Computer networks -- Security measures
Resource Information
The concept Computer networks -- Security measures represents the subject, aboutness, idea or notion of resources found in Austin Public Library.
The Resource
Computer networks -- Security measures
Resource Information
The concept Computer networks -- Security measures represents the subject, aboutness, idea or notion of resources found in Austin Public Library.
- Label
- Computer networks -- Security measures
58 Items that share the Concept Computer networks -- Security measures
Context
Context of Computer networks -- Security measuresSubject of
No resources found
No enriched resources found
- Zero trust networks : building secure systems in untrusted networks
- 10 don'ts on your digital devices : the non-techie's survival guide to cyber security and privacy
- AWS : security best practices on AWS : delve deep into various security aspects of AWS to build and maintain a secured environment
- Advances in network and distributed systems security : IFIP TC11 WG11.4 First Annual Working Conference on Network Security : November 26-27, 2001, Leuven, Belgium
- CSIDS
- Cisco security architectures
- Client-side attacks and defense
- Cloud security
- Computer security : protecting digital resources
- Container security : fundamental technology concepts that protect containerized applications
- Crafting the InfoSec playbook : security monitoring and incident response master plan
- Current security management & ethical issues of information technology
- Cyber threat! : how to manage the growing risk of cyber attacks
- Cybersecurity
- Cybersecurity
- trueCybersecurity and cyberwar : what everyone needs to know
- Cybersecurity essentials
- Cybersecurity today and tomorrow : pay now or pay later
- trueCyberspies : the secret history of surveillance, hacking, and digital espionage
- Defending the digital frontier : a security agenda
- Designing security for a Windows server 2003 network
- Ethereal : packet sniffing
- Hack attacks denied : a complete guide to network lockdown
- Hack attacks revealed : a complete reference with custom security hacking toolkit
- Hacking
- Hacking for dummies
- Hacking the code : ASP.NET web application security
- Hadoop security
- How cybersecurity really works : a hands-on guide for total beginners
- IBM mainframe security : beyond the basics : a practical guide from a z/OS and RACF perspective
- Learning Kali Linux : security testing, penetration testing, and ethical hacking
- Managing and securing a Cisco structured wireless-aware network
- NT & virtual private networks seminar : participant's guide
- Network security : a beginner's guide
- Network security : a beginner's guide
- Network security illustrated
- Network security through data analysis : building situational awareness
- Practical cloud security : a guide for secure design and deployment
- Practical guide for implementing secure intranets and extranets
- Protocol : how control exists after decentralization
- Rise of the hackers
- SQL injection attacks and defense
- Securing Web services with WS-Security : demystifying WS-Security, WS-Policy, SAML, XML Signature, and XML Encryption
- Security awareness
- Security sage's guide to hardening the network infrastructure
- trueThe Director : a novel
- The Internet under crisis conditions : learning from September 11
- The art of memory forensics : detecting malware and threats in Windows, Linux, and Mac memory
- The basics of IT audit : purposes, processes, and practical information
- trueThe fifth domain : defending our country, our companies, and ourselves in the age of cyber threats
- The international handbook of computer security
- The privacy engineer's manifesto : getting from policy to code to QA to value
- The tangled Web : a guide to securing modern Web applications
- Through the wormhole with Morgan Freeman, How to collapse a superpower
- Trust in cyberspace
- Using the Internet safely for seniors for dummies
- Web commerce security : design and development
- Windows Server 2012 R2 inside out : services, security, & infrastructure
Embed
Settings
Select options that apply then copy and paste the RDF/HTML data fragment to include in your application
Embed this data in a secure (HTTPS) page:
Layout options:
Include data citation:
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.library.austintexas.gov/resource/qdAeOJotAFA/" typeof="CategoryCode http://bibfra.me/vocab/lite/Concept"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.library.austintexas.gov/resource/qdAeOJotAFA/">Computer networks -- Security measures</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.library.austintexas.gov/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="https://link.library.austintexas.gov/">Austin Public Library</a></span></span></span></span></div>
Note: Adjust the width and height settings defined in the RDF/HTML code fragment to best match your requirements
Preview
Cite Data - Experimental
Data Citation of the Concept Computer networks -- Security measures
Copy and paste the following RDF/HTML data fragment to cite this resource
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.library.austintexas.gov/resource/qdAeOJotAFA/" typeof="CategoryCode http://bibfra.me/vocab/lite/Concept"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.library.austintexas.gov/resource/qdAeOJotAFA/">Computer networks -- Security measures</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.library.austintexas.gov/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="https://link.library.austintexas.gov/">Austin Public Library</a></span></span></span></span></div>