Search alternatives:
internet securite » internet security

1
by Vacca, John R.
Published 2013
Syngress
Table of Contents: ...Front Cover; Cyber Security and IT Infrastructure Protection; Copyright Page; Contents...

2
by Peiris, Chris, Kudrati, Abbas, Pillai, Binil
Published 2022
John Wiley & Sons, Inc.
Table of Contents: ...Security Development Lifecycle (SDL) 193 -- Protecting the Hybrid Cloud Infrastructure 194 -- Azure...

3
Published 2021
Routledge
Table of Contents: ...Malaysia: balancing national development, national security, and cybersecurity policy -- Cyber...

4
by Yang, Christopher C.
Published 2013
Academic Press
Table of Contents: ...-level architecture and design of a decision engine for marine safety and security -- chapter 6. Criminal...

5
by Cole, Eric
Published 2013
Syngress
Table of Contents: ... compromised? -- Risk based approach to security -- Protecting your data -- Prevention is ideal but detection...

6
by Bryan, Wes
Published 2024
Packt Publishing
Subjects: ...Sécurité informatique...

7
by Schneier, Bruce
Published 2008
Wiley Pub.
Table of Contents: ...Terrorism and security -- National security policy -- Airline travel -- Privacy and surveillance...

8
by Lakhani, Aamir
Published 2024
Pearson
Subjects: ...Computer security / Management...

9
by Malisow, Ben
Published 2021
John Wiley & Sons, Inc.
Table of Contents: ... Intelligence/Military Confidentiality -- National Security vs. Governmental Security -- A Government Is Not a...

10
by Aslaner, Milad
Published 2024
Packt Publishing, Limited
Table of Contents: ... (TTPs) -- Real-world examples of cyberattacks and consequences -- Nation-state actors: NotPetya attack...

11
by Brooks, Charles J.
Published 2022
JOHN WILEY
Subjects: ...Sécurité informatique...

12
Published 2022
Packt Publishing
Subjects: ...Sécurité informatique...

13
by Contos, Brian T.
Published 2006
Syngress
Table of Contents: ...: Enterprise Security Management (ESM) -- ESM in a Nutshell -- Key ESM Feature Requirements -- o Event...

14
by Herrmann, Debra S.
Published 2003
Auerbach Publications
Table of Contents: ...Evaluation Methodology (CEM)<BR>National Evaluation Schemes<BR>Interpretation of Results<BR...

15
by O'Hanley, Richard
Published 2014
CRC Press
Table of Contents: ... for Cloud Security?; Debra S. Herrmann; ; Domain 6: OPERATIONS SECURITY; Concepts; 19. Data Storage...

16
Published 2018
John Wiley & Sons
Table of Contents: ...-physical systems -- Cyber-physical systems and national security concerns -- Legal considerations of cyber...

17
by Schneier, Bruce
Published 2019
John Wiley & Sons, Incorporated
Table of Contents: ...Front Matter -- Crime, Terrorism, Spying, and War -- Travel and Security -- Internet of Things...

18
by Halpert, Ben
Published 2011
John Wiley & Sons
Table of Contents: ... Delivery and Support 79 Beyond Mere Migration 80 Architected to Share, Securely 80 Single-Tenant Offsite...

19
by Groom, Frank M., Groom, Kevin M., Jones, Stephan
Published 2017
CRC Press
Table of Contents: ..., DNS security, and the internet -- Network security and defenses -- Network security protocols...

20
Published 2021
JOHN WILEY & SONS
Subjects: ...Sécurité informatique...