Security intelligence : a practitioner's guide to solving enterprise security challenger
| Main Author: | Qing, Li |
|---|---|
| Other Authors: | Clark, Gregory |
| Format: | Book |
| Published: |
Indianapolis :
John Wiley & Sons, Inc. ,
2015
|
| Subjects: |
Similar Items
Computer security
by: Gollmann, Dieter
Published: (2006)
by: Gollmann, Dieter
Published: (2006)
Network security : a beginner's guide
by: Maiwald, Eric
Published: (2001)
by: Maiwald, Eric
Published: (2001)
Securing the cloud : cloud comuter security techniques and tactics
by: Winkler, Vic (J.R.)
Published: (2011)
by: Winkler, Vic (J.R.)
Published: (2011)
Computer security fundamentals
by: Easttom, Chuck
Published: (2012)
by: Easttom, Chuck
Published: (2012)
Network security bible
by: Cole, Eric
Published: (2009)
by: Cole, Eric
Published: (2009)
Elementary information security
by: Smith, Richard E.
Published: (2016)
by: Smith, Richard E.
Published: (2016)
Network security architectures
by: Convery, Sean
Published: (2004)
by: Convery, Sean
Published: (2004)
CLOUD SECURITY : A GENERAL GUIDE TO SECURED COMPUTING
by: Masnida Hussin, et al.
Published: (2021)
by: Masnida Hussin, et al.
Published: (2021)
The complete guide to internet security
by: Merkow, Mark S
Published: (2000)
by: Merkow, Mark S
Published: (2000)
Implementing internet security
Published: (1995)
Published: (1995)
The Underground guide to computer security : slightly askew advice on protecting your PC and what's on it
by: Alexander, Michael
Published: (1996)
by: Alexander, Michael
Published: (1996)
TRIBE OF HACKERS SECURITY LEADERS : TRIBAL KNOWLEDGE FROM THE BEST IN CYBERSECURITY LEADERSHIP
by: Carey, Marcus J., et al.
Published: (2020)
by: Carey, Marcus J., et al.
Published: (2020)
Fundamentals of network security
by: Maiwald, Eric
Published: (2004)
by: Maiwald, Eric
Published: (2004)
Principles of information security
by: Whitman, Michael E.
Published: (2003)
by: Whitman, Michael E.
Published: (2003)
Information security : contemporary cases
by: Wright, Marie A.
Published: (2006)
by: Wright, Marie A.
Published: (2006)
Wireless security : models, threats and solutions
by: Nichols, Randall K.
Published: (2002)
by: Nichols, Randall K.
Published: (2002)
Data-driven security
by: Jacobs, Jay
Published: (2014)
by: Jacobs, Jay
Published: (2014)
Information technology security
Published: (2006)
Published: (2006)
Computer security handbook
by: Baker, Richard H
Published: (1991)
by: Baker, Richard H
Published: (1991)
24 deadly sins of software security : programming flaws and how to fix them
by: Howard, Michael 1965-
Published: (2010)
by: Howard, Michael 1965-
Published: (2010)
Fundamentals of information systems security
by: Kim, David
Published: (2012)
by: Kim, David
Published: (2012)
Security in computing
by: Pfleeger, Charles P
Published: (2007)
by: Pfleeger, Charles P
Published: (2007)
Security risk management : building an information security risk management program from the ground up
by: Wheeler, Evan
Published: (2011)
by: Wheeler, Evan
Published: (2011)
Security automation essentials
Published: (2012)
Published: (2012)
STEAM JOBS IN CYBER-SECURITY
by: Argentine, Cynthia
Published: (2020)
by: Argentine, Cynthia
Published: (2020)
Social engineering in IT security : tools, tactics, and techniques
by: Conheady, Sharon
Published: (2014)
by: Conheady, Sharon
Published: (2014)
How personal & internet security work
by: Gralla, Preston
Published: (2006)
by: Gralla, Preston
Published: (2006)
Building secure software : how to avoid security problems the right way
by: Viega, John
Published: (2002)
by: Viega, John
Published: (2002)
Securing SQL server : protecting your database from attackers
by: Cherry, Denny
Published: (2011)
by: Cherry, Denny
Published: (2011)
Getting an information security job for dummies
by: Gregory, Peter H
Published: (2015)
by: Gregory, Peter H
Published: (2015)
NAVIGATING THE CYBER SECURITY CAREER PATH
by: Patton, Helen E.
Published: (2022)
by: Patton, Helen E.
Published: (2022)
Security in fixed and wireless networks : an introduction to securing data communications
by: Schafer, Gunter
Published: (2003)
by: Schafer, Gunter
Published: (2003)
Security strategy : from requirements to reality
by: Stackpole, Bill
Published: (2011)
by: Stackpole, Bill
Published: (2011)
Hacking exposed malware & rootkits : malware & rootkits security secrets & solutions
by: Davis, Michael
Published: (2010)
by: Davis, Michael
Published: (2010)
Hack attacks revealed : a complete reference with custom security haking toolkit
by: Chirillo, John
Published: (2001)
by: Chirillo, John
Published: (2001)
Cyberphobia : identity, trust, security and the internet
by: Lucas, Edward
Published: (2015)
by: Lucas, Edward
Published: (2015)
RSA security's official guide to cryptography
by: Burnett, Steve
Published: (2001)
by: Burnett, Steve
Published: (2001)
19 deadly sins of software security : programming flaws and how to fix them
by: Howard, Michael
Published: (2005)
by: Howard, Michael
Published: (2005)
Windows Server 2008 PKI and certificate security
by: Komar, Brian
Published: (2008)
by: Komar, Brian
Published: (2008)
Microsoft Windows Server 2008 Security resource kit
by: Johansson, Jesper M
Published: (2008)
by: Johansson, Jesper M
Published: (2008)
Similar Items
-
Computer security
by: Gollmann, Dieter
Published: (2006) -
Network security : a beginner's guide
by: Maiwald, Eric
Published: (2001) -
Securing the cloud : cloud comuter security techniques and tactics
by: Winkler, Vic (J.R.)
Published: (2011) -
Computer security fundamentals
by: Easttom, Chuck
Published: (2012) -
Network security bible
by: Cole, Eric
Published: (2009)