Computer and information security
This comprehensive book provides a global overview of computer and information security. It offers an in-depth analysis of theories, technology and applications of this field. This book focuses on the emerging topic of security informatics. It brings forth some innovative research applications and r...
Saved in:
| Other Authors: | Coon, Audrey (Editor) |
|---|---|
| Format: | Book |
| Language: | English |
| Published: |
New York
Willford Press
2016
|
| Subjects: | |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
Information security the complete reference
by: Rhodes-Ousley, Mark
Published: (2013)
by: Rhodes-Ousley, Mark
Published: (2013)
Computer security principles and practice
by: Stallings, William, et al.
Published: (2018)
by: Stallings, William, et al.
Published: (2018)
Computer Security Fundamentals
by: Easttom, Chuck
Published: (2020)
by: Easttom, Chuck
Published: (2020)
Computer and cyber security principles, algorithm, applications, and perspectives
Published: (2019)
Published: (2019)
Security management in mobile cloud computing
Published: (2017)
Published: (2017)
Principles of information systems security text and cases
by: Dhillon, Gurpreet 1963-
Published: (2017)
by: Dhillon, Gurpreet 1963-
Published: (2017)
Corporate computer security
by: Boyle, Randall, et al.
Published: (2015)
by: Boyle, Randall, et al.
Published: (2015)
Corporate computer and network security
by: Panko lhRaymond R
by: Panko lhRaymond R
Managing information security
Published: (2014)
Published: (2014)
Guide to network security
by: Whitman, Michael E., et al.
Published: (2013)
by: Whitman, Michael E., et al.
Published: (2013)
Securing client/server computer networks
by: Davis
Published: (1996)
by: Davis
Published: (1996)
Information security governance
by: Von Solms, Sebastiaan H., et al.
Published: (2009)
by: Von Solms, Sebastiaan H., et al.
Published: (2009)
Computer and information security handbook
Published: (2009)
Published: (2009)
Computer and information security handbook
Published: (2013)
Published: (2013)
Information security a practical approach
by: Bhaskar
Published: (2008)
by: Bhaskar
Published: (2008)
Principles of information security
by: Whitman, Michael E., et al.
Published: (2016)
by: Whitman, Michael E., et al.
Published: (2016)
Principles of information security
by: Whitman, Michael E., et al.
Published: (2022)
by: Whitman, Michael E., et al.
Published: (2022)
Computer security principles and practice
by: Stallings, William
Published: (2008)
by: Stallings, William
Published: (2008)
Computer Security Fundamentals /
by: Easttom, Chuck
Published: (2023)
by: Easttom, Chuck
Published: (2023)
Information security and IT risk management
by: Agrawal, Manish
Published: (2014)
by: Agrawal, Manish
Published: (2014)
Introduction to information security a strategic-based approach
by: Shimeall, Timothy
Published: (2014)
by: Shimeall, Timothy
Published: (2014)
Principles of information security
by: Whitman, Michael E., et al.
Published: (2012)
by: Whitman, Michael E., et al.
Published: (2012)
Principles of information security
by: Whitman, Michael E. 1964-, et al.
Published: (2009)
by: Whitman, Michael E. 1964-, et al.
Published: (2009)
Computer Security principles and practice
by: Stallings, William, et al.
Published: (2018)
by: Stallings, William, et al.
Published: (2018)
Principles of information systems security text and cases
by: Dhillon 1963-
Published: (2007)
by: Dhillon 1963-
Published: (2007)
Information protection playbook
Published: (2013)
Published: (2013)
Spillage of information threats to Malaysia security
by: Mohd. Zaily Hatta Mohd. Jelani
by: Mohd. Zaily Hatta Mohd. Jelani
Management of information security
by: Whitman, Michael E. 1964-, et al.
Published: (2019)
by: Whitman, Michael E. 1964-, et al.
Published: (2019)
Information security evaluation a holistic approach
by: Tashi, Igli
Published: (2011)
by: Tashi, Igli
Published: (2011)
Essential cybersecurity science build, test, and evaluate secure systems
by: Dykstra, Josiah
Published: (2015)
by: Dykstra, Josiah
Published: (2015)
The NCSA guide to PC and LAN security
by: Cobb
Published: (1996)
by: Cobb
Published: (1996)
Cyber security and IT infrastructure protection
Published: (2014)
Published: (2014)
Computer communications security
by: Ford lhWarwick
by: Ford lhWarwick
Computer security and penetration testing
by: Basta, Alfred
Published: (2008)
by: Basta, Alfred
Published: (2008)
INTRODUCTION TO Computer and Network Security : NAVIGATING SHADES OF GRAY /
by: Brooks, Richard R.
Published: (2014)
by: Brooks, Richard R.
Published: (2014)
Hardening network infrastructure
by: Noonan, Wesley J.
Published: (2004)
by: Noonan, Wesley J.
Published: (2004)
Practical cloud security a guide for secure design and deployment
by: Dotson, Chris
Published: (2019)
by: Dotson, Chris
Published: (2019)
Defensive security handbook best practices for securing infrastructure
by: Brotherston, Lee, et al.
Published: (2017)
by: Brotherston, Lee, et al.
Published: (2017)
Cybersecurity, attack and defense strategies infrastructure security with Red Team and Blue Team tactics
by: Diogenes, Yuri, et al.
Published: (2018)
by: Diogenes, Yuri, et al.
Published: (2018)
Secure computer and network systems modeling, analysis and design
by: Ye
Published: (2008)
by: Ye
Published: (2008)
Similar Items
-
Information security the complete reference
by: Rhodes-Ousley, Mark
Published: (2013) -
Computer security principles and practice
by: Stallings, William, et al.
Published: (2018) -
Computer Security Fundamentals
by: Easttom, Chuck
Published: (2020) -
Computer and cyber security principles, algorithm, applications, and perspectives
Published: (2019) -
Security management in mobile cloud computing
Published: (2017)


