61
Published 2020
The Institute of Electrical and Electronics Engineers, Inc.

62
by Matulevičius, Raimundas
Published 2017
Springer International Publishing
Subjects: ...Computer security...

63
Published 1983
Springer Vienna

64
Published 2014
The Institute of Electrical and Electronics Engineers, Inc.

65
Published 2020
Manning Publications
... common mistakes in securing an AWS S3 bucket...

66
by Armitage, Josh
Published 2022
O'Reilly Media, Inc
Subjects: ...Cloud computing / Security measures / fast...

67
by Kohnfelder, Loren
Published 2022
No Starch Press
Subjects: ...Computer security / http://id.loc.gov/authorities/subjects/sh90001862...

68
by Halleen, Gary
Published 2007
Cisco Press
Table of Contents: ... scenarios -- Ch. 4. Securing CS-MARS -- Ch. 5. Rules, reports, and queries -- Ch. 6. Incident investigation...

69
by Mason, Andrew G.
Published 2001
Cisco Press
Table of Contents: ...pt. I. Internal Security Fundamentals -- Ch. 1. Internet Security -- Ch. 2. Basic Cisco Router...

70
Published 2015
O'Reilly Media
Subjects: ...Cyber intelligence (Computer security) / United States / Congresses...

71
by Harich, Thomas W.
Published 2018
Mitp Verlags GmbH & Co. KG
Subjects: ...Computer security / Management...

72
by Rosenberg, Jonathan B.
Published 2004
SAMS
Subjects: ...COMPUTERS / Internet / Security / bisacsh...

73
by Wiles, Jack
Published 2007
Syngress
Table of Contents: ...Foreword -- Chapter 1: Physical Security: SCADA and the Critical Infrastructure's Biggest...

74
by Chen, Hsinchun
Published 2006
Springer US
Table of Contents: ...Intelligence and Security Informatics (ISI): Challenges and Opportunities -- An ISI Research...

75
by Muggah, Robert
Published 2019
Ubiquity Press
...While widely considered a core pillar of the peace and security architecture, Security Sector...

76
by Torrens, Robert
Published 1819
Printed for R. Hunter
Subjects: ...Ricardo, David / 1772-1823 / Proposals for an economical and secure currency...

77
by Ghosh, Sumit
Published 2002
Springer New York
Table of Contents: ...6 Synthesis of Security Attack Models for ATM Networks -- 6.1 Brief Review of the Current...

78
Published 2008
The Institute of Electrical and Electronics Engineers, Inc.

79
Published 2009
The Institute of Electrical and Electronics Engineers, Inc.

80
by Seacord, Robert C.
Published 2018
Addison-Wesley Professional
...Secure coding rules for Java...