|
Cyber security standards, practices and industrial applications
|
Junaid Ahmed Zubairi |
"This book details the latest and most important advances in security standards, introducing the differences between information security (covers the understanding of security requirements, classific… |
OL15917366W |
|
Distributed systems security issues, processes, and solutions
|
Abhijit Belapurkar |
This book outlines and describes the impact of the latest trends in distributed systems on security threats, and solutions addressing these threats; with an exhaustive overview of the underlying theo… |
OL16766950W |
|
Managing Risk in Information Systems
|
Melody Carlson |
Annotation |
OL16974874W |
|
WHOIS running the Internet
|
Garth O. Bruen |
"This book provides a comprehensive overview of WHOIS. The text begins with an introduction to WHOIS and an in-depth coverage of its forty-year history. Afterwards it examines how to use WHOIS and ho… |
OL20025997W |
|
Computer Security Handbook
|
Seymour Bosworth |
This is the most comprehensive book on computer security on the market, with 23 chapters and 29 Appendices covering virtually all aspects of computer security. Chapters are contributed by recogniz… |
OL9385944W |