Computer networks -- Security measures
Resource Information
The concept Computer networks -- Security measures represents the subject, aboutness, idea or notion of resources found in San Francisco Public Library.
The Resource
Computer networks -- Security measures
Resource Information
The concept Computer networks -- Security measures represents the subject, aboutness, idea or notion of resources found in San Francisco Public Library.
- Label
- Computer networks -- Security measures
A sample of Items that share the Concept Computer networks -- Security measures See All
Context
Context of Computer networks -- Security measuresSubject of
No resources found
No enriched resources found
- .Net development security solutions
- 10 don'ts on your digital devices : the non-techie's survival guide to cyber security and privacy
- 10 don'ts on your digital devices : the non-techie's survival guide to cyber security and privacy
- 125 sposobów na bezpieczeństwo sieci
- 24 deadly sins of software security : programming flaws and how to fix them
- 24 deadly sins of software security : programming flaws and how to fix them
- 8 steps to better security : a simple cyber resilience guide for business
- 8 steps to better security : a simple cyber resilience guide for business
- 8 steps to better security : a simple cyber resilience guide for business
- 802.11 Security
- A Guide to the National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework (2.0)
- A framework for multi-mode authentication : overview and implementation guide
- A machine learning approach to phishing detection and defense
- A machine-learning approach to phishing detection and defense
- A multidisciplinary introduction to information security
- A practical guide to TPM 2.0 : using the Trusted Platform Module in the new age of security
- A practical guide to TPM 2.0 : using the Trusted Platform Module in the new age of security
- A practical guide to computer forensics investigations
- A study of black hole attack solutions : on AODV routing protocol in MANET
- A survey of research in supervisory control and data acquisition (SCADA)
- AAA identity management security
- AAA identity management security
- AIX Fast Connect functions and sizing guide
- AVIEN malware defense guide for the Enterprise
- AWS SECURITY COOKBOOK;PRACTICAL SOLUTIONS FOR MANAGING SECURITY POLICIES, MONITORING, AUDITING, AND COMPLIANCE WITH AWS
- Abusing the internet of things : blackouts, freakouts, and stakeouts
- Access control systems : security, identity management and trust models
- Active Directory administration cookbook : actionable, proven solutions to identity management and authentication on servers and in the cloud
- Active Directory administration cookbook : actionable, proven solutions to identity management and authentication on servers and in the cloud
- Active defense : a comprehensive guide to network security
- Adaptive Security Management Architecture
- Adaptive security management architecture
- Advanced IP Routing in Cisco Networks
- Advanced Malware Analysis
- Advanced infrastructure penetration testing : defend your systems from methodized and proficient attackers
- Advanced penetration testing : hacking the world's most secure networks
- Advanced persistent security : a cyberwarfare approach to implementing adaptive enterprise protection, detection, and reaction strategies
- Advanced persistent threat : understanding the danger and how to protect your organization
- Advanced persistent threat : understanding the danger and how to protect your organization
- Advanced persistent threats : how to manage the risk to your business
- Advanced persistent training : take your security awareness program to the next level
- Advances in Cyber Security : Technology, Operations, and Experiences
- Advances in Network Management
- Advances in cyber security : technology, operations, and experiences
- Aggressive network self-defense
- Agile security : an introduction for developers
- Ajax security
- All-in-One Cisco CCIE Lab Study Guide, Second Edition
- An approach toward security learning
- An introduction to information security and ISO27001 : a pocket guide
- Anatomy of a cyberattack
- Anomaly detection for monitoring : a statistical approach to time series anomaly detection
- Anonymous Communication Networks
- Anonymous communication networks : protecting privacy on the Web
- Ansible quick start guide : Control and monitor infrastructures of any size, physical or virtual
- Anti-Hacker Tool Kit, Fourth Edition
- Anti-Hacker Tool Kit, Second Edition
- Anti-Hacker Tool Kit, Third Edition
- Anti-Spam Techniques Based on Artificial Immune System
- Anti-Spam Toolkit
- Anti-hacker tool kit
- Anti-hacker tool kit
- Apache : receptury
- Apache cookbook
- Apache cookbook
- Apache essentials : install, configure, maintain
- Application security in the ISO 27001:2013 environment
- Applied cyber security and the smart grid : implementing security controls into the modern power infrastructure
- Applied cyber security and the smart grid : implementing security controls into the modern power infrastructure
- Applied incident response
- Applied network security : master the art of detecting and averting advanced network security attacks and techniques
- Applied network security monitoring : collection, detection, and analysis
- Applied network security monitoring : collection, detection, and analysis
- Applied security visualization
- Architecting secure software systems
- Are your bits flipped? : overcoming tech misconceptions
- Artificial Intelligence, Cybersecurity and Cyber Defence
- Assessing information security : strategies, tactics, logic and framework
- Assessing network security
- Asset protection through security awareness
- Asset protection through security awareness
- Attacking Network Protocols : A Hacker's Guide to Capture, Analysis, and Exploitation
- Attacking network protocols : a hacker's guide to capture, analysis, and exploitation
- Automatic defense against zero-day polymorphic worms in communication networks
- Beautiful security
- Beautiful security
- Becoming the hacker : the playbook for getting inside the mind of an attacker
- Best Practices for the Formal Software Testing Process : a Menu of Testing Tasks
- Best damn firewall book period
- Best practices for continuity of operations (handling destructive malware)
- Beyond convergence : world without order
- Beyond cybersecurity : protecting your digital business
- Bezpieczenstwo tozsamosci i danych w projektach Web
- Binary analysis cookbook : actionable recipes for disassembling and analyzing binaries for security risks
- Binary analysis cookbook : actionable recipes for disassembling and analyzing binaries for security risks
- Biometrics for Network Security
- Black Hat Python : Python programming for hackers and pentesters
- Blocking spam & spyware for dummies
- Bluetooth security attacks : comparative analysis, attacks, and countermeasures
- Botnets : the killer web app
- Bring your own device (BYOD) security audit/assurance program
- Broadband Network & Device Security
- Bug Bounty Hunting for Web Security : Find and Exploit Vulnerabilities in Web Sites and Applications
- Bug bounty hunting for web security : find and exploit vulnerabilities in web sites and applications
- Building DMZs for enterprise networks
- Building Internet Firewalls : Internet and Web security
- Building a computer network : LiveLessons
- Building a modern security program : adapting security for DevOps and cloud
- Building a pentesting lab for wireless networks : build your own secure enterprise or home penetration testing lab to dig into the various hacking techniques
- Building a virtual private network
- Building an intelligence-led security program
- Building an intelligence-led security program
- Building open source network security tools : components and techniques
- Building secure servers with Linux
- Building the infrastructure for cloud security : a solutions view
- Building virtual pentesting labs for advanced penetration testing : learn how to build complex virtual architectures that allow you to perform virtually any required testing methodology and perfect it
- Burp Suite cookbook : practical recipes to help you master web penetration testing with Burp Suite
- Business continuity & disaster recovery for IT professionals
- Business continuity & disaster recovery planning for IT professionals
- Business continuity and disaster recovery for infosec managers
- Business continuity and disaster recovery planning for IT professionals
- Business continuity and disaster recovery planning for IT professionals, second edition
- CCENT CISCO Certified Enterprise Technician Study Guide (Exam 640-822)
- CCIE collaboration lab exam
- CCIE collaboration quick reference
- CCIE routing and switching v5.0 exam roundup : networking talks
- CCIE security v4.0 : (video training)
- CCNA security live lessons : a hands-on guide to implementing security on Cisco routers and switches
- CCNP Security Firewall 642-617 official cert guide
- CCNP Security Firewall 642-617 quick reference
- CCNP Security Virtual Private Networks SVPN 300-730 Official Cert Guide
- CCNP security IPS 642-627 quick reference
- CCNP security VPN 642-647 official cert guide
- CCNP security VPN 642-647 quick reference
- CCNP security secure 642-637 quick reference
- CCSP : Cisco Certified Security Professional Certification All-in-One Exam Guide
- CCSP SNAA quick reference
- CCSP SNAF quick reference
- CCSP self-study : Cisco secure intrusion detection system (CSIDS)
- CEH v11 certified ethical hacker study guide
- CEH v11 certified ethical hacker study guide
- CIBERSEGURIDAD PARA DIRECTIVOS : riesgos, control y eficiencia de las tecnologÃas de la informacion
- CIW security professional certification bible
- CMS security handbook : the comprehensive guide for WordPress, Joomla!, Drupal, and Plone
- CMS security handbook : the comprehensive guide for WordPress, Joomla!, Drupal, and Plone
- CYA : securing Exchange Server 2003 and Outlook Web Access : cover your a** by getting it right the first time
- CYA Securing IIS 6.0 : cover your a** by getting it right the first time
- Capture and analysis of network-based evidence
- Certified ethical hacker v11
- Chained exploits : advanced hacking attacks from start to finish
- Challenges and best practices in KBA schemes
- Check Point VPN-1/FireWall-1 on AIX : a cookbook for stand-alone and high availability solutions
- Cisco : A Beginner's Guide, Fifth Edition
- Cisco : A Beginner's Guide, Fourth Edition
- Cisco : The Complete Reference
- Cisco ASA - all-in-one firewall, IPS, Anti-X, and VPN adaptive security appliance : identify, mitigate, and respond to network attacks, second edition
- Cisco ASA 5500-X series next-generation firewalls : LiveLessons
- Cisco ASA : all-in-one firewall, IPS, Anti-X, and VPN adaptive security appliance
- Cisco ASA : all-in-one firewall, IPS, and VPN adaptive security appliance
- Cisco ASA : all-in-one next-generation firewall, IPS, and VPN services
- Cisco ASA Configuration
- Cisco ASA and PIX firewall handbook
- Cisco ASA, PIX, and FWSM firewall handbook
- Cisco ASA, PIX, and FWSM firewall handbook, second edition
- Cisco CCSP SNRS quick reference
- Cisco Catalyst LAN Switching
- Cisco FirePOWER and Advanced Malware Protection : LiveLessons
- Cisco Firepower Threat Defense (FTD) : configuration and troubleshooting best practices for the Next-Generation Firewall (NGFW), Next-Generation Intrusion Prevention System (NGIPS), and Advanced Malware Protection (AMP)
- Cisco Firepower Threat Defense (FTD) : configuration and troubleshooting best practices for the Next-Generation Firewall (NGFW), Next-Generation Intrusion Prevention System (NGIPS), and Advanced Malware Protection (AMP)
- Cisco IOS Essentials
- Cisco IOS access lists
- Cisco ISE for BYOD and secure unified access
- Cisco Intelligent WAN (IWAN)
- Cisco Multicast Routing & Switching
- Cisco NAC appliance : enforcing host security with clean access
- Cisco NAC appliance : enforcing host security with clean access
- Cisco Network Admission Control, Vol. 1, NAC architecture and design
- Cisco PIX firewalls : configure, manage, & troubleshoot
- Cisco Packetized Voice and Data Integration
- Cisco Router Configuration Answers! Certified Tech Support
- Cisco Router OSPF Design & Implementation Guide
- Cisco Security Agent
- Cisco Security Architectures
- Cisco Security Professional's guide to secure intrusion detection systems
- Cisco Switched Internetworks
- Cisco TCP/IP Routing Professional Reference
- Cisco bring your own device (BYOD) networking
- Cisco firewall : video mentor
- Cisco firewall technology
- Cisco network security little black book
- Cisco next-generation security solutions : all-in-one Cisco ASA FirePOWER services, NGIPS, and AMP
- Cisco router and switch forensics : investigating and analyzing malicious network activity
- Cisco router and switch forensics : investigating and analyzing malicious network activity
- Cisco router firewall security
- Cisco secure Internet security solutions
- Cisco secure firewall services module (FWSM)
- Cisco secure firewall services module (FWSM)
- Cisco security
- Cisco security professional's guide to secure intrusion detection systems
- Cisco security specialist's guide to PIX firewall [sic]
- Client-side attacks and defense
- Client-side attacks and defense
- Cloud Computing Security, 2nd Edition
- Cloud computing security : foundations and challenges
- Cloud native security
- Cloud security
- Cloud security and privacy
- Cloud security automation : get to grips with automating your cloud security on AWS and OpenStack
- Cloud security for dummies
- Cloud security for dummies
- Cloud security for dummies
- Code hacking : a developer's guide to network security
- Combating spyware in the enterprise
- Communications and networking : an introduction
- CompTIA PenTest+ Certification For Dummies
- CompTIA Security+ Certification Practice Exams, Fourth Edition (Exam SY0-601)
- CompTIA security+ (SYO-401) : complete video course
- CompTIA security+ SYO-201 video mentor : learn exam essentials from the expert
- Computational network science : an algorithmic approach
- Computer Network Security
- Computer Network Security
- Computer Security and Encryption : An Introduction
- Computer Security and Encryption, 2nd Edition
- Computer and information security handbook
- Computer and information security handbook
- Computer and information security handbook
- Computer and information security handbook, second edition
- Computer and information security handbook, second edition
- Computer forensics : a pocket guide
- Computer forensics : a pocket guide
- Computer forensics : computer crime scene investigation
- Computer forensics : incident response essentials
- Computer forensics jumpstart
- Computer forensics jumpstart
- Computer forensics jumpstart, second edition
- Computer incident response and product security
- Computer network attack and international law
- Computer network security and cyber ethics
- Computer security : art and science
- Computer security basics
- Computer security fundamentals
- Computer security fundamentals
- Computer-Forensik : Computerstraftaten erkennen, ermitteln, aufklären
- Conducting network penetration and espionage in a global environment
- Conducting network penetration and espionage in a global environment
- Configuring Check Point NGX VPN-1/FireWall-1
- Configuring Cisco Routers for ISDN
- Configuring ISA Server 2000 : building firewalls for Windows 2000
- Configuring Juniper Networks NetScreen & SSG firewalls
- Configuring Juniper Networks NetScreen & SSG firewalls
- Configuring SonicWALL firewalls
- Configuring Symantec Antivirus, Corporate Edition
- Conoce todo sobre kali linux
- Container security : fundamental technology concepts that protect containerized applications
- Counter hack reloaded : a step-by-step guide to computer attacks and effective defenses
- Cracking security misconceptions : untangling common myths about modern information security
- Crafting the InfoSec playbook
- Creating a patch and vulnerability management program : recommendations of the National Institute of Standards and Technology (NIST)
- Crisis management audit/assurance program
- Cryptography and network security
- Cryptography and network security
- Cryptography and network security : a practical approach
- Cryptography for Security and Privacy in Cloud Computing
- Cyber Guerilla
- Cyber Physical Systems : Architectures, Protocols, and Applications
- Cyber Safety For Everyone
- Cyber Safety for Everyone, 2nd Edition
- Cyber Warfare - Truth, Tactics, and Strategies
- Cyber and you : the impact of technology on our lives
- Cyber conflict : competing national perspectives
- Cyber crime, security and digital intelligence
- Cyber infrastructure protection
- Cyber infrastructure protection
- Cyber minds : insights on cybersecurity across the cloud, data, artificial intelligence, blockchain, and IoT to keep you cyber safe
- Cyber minds : insights on cybersecurity across the cloud, data, artificial intelligence, blockchain, and IoT to keep you cyber safe
- Cyber operations : building, defending, and attacking modern computer networks
- Cyber operations : building, defending, and attacking modern computer networks
- Cyber resiliency solution for IBM Spectrum Scale
- Cyber resiliency with IBM QRadar and IBM Spectrum Virtualize for Public Cloud on Azure with IBM Copy Services Manager for Safeguarded Copy
- Cyber resilient infrastructure : detect, protect, and mitigate threats against Brocade SAN FOS with IBM QRadar
- Cyber secure
- Cyber security : endpoint defense
- Cyber security and IT infrastructure protection
- Cyber security and network security
- Cyber security culture : counteracting cyber threats through organizational learning and training
- Cyber security engineering : a practical approach for systems and software assurance
- Cyber security on Azure : an IT professionals guide to Microsoft Azure security center
- Cyber smart : five habits to protect your family, money, and identity from cyber criminals
- Cyber smart : five habits to protect your family, money, and identity from cyber criminals
- Cyber smart : five habits to protect your family, money, and identity from cyber criminals
- Cyber smart : five habits to protect your family, money, and identity from cyber criminals
- Cyber spies : the secret history of surveillance, hacking, and digital espionage
- Cyber threat! : how to manage the growing risk of cyber attacks
- Cyber threat! : how to manage the growing risk of cyber attacks
- Cyber warfare : how to fight the electronic war
- Cyber warfare : truth, tactics, and strategies : strategic concepts and truths to help you and your organization survive on the battleground of cyber warfare
- Cybercrime and cyberwarfare
- Cyberdanger : Understanding and Guarding Against Cybercrime
- Cyberjutsu : cybersecurity for the modern ninja
- Cybersecurity
- Cybersecurity : current writings on threats and protection
- Cybersecurity : managing systems, conducting testing, and investigating intrusions
- Cybersecurity : managing systems, conducting testing, and investigating intrusions
- Cybersecurity : the beginner's guide : a comprehensive guide to getting started in cybersecurity
- Cybersecurity For Dummies
- Cybersecurity Ops with bash : attack, defend, and analyze from the command line
- Cybersecurity and information sharing
- Cybersecurity attacks (Red Team activity)
- Cybersecurity attacks : Red Team strategies : a practical guide to building a penetration testing program having homefield advantage
- Cybersecurity essentials
- Cybersecurity essentials
- Cybersecurity essentials
- Cybersecurity expert
- Cybersecurity for Hospitals and Healthcare Facilities : A Guide to Detection and Prevention
- Cybersecurity for dummies
- Cybersecurity for dummies
- Cybersecurity for executives : a practical guide
- Cybersecurity for executives : a practical guide
- Cybersecurity for small businesses and nonprofits
- Cybersecurity fundamentals : understand the role of cybersecurity, its importance and modern techniques used by cybersecurity professionals
- Cybersecurity incident response : how to contain, eradicate, and recover from incidents
- Cybersecurity is everybody's business : solve the security puzzle for your small business and home
- Cybersecurity of industrial systems
- Cybersecurity pevention and detection (Video collection)
- Cybersecurity program development for business : the essential planning guide
- Cybersecurity program development for business : the essential planning guide
- Cybersecurity program development for business : the essential planning guide
- Cybersecurity program development for business : the essential planning guide
- Cybersecurity, attack and defense strategies : counter modern threats and employ state-of-the-art tools and techniques to protect your organization against cybercriminals
- Cybersecurity, attack and defense strategies : infrastructure security with Red Team and Blue Team tactics
- Cyberspies : the secret history of surveillance, hacking, and digital
- Cyberspies : the secret history of surveillance, hacking, and digital espionage
- Cyberspies : the secret history of surveillance, hacking, and digital espionage
- Data analytics for IT networks : developing innovative use cases
- Data breach preparation and response : breaches are certain, impact is not
- Data breaches : crisis and opportunity
- Data mining tools for malware detection
- Data networks : routing, security, and performance optimization
- Data networks : routing, security, and performance optimization
- Data-driven security : analysis, visualization and dashboards
- Data-driven security : analysis, visualization, and dashboards
- Defend I.T. : security by example
- Defending Your Digital Assets Against Hackers, Crackers, Spies & Thieves
- Defense against the black arts : how hackers do what they do and how to protect against it
- Defense against the black arts : how hackers do what they do and how to protect against it
- Defense and detection strategies against Internet worms
- Defensive cybersecurity fundamentals
- Demystifying the IPsec puzzle
- Deploying Microsoft Forefront Protection 2010 for Exchange Server
- Deploying Microsoft Forefront Threat Management Gateway 2010
- Deploying Microsoft Forefront Unified Access Gateway 2010
- Deploying a public key infrastructure
- Deploying zone-based firewalls
- Design alternatives for computer network security
- Designing Network Security Second Edition
- Designing a HIPAA-compliant security operations center : a guide to detecting and responding to healthcare breaches and events
- Designing an IAM Framework with Oracle Identity and Access Management Suite
- Designing an IAM framework with Oracle Identity and access management suite
- Designing and building a security operations center
- Designing and building enterprise DMZs
- DevOpsSec : securing software through continuous delivery
- Developer's guide to web application security
- Developer's guide to web application security
- Digital Resilience
- Digital Signatures
- Digital forensics and cyber crime with Kali Linux fundamentals
- Digital forensics and incident response : an intelligent way to respond to attacks
- Digital forensics and incident response : incident response techniques and procedures to respond to modern cyber threats
- Digital forensics and incident response : incident response tools and techniques for effective cyber threat response
- Digital forensics for network, Internet, and cloud computing : a forensic evidence guide for moving targets and data
- Digital forensics for network, Internet, and cloud computing : a forensic evidence guide for moving targets and data
- Digital forensics for pentesters : hands-on learning
- Digital forensics with Kali Linux : perform data acquisition, data recover, network forensics, and malware analysis with Kali Linux 2019x
- Digital forensics with Kali Linux : perform data acquisition, digital investigation, and threat analysis using Kali Linux tools
- Digital identity
- Digital identity guidelines : enrollment and identity proofing
- Digital privacy : theory, technologies, and practices
- Digital resilience : is your company ready for the next cyber threat?
- Digital resilience : is your company ready for the next cyber threat?
- Disappearing cryptography : being and nothingness on the Net
- Disappearing cryptography : information hiding : steganography & watermarking
- Disappearing cryptography : information hiding : steganography & watermarking, second edition
- Disappearing cryptography : information hiding : steganography & watermarking, third edition
- Disappearing cryptography : information hiding, steganography & watermarking
- Disaster survival guide for business communications networks : strategies for planning, response and recovery in data and telecom systems
- Disclosure of security vulnerabilities
- Dissecting the hack : the V3rb0ten network
- Dissecting the hack : the f0rb1dd3n network
- Dissecting the hack : the f0rb1dd3n network, revised edition
- Distributed Networks
- Distributed denial of service attack and defense
- Distributed security and high availability with Tivoli Access Manager and WebSphere Application Server for z/OS
- Diving into secure access service Edge : a technical leadership guide to achieving success with sase at market speed
- Docker security : using containers safely in production
- Dr. Tom Shinder's ISA server and beyond : real world security solutions for Microsoft Enterprise networks
- Dr. Tom Shinder's configuring ISA Server 2004
- Dynamics of a trusted platform
- EVPN in the data center
- Early threat detection and safeguarding data with IBM QRadar and IBM Copy Services Manager on IBM DS8000
- Effective Python penetration testing : pen test your system like a pro and overcome vulnerabilities by leveraging Python scripts, libraries, and tools
- Elementary information security
- Enabling secure and privacy preserving communications in smart grids
- End-to-end network security : defense-in-depth
- Endpoint security
- Enemy at the water cooler : real-life stories of insider threats and Enterprise Security Management countermeasures
- Enemy at the water cooler : real-life stories of insider threats and Enterprise Security Management countermeasures
- Engineering trustworthy systems : get cybersecurity design right the first time
- Engineering trustworthy systems : get cybersecurity design right the first time
- Enterprise Mac security : El Capitan
- Enterprise Mac security : Mac OS X Snow Leopard
- Enterprise Single Sign-On design guide : using IBM Security Access Manager for Enterprise Single Sign-On 8.2
- Enterprise business portals II with IBM tivoli access manager
- Enterprise cloud security and governance : efficiently set data protection and privacy principles
- Enterprise penetration testing and continuous monitoring (The art of hacking series) : LiveLessons
- Enterprise software security : a confluence of disciplines
- Essential cybersecurity science : build, test, and evaluate secure systems
- Essential cybersecurity science : build, test, and evaluate secure systems
- Essential skills for hackers
- Ethereal : packet sniffing
- Ethereal packet sniffing
- Ethical Hack
- Ethical hacking : learning the basics
- Ethical hacking : networks and websites
- Ethical hacking : orchestrating attacks
- Ethical hacking and penetration testing guide
- Ethical hacking masterclass
- ExamWise for CIW security professional : exam 1D0-470
- Executive's guide to cyber risk : securing the future today
- Executive's guide to cyber risk : securing the future today
- Expert Web services security in the .NET platform
- Exploiting online games : cheating massively distributed systems
- Extreme Exploits : Advanced Defenses Against Hardcore Hacks
- Federated Identity Management with IBM Tivoli Security Solutions
- Finding your cyber security path
- Firewall design and analysis