COMPUTERS -- Security | General
Resource Information
The concept COMPUTERS -- Security | General represents the subject, aboutness, idea or notion of resources found in San Francisco Public Library.
The Resource
COMPUTERS -- Security | General
Resource Information
The concept COMPUTERS -- Security | General represents the subject, aboutness, idea or notion of resources found in San Francisco Public Library.
- Label
- COMPUTERS -- Security | General
- Source
- bisacsh
410 Items that share the Concept COMPUTERS -- Security | General
Context
Context of COMPUTERS -- Security | GeneralSubject of
No resources found
No enriched resources found
- 10 don'ts on your digital devices : the non-techie's survival guide to cyber security and privacy
- 24 deadly sins of software security : programming flaws and how to fix them
- A bug hunter's diary : a guided tour through the wilds of software security
- AAA and network security for mobile access : radius, diameter, EAP, PKI and IP mobility
- AVIEN malware defense guide for the Enterprise
- Absolute beginner's guide to personal firewalls
- Advanced API security : securing APIs with OAuth 2.0, OpenID Connect, JWS, and JWE
- Advanced penetration testing for highly-secured environments : employee the most advanced pentesting techniques and tools to build highly-secured systems and environments
- Advanced persistent security : a cyberwarfare approach to implementing adaptive enterprise protection, detection, and reaction strategies
- Advanced persistent training : take your security awareness program to the next level
- Aggressive network self-defense
- Agile application security : enabling security in a continuous delivery pipeline
- An introduction to hacking and crimeware : a pocket guide
- Android security cookbook : practical recipes to delve into Android's security mechanisms by troubleshooting common vulnerabilities in applications and Android OS versions
- Anti-hacker tool kit
- Apache : receptury
- Apache cookbook
- Application Security in the ISO27001 Environment
- Applied Oracle security : developing secure database and middleware environments
- Applied cryptography : protocols, algorithms, and source code in C
- Assessing information security : strategies, tactics, logic and framework
- Assessing network security
- Asset attack vectors : building effective vulnerability management strategies to protect organizations
- Asset protection through security awareness
- Auditing cloud computing : a security and privacy guide
- BackTrack 4 : assuring security by penetration testing
- Beautiful security
- Black hat Python : Python programming for hackers and pentesters
- Blackjacking : security threats to Blackberry devices, PDAs, and cell phones in the enterprise
- Blockchain quick start guide : a beginner's guide to developing enterprise-grade decentralized applications
- Botnets : the killer web app
- Build your own security lab : a field guide for network testing
- Building Internet Firewalls : Internet and Web security
- Building an information security awareness program
- Burp Suite essentials : discover the secrets of web application pentesting using Burp Suite, the best tool for the job
- CCNA security study guide
- CEH : certified ethical hacker study guide
- CEH v10 : certified ethical hacker study guide
- CISA : certified information systems auditor study guide
- CISM certified information security manager practice exams
- CISO's guide to penetration testing : a framework to plan, manage, and maximize benefits
- CISSP : Certified Information Systems Security Professional study guide
- CISSP : Certified Information systems Security Professional ; study guide
- CISSP : exam guide
- CISSP cert guide
- CISSP certification : training guide
- CISSP for dummies
- CISSP practice : 2,250 questions, answers, and explanations for passing the test
- CMS security handbook : the comprehensive guide for WordPress, Joomla!, Drupal, and Plone
- CSI
- CWSP : certified wireless security professional official study guide
- Certified ethical hacker
- Certified ethical hacker (CEH) version 9 cert guide
- Check Point NGX R65 security administration
- Cisco router and switch forensics : investigating and analyzing malicious network activity
- Cisco security specialist's guide to PIX firewalls
- Cloud Computing : Assessing the Risks
- Cloud Security and Governance : Who's on your cloud?
- Cloud computing security : foundations and challenges
- Cloud security : a comprehensive guide to secure cloud computing
- Cloud security and privacy
- Coding for penetration testers : building better tools
- Combating spyware in the enterprise
- Communication System Security
- CompTIA CySA+ practice tests : exam CS0-001
- CompTIA PenTest+ Study Guide : Exam PT0-001
- CompTIA Security+ Deluxe study guide
- CompTIA Security+ rapid review (exam SY0-301)
- CompTIA Security+ study guide
- CompTIA security+ deluxe study guide
- CompTIA security+ study guide
- Compliance in der IT-Sicherheit : ISO 2700x-Standard und DSGVO
- Comprehensive guide to 5G security
- Computer and information security handbook
- Computer and information security handbook
- Computer forensics : a pocket guide
- Computer forensics and digital investigation with EnCase Forensic v7
- Computer forensics for dummies
- Computer security and cryptography
- Computer security fundamentals
- Conducting network penetration and espionage in a global environment
- Configuring Check Point NGX VPN-1/FireWall-1
- Configuring SonicWALL firewalls
- Core software security : security at the source
- Cryptography in C and C++
- Cyber Risks for Business Professionals : a Management Guide
- Cyber operations : building, defending, and attacking modern computer networks
- Cyber security engineering : a practical approach for systems and software assurance
- Cyber security on Azure : an IT professionals guide to Microsoft Azure security center
- Cyber security policy guidebook
- Cyber-physical systems : integrated computing and engineering design
- Cybersecurity blue team toolkit
- Cybersecurity for hospitals and healthcare facilities : a guide to detection and prevention
- Cyberwar, cyberterror, cybercrime and cyberactivism : an in-depth guide to the role of standards in cybersecurity environment
- Data center virtualization certification, VCP6.5-DCV exam guide : everything you need to achieve 2V0-622 certification -- with exam tips and exercises
- Data privacy for the smart grid
- Data-Driven Security : Analysis, Visualization and Dashboards
- Defensive security handbook : best practices for securing infrastructure
- Deploying Microsoft Forefront Protection 2010 for Exchange Server
- Deploying Microsoft Forefront Threat Management Gateway 2010
- Deploying Microsoft Forefront Unified Access Gateway 2010
- Designing an IAM framework with Oracle Identity and access management suite
- Developer's guide to web application security
- Developing secure applications with Visual Basic
- Dictionary of information security
- Digital identity
- E-discovery : creating and managing an enterprisewide program : a technical guide to digital investigation and litigation support
- E-mail Security : a Pocket Guide
- Eleventh hour CISSP : study guide
- Eleventh hour network+ : exam N10-004 study guide
- Eleventh hour security+ : exam SYO-201 study guide
- Elsevier's dictionary of information security in English, German, French and Russian
- Emerging trends in ICT security
- Enemy at the water cooler : real-life stories of insider threats and Enterprise Security Management countermeasures
- Enterprise Mac security : MAC OS X Snow Leopard
- Enterprise architecture and information assurance : developing a secure foundation
- Enterprise cybersecurity : how to build a successful cyberdefense program against advanced threats
- Enterprise security : a data-centric approach to securing the enterprise : a guide to applying data-centric security concepts for securing enterprise data to enable an agile enterprise
- Essential PHP security
- Essential cybersecurity science : build, test, and evaluate secure systems
- Ethereal : packet sniffing
- Ethical hacking and penetration testing guide
- Expert Oracle and Java security : programming secure Oracle database applications with Java
- Expert Oracle application express security
- FISMA and the risk management framework : the new practice of federal cyber security
- FISMA certification & accreditation handbook
- Financial cybersecurity risk management : leadership perspectives and guidance for systems and institutions
- Firewall policies and VPN configurations
- Firewalls don't stop dragons : a step-by-step guide to computer security for non-techies
- GFI network security and PCI compliance power tools
- Getting an information security job for dummies
- Getting started with FortiGate : simplify and protect your network using the FortiGate network security applicance
- Getting started with Windows Server Security : develop and implement a secure Microsoft infrastructure platform using native and built-in tools
- Governance of enterprise IT based on COBIT 5 : a management guide
- Gray hat Python : Python programming for hackers and reverse engineers
- Gray hat hacking : the ethical hacker's handbook
- Gray hat hacking : the ethical hacker's handbook
- HP Nonstop server security : a practical handbook
- Hack proofing your Web applications : the only way to stop a hacker is to think like one
- Hack proofing your network
- Hack the stack : using snort and ethereal to master the 8 layers of an insecure network
- Hacking : the art of exploitation
- Hacking and securing iOS applications
- Hacking exposed : unified communications & VoIP security secrets & solutions
- Hacking exposed : web applications : web application security secrets and solutions
- Hacking exposed wireless : wireless security secrets & solutions
- Hacking for dummies
- Hacking for dummies
- Hacking for dummies
- Hacking the hacker : learn from the experts who take down hackers
- Hacking with Kali : practical penetration testing techniques
- Handbook of SCADA/control systems security
- Handbook of information security , Volume 1, Key concepts, infrastructure, standards, and protocols
- Handbook of information security, Volume 3, Threats, vulnerabilities, prevention, detection, and management
- Handbook of system safety and security : cyber risk and risk management, cyber security, threat analysis, functional safety, software systems, and cyber physical systems
- Hands-on cybersecurity with Blockchain : implement DDoS protection, PKI-based identity, 2FA, and DNS security using Blockchain
- Hands-on machine learning for cybersecurity : safeguard your system by making your machines intelligent using the Python ecosystem
- Hands-on oracle application express security : building secure apex applications
- Hands-on security in DevOps : ensure continuous security, deployment, and delivery with DevSecOps
- Hardening Cisco routers
- Honeypot : a new paradigm to information security
- How to cheat at managing information security
- How to cheat at securing a wireless network
- How to cheat at securing your network
- How to measure anything in cybersecurity risk
- How to secure and audit Oracle 10g and 11g
- How to survive a data breach : a pocket guide
- IT Governance to Drive High Performance : Lessons from Accenture
- IT auditing : using controls to protect information assets
- IT induction and information security awareness : a pocket guide
- IT security metrics : a practical framework for measuring security & protecting data
- Implementing NAP and NAC security technologies : the complete guide to network access control
- Implementing SSL/TLS using cryptography and PKI
- Incident response & computer forensics
- Incident response techniques for ransomware attacks : understand modern ransomware attacks and build an incident response strategy to work through them
- Industrial cybersecurity : efficiently secure critical infrastructure systems
- Information Security Breaches : Avoidance and Treatment based on ISO27001
- Information security : principles and practices
- Information security analytics : finding security insights, patterns, and anomalies in big data
- Information security auditor
- Information security breaches : avoidance treatment based on ISO27001
- Information security fundamentals
- Information security governance simplified : from the boardroom to the keyboard
- Information security management handbook , Volume 7
- Information security management principles
- Information security management principles : an ISEB certificate
- Information security risk management for ISO27001/ISO27002
- Infosec management fundamentals
- Infosecurity 2008 threat analysis
- Insider threat : protecting the enterprise from sabotage, spying, and theft
- Instant Netcat starter : learn to harness the power and versatility of Netcat, and understand why it remains an integral part of IT and security toolkits to this day
- Integrating ISA Server 2006 with Microsoft Exchange 2007
- Intelligent systems for security informatics
- Internet and surveillance : the challenges of Web 2.0 and social media
- Internet forensics
- Introduction to computer and network security : navigating shades of gray
- Introduction to computer networks and cybersecurity
- Intrusion detection in wireless ad-hoc networks
- Intrusion detection networks : a key to collaborative security
- Intrusion detection with Snort
- IoT penetration testing cookbook : identify vulnerabilities and secure your smart devices
- Iris biometric model for secured network access
- Java security
- Java security handbook
- Kali Linux - Assuring Security by Penetration Testing : Master the Art of Penetration Testing with Kali Linux
- Kali Linux web penetration testing cookbook : identify, exploit, and prevent web application vulnerabilities with Kali Linux 2018.x
- Kali Linux web penetration testing cookbook : over 80 recipes on how to identify, exploit, and test web application security with Kali Linux 2
- Kali Linux wireless penetration testing : beginner's guide : master wireless testing techniques to survey and attack wireless networks with Kali Linux, including the KRACK attack
- Kali Linux wireless penetration testing : master wireless testing techniques to survey and attack wireless networks with Kali Linux
- Kali Linux, an ethical hacker's cookbook : practical recipes that combine strategies, attacks, and tools for advanced penetration testing
- Learn social engineering : learn the art of human hacking with an internationally renowned expert
- Learning AirWatch : learn to implement, manage, and deploy the latest Enterprise Mobility Management (EMM) platform offered by AirWatch
- Learning penetration testing with Python : utilize Python scripting to execute effective and efficient penetration tests
- Linux security cookbook
- Linux server security
- LinuxÂŽ hardening in hostile networks : server security from TLS to TOR
- Logging and log management : the authoritative guide to understanding the concepts surrounding logging and log management
- Mac OS X, iPod, and iPhone forensic analysis DVD toolkit
- Mac Security Bible
- Managed code rootkits : hooking into runtime environments
- Managing Cisco network security
- Managing Information Security Breaches : Studies from Real Life
- Managing a network vulnerability assessment
- Managing information risk : a director's guide
- Managing information security
- Managing risk and information security : protect to enable
- Managing security with Snort and IDS tools
- Mastering Azure security : keeping your Microsoft Azure workloads safe
- Mastering FreeBSD and OpenBSD security
- Mastering Kali Linux for advanced penetration testing : secure your network with Kali Linux, the ultimate hackers' arsenal
- Mastering Linux security and hardening : secure your Linux server and protect it from intruders, malware attacks, and other external threats
- Mastering Metasploit : take your penetration testing and IT security skills to a whole new level with the secrets of Metasploit
- Mastering Metasploit : write and implement sophisticated attack vectors in Metasploit using a completely hands-on approach
- Mastering network security
- Maximum wireless security
- Metasploit : the penetration tester's guide
- Metasploit toolkit for penetration testing, exploit development, and vulnerability research
- Microsoft Identity Manager 2016 handbook : a complete handbook on Microsoft Identity Manager 2016--from design considerations to operational best practices
- Microsoft Information Protection Administrator SC-400 Certification Guide : Advance Your Microsoft Security and Compliance Services Knowledge and Pass the SC-400 Exam with Confidence
- Microsoft forefront security administration guide
- Microsoft identity and access administrator exam guide : implement IAM solutions with Azure AD, build an identity governance strategy, and pass the SC-300 exam
- Mobile Security : a Pocket Guide
- Mobile application security
- Mobile device security for dummies
- Mobile malware attacks and defense
- ModSecurity 2.5 : securing your Apache installation and web applications : prevent web application hacking with this easy-to-use guide
- Multilevel modeling of secure systems in QoP-ML
- Multimedia security : watermarking, steganography, and forensics
- Nessus, Snort, & Ethereal power tools : customizing open source security applications
- Netcat power tools
- Network Security Assessment
- Network and system security
- Network forensics
- Network security : know it all
- Network security : private communication in a public world
- Network security hacks
- Network security with pfSense : architect, deploy, and operate enterprise-grade firewalls
- Next generation SSH2 implementation : securing data in motion
- Nine steps to success : an ISO 27001:2013 implementation overview
- Nine steps to success : an ISO27001:2013 implementation overview
- Ninja hacking : unconventional penetration testing tactics and techniques
- Nmap 6 : network exploration and security auditing Cookbook
- Nmap in the enterprise : your guide to network scanning
- No tech hacking : a guide to social engineering, dumpster diving, and shoulder surfing
- Nueve pasos para el ĂŠxito : una visiĂłn de conjunto para la aplicaciĂłn de la ISO 27001:2013
- OAuth 2.0 cookbook : protect your web applications using Spring Security
- OS X exploits and defense
- OSSEC host-based intrusion detection guide
- Offensive shellcode from scratch : get to grips with shellcode countermeasures and discover how to bypass them
- Official (ISC)2 guide to the CISSP CBK
- Official (ISC)2 guide to the CISSP-ISSMP CBK
- Official (ISC)2 guide to the CSSLP
- Official (ISC)2 guide to the CSSLP CBK
- Once more unto the breach : managing information security in an uncertain world
- Open source intelligence methods and tools : a practical guide to online intelligence
- Oracle security
- PCI DSS : a Practical Guide to implementing and Maintaining Compliance
- PCI DSS : a pocket guide
- PCI compliance : implementing effective PCI data security standards
- Penetration tester's open source toolkit
- Penetration testing : a guide for business and it managers
- Penetration testing : a hands-on introduction to hacking
- Penetration testing : protecting networks and systems
- Penetration testing services procurement guide, Version 1
- Penetration testing with the Bash shell : make the most of the Bash shell and Kali Linux's command-line-based security assessment tools
- Perfect passwords : selection, protection, authentication
- Physical layer security in wireless communications
- Practical Hadoop security
- Practical Memory Forensics : Jumpstart Effective Forensic Analysis of Volatile Memory
- Practical UNIX and Internet security
- Practical anonymity : hiding in plain sight online
- Practical cyber intelligence : how action-based intelligence can be an effective response to incidents
- Practical internet of things security : a practical, indispensable security guide that will navigate you through the complex realm of securely building and deploying systems in our IoT-connected world
- Practical reverse engineering : x86, x64, ARM, Windows Kernel, reversing tools, and obfuscation
- Preventing good people from doing bad things : implementing least privilege
- Privacy defended : protecting yourself online
- Procuring penetration testing services
- Professional Red teaming : conducting successful cybersecurity engagements
- Professional penetration testing : creating and operating a formal hacking lab
- Programming .NET security
- Programming Windows Identity Foundation
- Python penetration testing essentials : techniques for ethical hacking with Python
- Quick start guide to penetration testing : with NMAP, OpenVAS and Metasploit
- RESTful Java web services security : secure your RESTful applications against common vulnerabilities
- Ransomware : defending against digital extortion
- Real-world bug hunting : a field guide to web hacking
- Research methods for cyber security
- SAP security configuration and deployment : the IT administrator's guide to best practices
- SECUR
- SELinux System Administration - Third Edition : Implement Mandatory Access Control to Secure Applications, Users, and Information Flows on Linux
- SSCP systems security certified practitioner practice exams
- Scene of the cybercrime
- Schneier on security
- Screenos cookbook
- Secure and resilient software development
- Secure programming with static analysis
- Securing Office 365 : masterminding MDM and compliance in the cloud
- Securing SQL server : protecting your database from attackers
- Securing SQL server : protecting your database from attackers
- Securing Web services with WS-Security : demystifying WS-Security, WS-Policy, SAML, XML Signature, and XML Encryption
- Securing Windows server 2008 : prevent attacks from outside and inside your organization
- Securing systems : applied security architecture and threat models
- Securing the virtual environment : how to defend the enterprise against attack
- Security : the Human Factor
- Security administrator street smarts : a real world guide to CompTIA security+ skills
- Security and privacy for Microsoft Office 2010 users
- Security for Microsoft Visual Basic .NET
- Security for Microsoft Windows system administrators : introduction to key information security concepts
- Security for web developers : using JavaScript, HTML, and CSS
- Security in a Web 2.0+ world : a standards based approach
- Security in computing
- Security in wireless ad hoc and sensor networks
- Security log management : identifying patterns in the chaos
- Security of block ciphers : from algorithm design to hardware implementation
- Security patterns in practice : designing secure architectures using software patterns
- Security power tools
- Security testing handbook for banking applications
- Security warrior
- Security without obscurity : a guide to confidentiality, authentication, and integrity
- Security+
- Security+ fast pass
- Security+ practice questions
- Selling information security to the board : a primer
- Seven deadliest USB attacks
- Seven deadliest web application attacks
- Seven deadliest wireless technologies attacks
- Silence on the wire : a field guide to passive reconnaissance and indirect attacks
- Smart grid security : an end-to-end view of security in the new electrical grid
- Snort : IDS and IPS toolkit
- Snort cookbook
- Sockets, shellcode, porting & coding : reverse engineering exploits and tool coding for security professionals
- Software test attacks to break mobile and embedded devices
- Steal this computer book 4.0 : what they won't tell you about the Internet
- Syngress IT security project management handbook
- TICSA TruSecure ICSA certified security associate : exam TUO-001 : training guide
- The Architecture of Privacy : On Engineering Technologies that Can Deliver Trustworthy Safeguards
- The Browser Hacker's Handbook
- The CERT Oracle Secure Coding Standard for Java
- The Mac hacker's handbook
- The Oracle hacker's handbook : hacking and defending Oracle
- The antivirus hacker's handbook
- The art of deception : controlling the human element of security
- The art of intrusion : the real stories behind the exploits of hackers, intruders & deceivers
- The basics of cyber warfare : understanding the fundamentals of cyber warfare in theory and practice
- The basics of digital privacy : simple tools to protect your personal information and your identity online
- The basics of information security : understanding the fundamentals of InfoSec in theory and practice
- The best damn IT security management book period
- The book of PF : a no-nonsense guide to the OpenBSD firewall
- The chief information security officer : insights, tools and survival skills
- The craft of system security
- The database hacker's handbook : defending database servers
- The definitive guide to complying with the HIPAA/HITECH privacy and security rules
- The definitive guide to the C & A transformation : the first publication of a comprehensive view Of the C & A transformation
- The mobile application hacker's handbook
- The myths of security : what the computer security industry doesn't want you to know
- The network security test lab : a step-by-step guide
- The psychology of information security : resolving conflicts between security compliance and human behaviour
- The security consultant's handbook
- The security development lifecycle : SDL, a process for developing demonstrably more secure software
- The shellcoder's handbook : discovering and exploiting security holes
- The state of the art in intrusion prevention and detection
- The tangled Web : a guide to securing modern Web applications
- The total CISSP exam prep book : practice questions, answers, and test taking tips and techniques
- The true cost of information security breaches and cyber crime
- The web application hacker's handbook : discovering and exploiting security flaws
- The web application hacker's handbook : finding and exploiting security flaws
- Thor's Microsoft security bible : a collection of practical security techniques
- Threat modeling : designing for security
- Two-factor authentication
- UTM security with Fortinet : Mastering FortiOS
- Untangle network security : secure your network against threats and vulnerabilities using the unparalleled Untangle NGFW
- Using the common criteria for IT security evaluation
- VCP6-DCV official cert guide : (exam #2VO-621)
- VCP6-NV official cert guide : (exam #2VO-641)
- Virtualization Security : Protecting Virtualized Environments
- Virtualization for security : including sandboxing, disaster recovery, high availability, forensic analysis, and honeypotting
- WarDriving & wireless penetration testing
- Web Application Defender's Cookbook : Battling Hackers and Protecting Users
- Web application obfuscation : '-/WAFs.evasion.filters//alert (/obfuscation/)-'
- Web application vulnerabilities : detect, exploit, prevent
- Web commerce security : design and development
- Web security : a whitehat perspective
- What every engineer should know about cyber security and digital forensics
- Windows Server 2008 PKI and certificate security
- Windows security monitoring : scenarios and patterns
- Wireless communications security : solutions for the internet of things
- Wireless security
- XSS attacks : cross-site scripting exploits and defense
- Zen and the art of information security
- Ĺamanie i zabezpieczanie aplikacji w systemie iOS
Embed
Settings
Select options that apply then copy and paste the RDF/HTML data fragment to include in your application
Embed this data in a secure (HTTPS) page:
Layout options:
Include data citation:
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.sfpl.org/resource/SNwC01Ju6-M/" typeof="CategoryCode http://bibfra.me/vocab/lite/Concept"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.sfpl.org/resource/SNwC01Ju6-M/">COMPUTERS -- Security | General</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.sfpl.org/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="https://link.sfpl.org/">San Francisco Public Library</a></span></span></span></span></div>
Note: Adjust the width and height settings defined in the RDF/HTML code fragment to best match your requirements
Preview
Cite Data - Experimental
Data Citation of the Concept COMPUTERS -- Security | General
Copy and paste the following RDF/HTML data fragment to cite this resource
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.sfpl.org/resource/SNwC01Ju6-M/" typeof="CategoryCode http://bibfra.me/vocab/lite/Concept"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.sfpl.org/resource/SNwC01Ju6-M/">COMPUTERS -- Security | General</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.sfpl.org/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="https://link.sfpl.org/">San Francisco Public Library</a></span></span></span></span></div>