121
by Esteves, José, Ramalho, Elisabete, Haro, Guillermo de
Published 2017
MIT Sloan Management Review
Subjects: ...Computer security...

122
by Mehan, Julie E.
Published 2016
IT Governance Publishing
Subjects: ...National security / http://id.loc.gov/authorities/subjects/sh85090122...

123
Published 2020
Springer International Publishing
... International Conference on Computer Safety, Reliability and Security, Lisbon, Portugal, September 2020. The 26...

124
by Glaessner, Thomas C.
Published 2004
World Bank
Subjects: ...Government securities / Philippines / Data processing...

125
Published 2021
Springer International Publishing
Table of Contents: ... Analysis and Mitigation for the Automotive Domain -- Guideline for Architectural Safety, Security...

126
by Cooper, Arthur B.
Published 2023
Apress L. P.
Table of Contents: ... Components and Cardholder Data -- Chapter 12. Test Security of Systems and Networks Regularly -- Chapter 13...

127
by Shaik, Baji
Published 2020
Apress
Table of Contents: ... for Performance -- Chapter 03. User management and Securing databases -- Chapter 04. Backup/Restore best practices...

128
by Trahan, Jennifer
Published 2020
Cambridge University Press
Subjects: ...United Nations / Security Council / Voting...

130
by Mihr, Anja
Published 2020
Springer Nature
Subjects: ...International Security Studies...

131
Published 2024
Springer Nature Singapore
Table of Contents: ... -- Secure and Privacy-Compliant Data Sharing: An Essential Framework for Healthcare Organizations...

132
by Parker, Carey
Published 2023
Apress
Table of Contents: ... -- Chapter 4: Passwords -- Chapter 5: Computer Security -- Chapter 6: Lan Sweet Lan -- Chapter 7: Practice...

133
by Aseeva, Roza, Serkov, Boris, Sivenkov, Andrey
Published 2014
Springer Netherlands
Subjects: ...Security Science and Technology...

134 Table of Contents: ... Components and Cardholder Data -- Chapter 12. Test Security of Systems and Networks Regularly -- Chapter 13...

135
by Hassan, Nihad A., Hijazi, Rami
Published 2018
Apress
Subjects: ...Data and Information Security...

136
by Browder, George C.
Published 1996
Oxford University Press
...This socio-organizational history of the Gestapo, the SS and the regular detectives of the Third...

137
by Jaswal, Nipun
Published 2018
Packt Publishing
Table of Contents: ... -- Securing SCADA -- Implementing secure SCADA -- Restricting networks -- Database exploitation -- SQL server...

138
Published 2023
CRC Press
Table of Contents: ... Using AI/ML Algorithms for Cyber Security -- 13 Using Machine Learning for Cyber Security: Overview...

139
by Hassan, Nihad A., Hijazi, Rami
Published 2018
Apress, Distributed to the Book trade worldwide by Springer
Subjects: ...Computer networks / Security measures / http://id.loc.gov/authorities/subjects/sh94001277...

140
Published 2024
Palgrave Macmillan
Table of Contents: ... security cooperation between India and ASEAN -- Chapter 4: Evolving geopolitics of the Indo-Pacific: India...