1
by Konheim, Alan G.
Published 2007
Wiley-Interscience
Table of Contents: ...COMPUTER SECURITY AND CRYPTOGRAPHY; CONTENTS; FOREWORD; PREFACE; ABOUT THE AUTHOR; CHAPTER 1...

2
by Viega, John
Published 2009
O'Reilly Media
Table of Contents: ...The security industry is broken --; Security : nobody cares! --; It's easier to get "owned" than...

3
Published 2021
CRC Press
Subjects: ...COMPUTERS / Internet / Security / bisacsh...

4 Table of Contents: ... and programming -- The Web : user side -- Operating systems -- Networks -- Databases -- Cloud computing -- Privacy...

5
by Rittinghouse, John W.
Published 2010
CRC Press
Table of Contents: ... in the cloud -- Security in the cloud -- Common standards in cloud computing -- End-user access to cloud...

6
by Easttom, Chuck
Published 2016
Pearson
Subjects: ...COMPUTERS / Security / General / bisacsh...

7
by Vacca, John R.
Published 2013
Morgan Kaufmann Publishers is an imprint of Elsevier
Table of Contents: ... Organization / John Mallery -- 1.Obstacles to Security -- 2.Computers are Powerful and Complex -- 3.Current...

8
by Carstensen, Jared
Published 2012
IT Governance Publishing
Table of Contents: ...); Conclusion; Additional resources; Chapter 4: Cloud Computing Top Security Risks; Security -- the shift from...

9
by Shih, Frank Y.
Published 2013
CRC Press
Subjects: ...COMPUTERS / Security / General / bisacsh...

10
by Vacca, John R.
Published 2009
Elsevier
Subjects: ...COMPUTERS / Security / General / bisacsh...

11
by Volonino, Linda
Published 2008
Wiley
Table of Contents: ... -- pt. III: Doing Computer Forensics Investigations -- pt. IV: Succeeding in Court -- pt. V: The Part...

12
Published 2022
CRC PRESS
Subjects: ...TECHNOLOGY / Electronics / General / bisacsh...

13
Published 2011
British Informatics Society
Table of Contents: ...-USER ADOPTION; CONCLUSION; 2 CONSUMER DEVICES IN THE WORKPLACE: A BEST-PRACTICE SECURITY APPROACH...

14
Published 2017
Morgan Kaufmann Publishers
Table of Contents: ... TO SECURITY; Security Is Inconvenient; 2. COMPUTERS ARE POWERFUL AND COMPLEX; Computer Users...

15
by Vladimirov, Andrew A.
Published 2010
IT Governance Pub.
Table of Contents: ...Introduction -- Ch. 1. Information security auditing and strategy -- Ch. 2. Security auditing...

16
by Ransome, James F., Misra, Anmol, Schoenfield, Brook S. E.
Published 2014
CRC Press, Taylor & Francis Group
Table of Contents: ...The secure development lifecycle -- Security assessment (A1): SDL activities and best practices...

17
Published 2017
CRC Press
Table of Contents: ..., and Kun Sun -- Cloud computing security essentials and architecture / Michaela Iorga and Anil Karmel...

18
by Clarke, Nathan
Published 2010
IT Governance Pub.
Subjects: ...COMPUTERS / Security / General / bisacsh...

19
by Samani, Raj, Honan, Brian, Reavis, Jim
Published 2015
Syngress
Table of Contents: ... CLOUD THREATS; END NOTES; Chapter 4 -- Secure Cloud for Mobile Computing; MOBILE TOP THREATS: EVIL 8.0...

20
by Krutz, Ronald L.
Published 2010
Wiley Pub.
Table of Contents: ...CLOUD SECURITY: A Comprenhensive Guide to Secure Cloud Computing; Contents at a Glance; About...