Computer security
Resource Information
The concept Computer security represents the subject, aboutness, idea or notion of resources found in University of San Diego Libraries.
The Resource
Computer security
Resource Information
The concept Computer security represents the subject, aboutness, idea or notion of resources found in University of San Diego Libraries.
- Label
- Computer security
537 Items that share the Concept Computer security
Context
Context of Computer securitySubject of
No resources found
No enriched resources found
- A Global Perspective on Cyber Threats
- A multidisciplinary introduction to information security
- A process for developing a common vocabulary in the information security area
- Adaptive security management architecture
- Advances in artificial intelligence for privacy protection and security
- Aggressive network self-defense
- An introduction to cyber modeling and simulation
- An introduction to information security and ISO27001:2013 : a pocket guide
- An introduction to security in a CSM 1.3 for AIX 5L environment
- Analysis, design, and implementation of secure and interoperable distributed health information systems
- Application security in the ISO 27001:2013 environment
- Application security in the ISO 27001:2013 environment
- Applications of secure multiparty computation
- Applied cryptography : protocols, algorithms, and source code in C
- Artificial immune system : applications in computer security
- Asia : The Cyber Security Battleground
- Assessing information security : strategies, tactics, logic and framework
- Assessing information security : strategies, tactics, logic and framework
- Automated software diversity
- Basics of contemporary cryptography for IT practitioners
- Bent functions : results and applications to cryptography
- Best damn firewall book period
- Best practices in computer network defense : incident detection and response
- Best truth : intelligence in the Information Age
- Beyond cybersecurity : protecting your digital business
- BigNum math : implementing cryptographic multiple precision arithmetic
- Biohackers : the politics of open science
- Biohackers : the politics of open science
- Black hat Python : Python programming for hackers and pentesters
- Black hat physical device security : exploiting hardware and software
- Bluetooth security
- Border Searches of Laptop Computers and Other Electronic Storage Devices
- Briefing on Healthcare.gov Security Issues
- Buffer overflow attacks : detect, exploit, prevent
- Building a HIPAA-compliant cybersecurity program : using NIST 800-30 and CSF to secure protected health information
- Bureau of the Public Debt : Areas for Improvement in Information Security Controls
- Business continuity : IT risk management for international corporations
- CDM : Government Perspectives on Security and Modernization
- CRS Issue Statement on Privacy and Data Security
- Chaotic secure communication : principles and technologies
- Check Point NG : next generation security administration
- Chinese Hacking : Impact on Human Rights and Commercial Rule of Law
- Chinese cybersecurity and defense
- Citrix Access Gateway VPX 5.04 essentials : a practical step-by-step guide to provide secure remote access using the Citrix Access Gateway VPX
- Click, click, who's there? : a family-based non-technical approach to help parents protect their children online
- Cloud Security and Governance : Who's on your cloud?
- Cloud management and security
- Cloud security : a comprehensive guide to secure cloud computing
- Combating spyware in the enterprise
- Computer Crime and Security
- Computer Forensics jumpstart
- Computer Security : An Overview of National Concerns and Challenges
- Computer Security : Selected References, 1978-1983
- Computer and information security handbook
- Computer auditing, security, and internal control manual
- Computer crime : computer security techniques
- Computer forensics : a pocket guide
- Computer forensics for dummies
- Computer forensics with FTK : enhance your computer forensics knowledge through illustrations, tips, tricks, and practical real-world scenarios
- Computer security : awareness for the home
- Computer security update
- Computers at risk : safe computing in the information age
- Computers, ethics, and society
- Configuring ISA server 2000 : building firewalls for windows 2000
- Configuring Symantec Antivirus, Corporate Edition
- Contemporary cryptography
- Controles estratégicos y operacionales de la TI
- Convergence : illicit networks and national security in the age of globalization
- Convergence : illicit networks and national security in the age of globalization
- Core software security : security at the source
- Crackproof your software : the best ways to protect your software against crackers
- Crackproof your software : the best ways to protect your software against crackers
- Crimeware : understanding new attacks and defenses
- Critical Infrastructure : Control Systems and the Terrorist Threat
- Critical Infrastructure Protection : Efforts of the Financial Services Sector To Address Cyber Threats
- Critical Infrastructure Protection : Key Private and Public Cyber Expectations Need To Be Consistently Addressed
- Critical Infrastructure Remote Control System and the Terrorist Threat
- Critical Infrastructures : Background, Policy, and Implementation
- Critical Infrastructures : Background, Policy, and Implementation
- Critical Infrastructures : Background, Policy, and Implementation
- Critical infrastructure protection against hybrid warfare security related challenges
- Crypto : how the code rebels beat the government--saving privacy in the digital age
- Cryptographic security architecture : design and verification
- Cryptography : an introduction
- Cryptography decrypted
- Cyber Operations in DOD Policy and Plans : Issues for Congress
- Cyber Threats and Security Solutions
- Cyber Threats from China, Russia, and Iran : Protecting American Critical Infrastructure
- Cyber adversary characterization : auditing the hacker mind
- Cyber attack : the inside story
- Cyber blockades
- Cyber blockades
- Cyber essentials : a pocket guide
- Cyber resilience
- Cyber security : essential principles to secure your organisation
- Cyber security and IT infrastructure protection
- Cyber security for educational leaders : a guide to understanding and implementing technology policies
- Cyber security in parallel and distributed computing : concepts, techniques, applications and case studies
- Cyber smart : five habits to protect your family, money, and identity from cyber criminals
- Cyber spying : tracking your family's (sometimes) secret online lives
- Cyber threat! : how to manage the growing risk of cyber attacks
- Cyber threat! : how to manage the growing risk of cyber attacks
- Cyberattacks on Target and Other Retailers
- Cybercrime : A Sketch of 18 U.S.C. 1030 and Related Federal Criminal Laws
- Cybercrime : An Overview of the Federal Computer Fraud and Abuse Statute and Related Federal Criminal Laws
- Cybercrime : Conceptual Issues for Congress and U.S. Law Enforcement
- Cybercrime : The Council of Europe Convention
- Cybersecurity
- Cybersecurity : Authoritative Reports and Resources
- Cybersecurity : Authoritative Reports and Resources, by Topic
- Cybersecurity : Authoritative Reports and Resources, by Topic
- Cybersecurity : CRS Experts
- Cybersecurity : Current Legislation, Executive Branch Initiatives, and Options for Congress
- Cybersecurity : Cyber Crime Protection Security Act (S. 2111)-A Legal Analysis
- Cybersecurity : Cyber Crime Protection Security Act (S. 2111, 112th Congress)-A Legal Analysis
- Cybersecurity : Data, Statistics, and Glossaries
- Cybersecurity : Data, Statistics, and Glossaries
- Cybersecurity : Data, Statistics, and Glossaries
- Cybersecurity : FISMA Reform
- Cybersecurity : Key Challenges Need To Be Addressed To Improve Research and Development
- Cybersecurity : Legislation, Hearings, and Executive Branch Documents
- Cybersecurity : Legislation, Hearings, and Executive Branch Documents
- Cybersecurity : Selected Legal Issues
- Cybersecurity : Selected Legal Issues
- Cybersecurity : a self-teaching introduction
- Cybersecurity : current writings on threats and protection
- Cybersecurity : law and regulation
- Cybersecurity : the three-headed Janus
- Cybersecurity Human Capital : Initiatives Need Better Planning and Coordination
- Cybersecurity Issues and Challenges
- Cybersecurity Issues and Challenges : In Brief
- Cybersecurity Issues and Challenges : In Brief
- Cybersecurity Issues for the Bulk Power System
- Cybersecurity and Information Sharing
- Cybersecurity and Information Sharing : Comparison of H.R. 1560 (PCNA and NCPAA) and S. 754 (CISA)
- Cybersecurity and Information Sharing : Comparison of H.R. 1560 and H.R. 1731
- Cybersecurity and Information Sharing : Comparison of H.R. 1560 and H.R. 1731 as Passed by the House
- Cybersecurity and Information Sharing : Comparison of House and Senate Bills in the 114th Congress
- Cybersecurity and Information Sharing : Comparison of Legislative Proposals in the 114th Congress
- Cybersecurity and Information Sharing : Legal Challenges and Solutions
- Cybersecurity and human rights in the age of cyberveillance
- Cybersecurity blue team toolkit
- Cybersecurity for industrial control systems : SCADA, DCS, PLC, HMI, and SIS
- Cybersecurity law : protect yourself and your customers
- Cybersecurity operations handbook
- Cybersecurity today and tomorrow : pay now or pay later
- Cyberspace : United States Faces Challenges in Addressing Global Cybersecurity and Governance
- Cyberspace Policy : Executive Branch Is Making Progress Implementing 2009 Policy Review Recommendations, but Sustained Leadership Is Needed
- Cyberspace and cybersecurity
- Cybersécurité des Installations Industrielles
- Cybersécurité des Installations Industrielles : Chapitre XII Panorama de l'offre Technologique Pour la Cybersécurité Industrielle
- Cybersécurité des Installations Industrielles, Chapter V, Des bus de terrain a l'Industrial Ethernet
- Cybersécurité des installations industrielles : défendre ses systèmes numériques
- Cybersécurité des installations industrielles : défendre ses systèmes numériques, Chapitre I, Mythes et réalités de la cybersécurité des systèmes numériques industriels
- Cybersécurité des installations industrielles : défendre ses systèmes numériques, Chapitre II, Typologie des installations industrielles
- Cybersécurité des installations industrielles : défendre ses systèmes numériques, Chapitre X, Sécurité des Réseaux Industriels étendus
- Cybersécurité des installations industrielles : défendre ses systèmes numériques, Chapitre XIII, État des Lieux des Référentiels en Sécurité des Systèmes Numériques Industriels
- Cybersécurité des installations industrielles : défendre ses systèmes numériques, Chapitre XIV, Réglementation de la Cybersécurité et Régime Juridique des Systèmes Numériques Industriels : une étude des Dispositions Réglementaires en Cybersécurité en France et Aux États-Unis
- Cybersécurité des installations industrielles : défendre ses systèmes numériques, Chapter IV, Malveillance numérique sur les systèmes industriels : histoire de la menace, événements emblématiques, tendances et perspectives
- Cybersécurité des installations industrielles : défendre ses systèmes numériques, Chapter VI, Analyse des risques
- Cybersécurité et RGPD : protégez votre PME : guide pratique pour sécuriser votre système informatique et vous conformer au RGPD
- Cyberwar, cyberterror, cybercrime and cyberactivism : an in-depth guide to the role of standards in cybersecurity environment
- DHS Cybersecurity : Roles and Responsibilities To Protect the Nation's Critical Infrastructure
- DNS security management
- Data Brokers : Background and Industry Overview
- Data Protection and the Cloud - Are You Really Managing the Risks? : Second Edition
- Data Security : Protecting the Privacy of Phone Records
- Data Security Breach Notification Laws
- Data Security Breaches : Context and Incident Summaries
- Data breach aftermath and recovery for individuals and institutions : proceedings of a workshop
- Data mining tools for malware detection
- Data privacy in the information age
- Data protection and the cloud : are the risks too great?
- Data protection and the cloud : are the risks too great?
- Data protection and the cloud-are you really managing the risks?
- Data visualization, Part 2
- Data-driven security : analysis, visualization and dashboards
- Datennutzungs- und datenschutzverträge : muster, klauseln, erläuterungen
- Dear hacker : letters to the editor of 2600
- Debit Cards : Background and Public Policy Issues
- Defense Department Cyber Efforts : DOD Faces Challenges in Its Cyber Activities
- Defense against the black arts : how hackers do what they do and how to protect against it
- Defense and detection strategies against Internet worms
- Department of Veterans Affairs : Information Security and Information Technology Management Reorganization
- Designing and building a security operations center
- Detection and intelligent systems for homeland security.
- Developer's guide to web application security
- Developing secure distributed systems with CORBA
- Digital privacy in the marketplace : perspectives on the information exchange
- Digital watermarking and steganography
- Dissecting the hack : the V3rb0ten network
- Distributed systems security : issues, processes, and solutions
- Dr. Tom Shinder's configuring ISA Server 2004
- E-mail Security : a Pocket Guide
- E-policy : how to develop computer, E-policy, and Internet guidelines to protect your company and its assets
- EU-U.S. "Safe Harbor" Agreement on Personal Data Privacy
- Economic Espionage Act of 1996
- Electronic commerce : current research issues and applications
- Empirical research for software security : foundations and experience
- Encryption and Evolving Technology : Implications for U.S. Law Enforcement Investigations
- Enemy at the water cooler : real-life stories of insider threats and Enterprise Security Management countermeasures
- Enforcement of the HIPAA Privacy and Security Rules
- Engineering information security : the application of systems engineering concepts to achieve information assurance
- Engineering secure and dependable software systems
- Enterprise information security and privacy
- Enterprise security : a data-centric approach to securing the enterprise : a guide to applying data-centric security concepts for securing enterprise data to enable an agile enterprise
- Essential computer security : everyone's guide to e-mail, internet, and wireless security
- Essential skills for hackers
- Ethereal : packet sniffing
- Facilitating Cyber Threat Information Sharing and Partnering with the Private Sector To Protect Critical Infrastructure : An Assessment of DHS Capabilities
- Federal Chief Technology Officer in the Obama Administration : Options and Issues for Consideration
- Federal Laws Relating to Cybersecurity : Discussion of Proposed Revisions
- Federal Laws Relating to Cybersecurity : Discussion of Proposed Revisions
- Federal Laws Relating to Cybersecurity : Overview and Discussion of Proposed Revisions
- Federal Laws Relating to Cybersecurity : Overview of Major Issues, Current Laws, and Proposed Legislation
- Federal Reserve Banks : Areas for Improvement in Computer Controls
- Federal Reserve Banks : Areas for Improvement in Information Security Controls
- Federated identity management and web services security with IBM tivoli security solutions
- File-Sharing Software and Copyright Infringement : Metro-Goldwyn-Mayer Studios, Incorporated V. Grokster, Limited
- Finding and fixing vulnerabilities in information systems : the vulnerability assessment & mitigation methodology
- Formal models and techniques for analyzing security protocols
- Future crimes : everything is connected, everyone is vulnerable and what we can do about it
- Fuzzing for software security testing and quality assurance
- Geekonomics : the real cost of insecure software
- Getting started with Citrix XenApp 6.5 : design and implement Citrix farms based on XenApp 6.5
- Getting started with FortiGate
- GlassFish security : secure your GlassFish installation, web applications, EJB applications, application client module, and web services using Java EE and GlassFish security measures
- Google Hacking for Penetration Testers
- Gray hat Python : Python programming for hackers and reverse engineers
- Gray hat Python : Python programming for hackers and reverse engineers
- Group policy : fundamentals, security, and the managed desktop
- Group policy : fundamentals, security, and the managed desktop
- H.R. 174, the "Homeland Security Cyber and Physical Infrastructure Protection Act of 2011," as Introduced by Rep. Thompson (D-MS) : One Page Summary
- Hack proofing ColdFusion
- Hack proofing Linux: a guide to open source security : the only way to stop a hacker is to think like one
- Hack proofing Sun Solaris 8
- Hack proofing Windows 2000
- Hack proofing XML
- Hack proofing your Web applications : the only way to stop a hacker is to think like one
- Hack proofing your e-commerce site : the only way to stop a hacker is to think like one
- Hacking : the art of exploitation
- Hacking : the art of exploitation
- Hacking : the art of exploitation
- Hacking : the art of exploitation
- Hacking for dummies
- Hacking point of sale : payment application secrets, threats, and solutions
- Hacking the code : ASP. NET web application security
- Hacking the hacker
- Hacking web apps : detecting and preventing web application security problems
- Hashing in computer science : fifty years of slicing and dicing
- Hearing : Cyber Security: Protecting Your Small Business
- Hearing on "Cybersecurity: An Overview of Threats to Critical Infrastructure"
- Hearing on "Protecting the Electric Grid: H.R.__, the Grid Reliability and Infrastructure Defense Act"
- Hearing on "Sony and Epsilon: Lessons for Data Security Legislation"
- Hearing on "The Threat of Data Theft to American Consumers"
- Hearing on Discussion Draft of H.R. __, a Bill To Require Greater Protection for Sensitive Consumer Data and Timely Notification in Case of Breach
- Host integrity monitoring : using Osiris and Samhain
- How Technology fails us, and what we can do about it
- How cyber security can protect your business : a guide for all stakeholders
- How to cheat at designing security for a Windows Server 2003 network
- IBM eserver zSeries 990 (z990) cryptography implementation
- IBM i security administration and compliance
- IBM mainframe security beyond the basics : a practical guide from a z/OS and RACF perspective
- IBM rational application developer V6 portlet application development and portal tools
- ISO27001 / ISO27002 : a pocket guide
- IT Governance to Drive High Performance : Lessons from Accenture
- IT audit, control, and security
- IT induction and information security awareness : a pocket guide
- IT-Sicherheitsanalysen : Ein prozessorientiertes Vorgehensmodell
- Identity Theft : Trends and Issues
- Identity Theft : Trends and Issues
- Identity Theft Laws : State Penalties and Remedies and Pending Federal Bills
- Identity management : concepts, technologies, and systems
- Implementing NetScaler VPX : leverage the features of NetScaler VPX to optimize and deploy responsive web services and applications on multiple virtualization platforms
- Implementing database security and auditing
- InfoSec career hacking : sell your skillz, not your soul
- Information : getting, protecting and using data
- Information : getting, protecting and using data
- Information Brokers : Federal and State Laws
- Information Security : Additional Actions Needed To Fully Implement Reform Legislation
- Information Security : Agencies Need To Implement Federal Desktop Core Configuration Requirements
- Information Security : Agency Responses to Breaches of Personally Identifiable Information Need To Be More Consistent
- Information Security : Concerted Effort Needed To Consolidate and Secure Internet Connections at Federal Agencies
- Information Security : Federal Deposit Insurance Corporation Has Made Progress, but Further Actions Are Needed To Protect Financial Data
- Information Security : Federal Deposit Insurance Corporation Needs To Mitigate Control Weaknesses
- Information Security : Federal Guidance Needed To Address Control Issues with Implementing Cloud Computing
- Information Security : Federal Reserve Needs To Address Treasury Auction Systems
- Information Security : Federal Reserve Needs To Address Treasury Auction Systems
- Information Security : IRS Needs to Continue To Address Significant Weaknesses
- Information Security : National Archives and Records Administration Needs To Implement Key Program Elements and Controls
- Information Security : Opportunities Exist for the Federal Housing Finance Agency To Improve Controls
- Information Security : Progress Made on Harmonizing Policies and Guidance for National Security and Non-National Security Systems
- Information Security : State Has Taken Steps To Implement a Continuous Monitoring Application, but Key Challenges Remainches
- Information Security : Subcommittee Post-Hearing Questions Concerning the Additional Actions Needed To Implement Reform Legislation
- Information assurance : dependability and security in networked systems
- Information assurance and computer security
- Information management & computer security, Volume 15, Number 5, Papers from the HAISA 2007 Symposium
- Information security
- Information security : a manager's guide to thwarting data thieves and hackers
- Information security : policy, processes, and practices
- Information security analytics : finding security insights, patterns and anomalies in big data
- Information security breaches : avoidance treatment based on ISO27001
- Information security risk management for ISO 27001/ISO 27002
- Information warfare : cyberterrorism-- protecting your personal security in the electronic age
- Infosec management fundamentals
- Innocent code : a security wake-up call for Web programmers
- Insider threat : protecting the enterprise from sabotage, spying, and theft
- Instant Java password and authentication security
- Intelligent watermarking techniques
- International Terrorism and Transnational Crime : Security Threats, U.S. Policy, and Considerations for Congress
- Internet Voting : Issues and Legislation
- Internet security : hearing before the Subcommittee on Science of the Committee on Science, Space, and Technology, U.S. House of Representatives, One Hundred Third Congress, second session, March 22, 1994
- Internet security : hearing before the Subcommittee on Science of the Committee on Science, Space, and Technology, U.S. House of Representatives, One Hundred Third Congress, second session, March 22, 1994
- Internet security : hearing before the Subcommittee on Science of the Committee on Science, Space, and Technology, U.S. House of Representatives, One Hundred Third Congress, secondsession, March 22, 1994
- Introduction to cryptography with open-source software
- Intrusion detection : a machine learning approach
- Intrusion prevention and active response : deploying network and host IPS
- Investigating and Prosecuting 21st Century Cyber Threats
- Investigative computer forensics : the practical guide for lawyers, accountants, investigators, and business executives
- Kali Linux CTF Blueprints : build, test, and customize your own Capture the Flag challenges across multiple platforms designed to be attacked with Kali Linux
- Kali Linux network scanning cookbook : over 90 hands-on recipes explaining how to leverage custom scripts and integrated tools in Kali Linux to effectively master network scanning
- Kali Linux wireless penetration testing : beginner's guide : master wireless testing techniques to survey and attack wireless networks with Kali Linux, including the KRACK attack
- Key Issues Raised in Hearings on Computers and Communications
- Learning malware analysis : explore the concepts, tools, and techniques to analyze and investigate Windows malware
- Least privilege security for Windows 7, Vista, And XP : secure desktops for regulatory compliance and business agility
- Legislation to Facilitate Cybersecurity Information Sharing : Economic Analysis
- Linux and UNIX security portable reference
- Linux on IBM e-server zSeries and S/390 : best security practices
- Linux server security : hack and defend
- Linux system security : an administrator's guide to open source security tools
- Logics and languages for reliability and security
- MCSE designing security for a Windows Server 2003 network : exam 70-298 : study guide & DVD training system
- Mac security bible
- Majority Memorandum for October 13, 2011, Subcommittee Hearing
- Managing Information Security Breaches : Studies from Real Life
- Managing information security breaches : studies from real life
- Maximum Linux security : a hacker's guide to protecting your Linux server and workstation
- Meeting people via WiFi and Bluetooth
- Meeting security challenges through data analytics and decision support
- Microsoft Forefront Identity Manager 2010 R2 handbook
- Microsoft Forefront UAG 2010 administrator's handbook : take full command of Microsoft Forefront Unified Access Gateway to secure your business applications and provide dynamic remote access with DirectAccess
- Microsoft SQL Server 2012 security cookbook
- Microsoft Vista for IT security professionals
- Microsoft Windows security inside out for Windows XP and Windows 2000
- Microsoft windows security fundamentals
- Mission-critical network planning
- Multilevel security and DB2 row-level security revealed
- Multimedia security technologies for digital rights management
- NATO Summit at Bucharest, 2008
- NIST cybersecurity framework : a pocket guide
- NIST cybersecurity framework : a pocket guide
- National Security Agency : Computer-Communication Security Issues
- Nessus, Snort, & Ethereal power tools : customizing open source security applications
- Network Centric Operations : Background and Oversight Issues for Congress
- Network attacks & exploitation : a framework
- Network interdiction and stochastic integer programming
- Network intrusion detection : an analyst's handbook
- Network security : a practical guide
- Network security evaluation : using the NSA IEM
- Network security foundations
- Nine steps to succes : an ISO 27001: 2013 implementation overview
- Nine steps to success : an ISO27001:2013 implementation overview
- Nmap 6 : network exploration and security auditing cookbook ; a complete guide to mastering Nmap 6 and its scripting engine, covering practical tasks for penetration testers and system administrators
- North Korea : Back on the State Sponsors of Terrorism List?
- OAuth 2.0 identity and access management patterns
- Obamacare Exchange Opens Door to Identity Theft, : Republican Health Care Policy
- Open-Source Software and Cybersecurity : The Heartbleed Bug
- Operating system security
- Optical and digital techniques for information security
- Oracle 11g anti-hacker's cookbook
- Oracle Identity and Access Manager 11g for administrators : administer Oracle Identity and Access Management: installation, configuration, and day-to-day tasks
- Overview of Constitutional Challenges to NSA Collection Activities
- Overview of Constitutional Challenges to NSA Collection Activities and Recent Developments
- PCI DSS : a pocket guide
- PCI DSS : a pocket guide
- Papers from the first European workshop on technological & security issues in digital rights management (EuDiRights)
- Part-themed issue on internet security
- Penetration tester's open source toolkit.
- Perfect passwords : selection, protection, authentication
- Physically unclonable functions (PUFs) : applications, models, and future directions
- Pipeline Cybersecurity : Federal Policy
- Practical embedded security : building secure resource-constrained systems
- Practical malware analysis : the hands-on guide to dissecting malicious software
- Pragmatic security metrics : applying metametrics to information security
- President Obama Announces Changes to NSA Telephony Metadata Program
- Principles of information security
- Privacy : Information Technology Implications
- Privacy and Health Insurance Exchanges
- Privacy and Security Provisions for Health Information in the American Recovery and Reinvestment Act of 2009
- Privacy protection and computer forensics
- Professional Cocoa application security
- Programmer's ultimate security deskref
- Protecting critical infrastructures against cyber-attack
- Protecting your library's digital sources : the essential guide to planning and preservation
- Protection and security on the information superhighway
- Putting the latest z/OS security features to work
- Reform of the Foreign Intelligence Surveillance Courts : A Brief Overview
- Relation based access control
- Rethinking public key infrastructures and digital certificates : building in privacy
- Reversing : secrets of reverse engineering
- Risk factors in computer-crime victimization
- Risk management for computer security : Protecting your network and information assets
- Rockefeller-Snowe Cybersecurity Act : Substitute Amendment for S. 773
- Role-based access control
- Role-based access control
- SELINUX : NSA's open source security enhanced Linux
- SQL injection attacks and defense
- SSCP : study guide and & DVD training system
- Safeguarding critical e-documents : implementing a program for securing confidential information assets
- Safeguarding taxpayer information : an evaluation of the proposed computerized tax administration system, Office of Education, Department of Health, Education and Welfare : report to the Congress
- Safety management for software-based equipment
- Safety of computer architectures
- Secrets and lies : digital security in a networked world
- Secure and resilient software development
- Secure communications : briefing before the Committee on Science, Subcommittee on Technology, U.S. House of Representatives, One Hundred Fifth Congress, first session, February 11, 1997
- Secure communications : hearing before the Subcommittee on Technology of the Committee on Science, U.S. House of Representatives, One Hundred Fifth Congress, first session, February 11, 1997
- Secure communications : hearing before the Subcommittee on Technology of the Committee on Science, U.S. House of Representatives, One Hundred Fifth Congress, first session, February 11, 1997
- Secure computer and network systems : modeling, analysis and design
- Secure computing : threats and safeguards
- Secure electronic commerce : building the infrastructure for digital signatures and encryption
- Secure programming cookbook for C and C++
- Securing HP NonStop servers in an open systems world : TCP/IP, OSS & SQL
- Securing IM and P2P applications for the enterprise
- Securing WebLogic Server 12c : learn to develop, administer, and troubleshot your WebLogic Server
- Securing cloud services : a pragmatic approach to security architecture in the cloud
- Securing information and communications systems : principles, technologies, and applications
- Securing social media in the enterprise
- Securing the cloud : cloud computer security techniques and tactics
- Security 2020 : reduce security risks this decade
- Security : secrets, intruders and ID tags
- Security and control in information systems : a guide for business and accounting
- Security and control in information systems : a guide for business and accounting
- Security and privacy for e-business
- Security and privacy in the digital era, Volume 1
- Security and privacy in the internet of things : challenges and solutions
- Security convergence : managing enterprise security risk
- Security data visualization : graphical techniques for network analysis
- Security in distributed, grid, mobile, and pervasive computing
- Security in fixed and wireless networks
- Security in the digital world : for the home user, parent, consumer and home office
- Security in the digital world : for the home user, parent, consumer and home office
- Security intelligence : a practitioner's guide to solving enterprise security challenges
- Security issues of IT outsourcing
- Security risk management : building an information security risk management program from the ground up
- Security sage's guide to hardening the network infrastructure
- Security technologies for the World Wide Web
- Security testing handbook for banking applications
- Security transformation : digital defense strategies to protect your company's reputation and market share
- Selected Federal Data Security Breach Legislation
- Selected papers from Kaspersky Lab's CyberSecurity for the Next Generation Conference 2013
- Selling information security to the board : a primer
- Senate Passes Cybersecurity Information Sharing Bill-What's Next?
- Sicherheit in kommunikationsnetzen
- Silence on the wire : a field guide to passive reconnaissance and indirect attacks
- Silence on the wire : a field guide to passive reconnaissance and indirect attacks
- Smart grid security : innovative solutions for a modernized grid
- Snort 2.0 intrusion detection
- Snort 2.1 intrusion detection
- Social engineering : the art of human hacking
- Social media security : leveraging social networking while mitigating risk
- Sockets, shellcode, porting & coding : reverse engineering exploits and tool coding for security professionals
- Software piracy exposed
- Solving cyber risk : protecting your company and society
- Special issue on internet security
- Spring Security 3 : secure your web applications against malicious intruders with this easy to follow practical guide
- Spring Security 3.1 : secure your web applications from hackers with the step-by-step guide
- Statement of Eric A. Fischer
- Stealing the network : how to own a continent
- Striking the Right Balance : Protecting Our Nation's Critical Infrastructure from Cyber Attack and Ensuring Privacy and Civil Liberties
- Stuxnet Computer Worm : Harbinger of an Emerging Warfare Capability
- Summary of discussions at a planning meeting on cyber-security and the insider threat to classified information
- Techniques and applications of digital watermarking and content protection
- Techno security's guide to e-discovery and digital forensics
- Technocrime, policing and surveillance
- Technology and privacy : the new landscape
- Technology and privacy : the new landscape
- Telephone Records and Privacy Protection Act of 2006
- Terrorist Capabilities for Cyberattack : Overview and Policy Issues
- Terrorist capabilities for cyberattack : overview and policy issues
- The 2013 Cybersecurity Executive Order : Overview and Considerations for Congress
- The 2013 Cybersecurity Executive Order : Overview and Considerations for Congress
- The 2013 Cybersecurity Executive Order : Overview and Considerations for Congress
- The Cloud : understanding the security, privacy and trust challenges
- The EU-U.S. Safe Harbor Agreement on Personal Data Privacy : In Brief
- The Federal Trade Commission's Regulation of Data Security Under Its Unfair or Deceptive Acts or Practices (UDAP) Authority
- The Shift to Digital Advertising : Industry Trends and Policy Issues for Congress
- The Stuxnet computer worm : harbinger of an emerging warfare capability
- The Target Data Breach : Frequently Asked Questions
- The Target and Other Financial Data Breaches : Frequently Asked Questions
- The United States and Europe : Current Issues
- The architecture of privacy
- The art of memory forensics : detecting malware and threats in Windows, Linux, and Mac Memory
- The basics of IT audit : purposes, processes, and practical information
- The chief information security officer : insights, tools and survival skills
- The complete guide to Internet security
- The complete guide to physical security
- The crypto controversy : a key conflict in the Information Society
- The defendeŕs dilemma : charting a course toward cybersecurity
- The definitive guide to the C&A transformation : the first publication of a comprehensive view of the C&A transformation
- The insider threat : combatting the enemy within
- The law of information conflict : national security law in cyberspace
- The mathematics of secrets : cryptography from Caesar ciphers to digital encryption
- The misuse of information systems : the impact of security countermeasures
- The right of privacy in the computer age
- The tangled Web : a guide to securing modern Web applications
- The web application hacker's handbook : finding and exploiting security flaws
- The web application hacker's handbook : finding and exploiting security flaws
- Theft of Veterans' Personal Information, and Department of Veterans Affairs Information Technology Reorganization : Issues for Congress
- This is how they tell me the world ends : the cyberweapons arms race
- Threat modeling : designing for security
- Toward a safer and more secure cyberspace
- Transformational security awareness : what neuroscientists, storytellers, and marketers can teach us about driving secure behaviors
- Trust and security in collaborative computing
- Trusted platform module basics : using TPM in embedded systems
- U.S.-China Relations : Policy Issues
- Unauthorized Access : The Crisis in Online Privacy and Security
- Understanding bitcoin : cryptography, engineering and economics.
- Understanding security issues
- Usable security : history, themes, and challenges
- User's guide to cryptography and standards
- Using social media for global security
- Veterans Benefits, Health Care, and Information Technology Act of 2006
- Videotex : The Technology, Policy Implications, and Status of an Emerging Industry
- Violent Python : a cookbook for hackers, forensic analysts, penetration testers and security engineers
- WarDriving : drive, detect, defend: a guide to wireless security
- Web application defender's cookbook : battling hackers and protecting users
- Web application security is a stack : how to CYA (Cover Your Apps) completely
- Web application security is a stack : how to CYA (Cover Your Apps) completely
- Web commerce security : design and development
- Welcome to Cyberia : An Internet Overview
- Windows forensic analysis : DVD toolkit,
- Wireshark for security professionals : using wireshark and the metasploit framework
- World of walls : the structure, roles and effectiveness of separation barriers
- Zen and the art of information security
- iSeries Access for Windows V5R2 hot topics : tailored images, application administration, SSL, and Kerberos
- zSeries Trusted Key Entry (TKE) version 4.2 update
- zSeries crypto guide update
Embed
Settings
Select options that apply then copy and paste the RDF/HTML data fragment to include in your application
Embed this data in a secure (HTTPS) page:
Layout options:
Include data citation:
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.sandiego.edu/resource/Lgk5GCZ245E/" typeof="CategoryCode http://bibfra.me/vocab/lite/Concept"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.sandiego.edu/resource/Lgk5GCZ245E/">Computer security</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.sandiego.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.sandiego.edu/">University of San Diego Libraries</a></span></span></span></span></div>
Note: Adjust the width and height settings defined in the RDF/HTML code fragment to best match your requirements
Preview
Cite Data - Experimental
Data Citation of the Concept Computer security
Copy and paste the following RDF/HTML data fragment to cite this resource
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.sandiego.edu/resource/Lgk5GCZ245E/" typeof="CategoryCode http://bibfra.me/vocab/lite/Concept"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.sandiego.edu/resource/Lgk5GCZ245E/">Computer security</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.sandiego.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.sandiego.edu/">University of San Diego Libraries</a></span></span></span></span></div>