publishing, Limited
Table of Contents:
“
... (TTPs) -- Real-world examples of cyberattacks and consequences --
Nation
-state actors: NotPetya attack...
”
Call Number:
QA76.9.A25
Read Now
11
PRACTICAL INDUSTRIAL CYBERSECURITY : ICS, Industry 4.0, and IIoT
by
Brooks, Charles J.
Published 2022
JOHN WILEY
Subjects:
“
...
Sécurité
informatique...
”
Call Number:
TS156.8
Read Now
12
Becoming a cyber
security
professional : a beginner's career guide
Published 2022
Packt Publishing
Subjects:
“
...
Sécurité
informatique...
”
Call Number:
QA76.9.A25
Read Now
13
Enemy at the water cooler : real-life stories of insider threats and Enterprise Security Management countermeasures
by
Contos, Brian T.
Published 2006
Syngress
Table of Contents:
“
...: Enterprise
Security
Management (ESM) -- ESM in a Nutshell -- Key ESM Feature Requirements -- o Event...
”
Call Number:
TK5105.59
Read Now
14
Using the common criteria for IT
security
evaluation
by
Herrmann, Debra S.
Published 2003
Auerbach Publications
Table of Contents:
“
...Evaluation Methodology (CEM)<BR>
National
Evaluation Schemes<BR>Interpretation of Results<BR...
”
Call Number:
TK5102.85
Read Now
15
Information
security
management handbook, Volume 7
by
O'Hanley, Richard
Published 2014
CRC Press
Table of Contents:
“
... for Cloud
Security
?; Debra S. Herrmann; ; Domain 6: OPERATIONS
SECURITY
; Concepts; 19. Data Storage...
”
Call Number:
QA76.9.A25
Read Now
16
Security
and privacy in cyber-physical systems : foundations, principles, and applications
Published 2018
John Wiley & Sons
Table of Contents:
“
...-physical systems -- Cyber-physical systems and
national
security
concerns -- Legal considerations of cyber...
”
Call Number:
TK5105.59
Read Now
17
We have root : even more advice from Schneier on security
by
Schneier, Bruce
Published 2019
John Wiley & Sons, Incorporated
Table of Contents:
“
...Front Matter -- Crime, Terrorism, Spying, and War -- Travel and
Security
--
Internet
of Things...
”
Call Number:
QA76.9.A25
Read Now
18
Auditing cloud computing : a security and privacy guide
by
Halpert, Ben
Published 2011
John Wiley & Sons
Table of Contents:
“
... Delivery and Support 79 Beyond Mere Migration 80 Architected to Share,
Securely
80 Single-Tenant Offsite...
”
Call Number:
HF5548.37
Read Now
19
Network and data
security
for non-engineers
by
Groom, Frank M.
,
Groom, Kevin M.
,
Jones, Stephan
Published 2017
CRC Press
Table of Contents:
“
..., DNS
security
, and the
internet
-- Network
security
and defenses -- Network
security
protocols...
”
Call Number:
TK5105.59
Read Now
20
CYBER
SECURITY
AND DIGITAL FORENSICS
Published 2021
JOHN WILEY & SONS
Subjects:
“
...
Sécurité
informatique...
”
Call Number:
QA76.9.A25
1
2
Back
Narrow Search
Remove Filters
Clear Filter
Language: English
Year of Publication
From:
To:
Classification
005 - Computer programming, programs & data
24
331 - Labor economics
15
658 - General management
7
330 - Economics
4
364 - Criminology
3
500 - Natural sciences & mathematics
3
more ...
338 - Production
2
381 - Commerce
2
384 - Communications; telecommunication
2
000 - Computer science, information & general works
1
332 - Financial economics
1
333 - Economics of land & energy
1
363 - Other social problems & services
1
374 - Adult education
1
821 - English poetry
1
see all ...
less ...
Language
English
Collection
O'Reilly
31
Author
Lakhani, Aamir
2
Schneier, Bruce
2
ACI Learning
1
Aslaner, Milad
1
Brooks, Charles J.
1
Bryan, Wes
1
more ...
Cappelli, Dawn
1
Cole, Eric
1
Contos, Brian T.
1
Couretas, Jerry M.
1
Craig, Philip A.
1
Deal, Lauren
1
Fink, Glenn A.
1
Gantz, Stephen D.
1
Groom, Frank M.
1
Groom, Kevin M.
1
Halpert, Ben
1
Herrmann, Debra S.
1
Hsu, Tony
1
Jeschke, Sabina
1
Jones, Stephan
1
Kudrati, Abbas
1
Lacalle, Daniel
1
Malisow, Ben
1
Manjikian, Mary
1
Moore, Andrew
1
O'Hanley, Richard
1
Parrilla, Diego
1
Peiris, Chris
1
Philpott, Daniel R.
1
Pillai, Binil
1
Rawat, Romil
1
Romaniuk, Scott N.
1
Song, Houbing
1
Swan, Melanie
1
Tiller, James S.
1
Trzeciak, Randall
1
Vacca, John R.
1
Yang, Christopher C.
1
see all ...
less ...
Search Tools
Get RSS Feed
Share Search
https://ebooks.mpdl.mpg.de/ebooks/Search/Results?filter%5B%5D=language%3A%22English%22&lookfor=%28%28national+security%29+or+%28internet+securite%29%29&type=AllFields
Send by Email
×
Loading...