Limit Search Results
Author
Language
Format
Subject
Switch to list view
Switch to thumbnail view
214 Results Found Subscribe to search results
0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000MAIN
Print
3. 
Cover image for Collaborative computer security and trust management
4. 
Cover image for Simple computer security : disinfect your PC
6. 
Cover image for Analyzing computer security : a threat/vulnerability/countermeasure approach
9. 
Cover image for Security and Privacy in Cyber-Physical Systems : Foundations, Principles, and Applications
14. 
Cover image for Security policies and implementation issues
22. 
Cover image for Analyzing security, trust, and crime in the digital world
23. 
Cover image for Responsive security  : be ready to be secure
32. 
Cover image for Information security policy development for compliance : ISO/IEC 27001, NIST SP 800-53, HIPAA standard, PCI DSS V2.0, and AUP V5.0
35. 
Cover image for Data hiding : exposing concealed data in multimedia, operating systems, mobile devices and network protocols
38. 
Cover image for A survey of data leakage detection and prevention solutions
41. 
Cover image for Cyber security standards, practices and industrial applications : systems and methodologies
47. 
Cover image for Information assurance and security ethics in complex systems : interdisciplinary perspectives
48. 
Cover image for Auditing cloud computing : a security and privacy guide
52. 
Cover image for Information technology risk management in enterprise environments : a review of industry practices and a practical guide to risk management teams
54. 
Cover image for The executive MBA in information security
57. 
Cover image for Data protection : governance, risk management, and compliance
59. 
Cover image for Multimedia forensics and security
65. 
Cover image for CISO soft skills : securing organizations impaired by employee politics, apathy, and intolerant perspectives
66. 
Cover image for Multimedia content encryption : techniques and applications
67. 
Cover image for Information assurance architecture
69. 
Cover image for Privacy-preserving data mining : models and algorithms
70. 
Cover image for Netcat power tools
75. 
Cover image for Advances in enterprise information technology security
76. 
Cover image for Information security : design, implementation, measurement and compliance
77. 
Cover image for Cybersecurity for SCADA systems
80. 
Cover image for The Ciso handbook : a practical guide to securing your company
81. 
Cover image for Securing SCADA systems
85. 
Cover image for The security risk assessment handbook : a complete guide for performing security risk assessments
86. 
Cover image for Hacking exposed cisco networks : cisco security secrets and solutions
87. 
Cover image for Information technology security & risk management
90. 
Cover image for Information assurance : security in the information environment
92. 
Cover image for A practical guide to security assessments
95. 
Cover image for The business case for network security : advocacy, governance, and ROI
97. 
Cover image for Implementing database security and auditing : a guide for DBAs, information security administrators and auditors
99. 
Cover image for Information security fundamentals
105. 
Cover image for Software forensics : collecting evidence from the scene of a digital crime
106. 
Cover image for The shellcoder's handbook : discovering and exploiting security holes
127. 
Cover image for Safe and secure : secure your home network and protect your privacy online
134. 
Cover image for Anti-hacker tool kit
152. 
Cover image for Computer forensics and privacy
161. 
Cover image for Protecting business information : a manager's guide
163. 
Cover image for Protection and security on the information superhighway
164. 
165. 
174. 
Cover image for Information security fundamentals
214. 
Cover image for Information Security Governance : Framework and Toolset for CISOs and Decision Makers
Go to:Search Results
|
Top of Page
|
Search Facets