Computer security
Resource Information
The concept Computer security represents the subject, aboutness, idea or notion of resources found in University of Missouri-St. Louis Libraries.
The Resource
Computer security
Resource Information
The concept Computer security represents the subject, aboutness, idea or notion of resources found in University of Missouri-St. Louis Libraries.
- Label
- Computer security
- Authority link
- http://id.worldcat.org/fast/00872484
- Source
- fast
483 Items that share the Concept Computer security
Context
Context of Computer securitySubject of
No resources found
No enriched resources found
- ... Information Security for South Africa
- ... International Conference on Advanced Computing
- ... International Conference on Advanced Computing, Networking and Security : ADCONS ..
- 2020 Census: further actions needed to reduce key risks to a successful enumeration : testimony before the Subcommittee on Commerce, Justice, Science, and Related Agencies, Committee on Appropriations, House of Representatives
- A practical guide to TPM 2.0 : using the new Trusted Platform Module in the new age of security
- A process for developing a common vocabulary in the information security area
- A systems approach to cyber security : proceedings of the 2nd Singapore Cyber-Security R&D Conference (SG-CRC 2017)
- ACM transactions on information and system security
- ACM transactions on privacy and security
- Access contested : security, identity, and resistance in Asian cyberspace information revolution and global politics
- Advanced persistent training : take your security awareness program to the next level
- Advances in artificial intelligence for privacy protection and security
- Advances in cryptology, 1981-1997 : electronic proceedings and index of the CRYPTO and EUROCRYPT conferences, 1981-1997
- Advances in cryptology-- ASIACRYPT 2014 : 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, December 7-11, 2014, Part II
- Advances in cryptology-- ASIACRYPT 2014 : 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, December 7-11, 2014, Proceedings, Part I
- Advances in cryptology-- EUROCRYPT 2014 : 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Copenhagen, Denmark, May 11-15, 2014. Proceedings
- Advances in information and computer security : 9th International Workshop on Security, IWSEC 2014, Hirosaki, Japan, August 27-29, 2014. Proceedings
- Aerospace Computer Security Applications Conference : [proceedings]
- Aggressive network self-defense
- Agile IT security implementation methodology : plan, develop, and execute your organization's robust agile security with IBM's Senior IT Specialist
- Algorithms, architectures and information systems security
- An introduction to hacking and crimeware : a pocket guide
- Annual Computer Security Applications Conference
- Assessing information security : strategies, tactics, logic and framework
- Assessing information security at the U.S. Department of Veterans Affairs : hearing before the Subcommittee on Oversight and Investigations of the Committee on Veterans' Affairs, U.S. House of Representatives, One Hundred Eleventh Congress, second session, May 19, 2010
- Assessing the state of federal cybersecurity risk determination : hearing before the Subcommittee on Cybersecurity and Infrastructure Protection of the Committee on Homeland Security, House of Representatives, One Hundred Fifteenth Congress, second session, July 25, 2018
- At the nexus of cybersecurity and public policy : some basic concepts and issues
- Attribute-Based Access Control
- Availability, reliability, and security in information systems : IFIP WG 8.4, 8.9, TC 5 International Cross-Domain Conference, CD-ARES 2014 and 4th International Workshop on Security and Cognitive Informatics for Homeland Defense, SeCIHD 2014, Fribourg, Switzerland, September 8-12, 2014. Proceedings
- BackTrack 4 : assuring security by penetration testing
- Basics of contemporary cryptography for IT practitioners
- Behold a Pale Farce : Cyberwar, Threat Inflation, & the Malware Industrial Complex
- Best damn firewall book period
- Biohackers : the politics of open science
- Boolean functions in cryptology and information security
- Botnets : the killer web app
- Break-glass : handling exceptional situations in access control
- Buffer overflow attacks : detect, exploit, prevent
- CDM, government perspectives on security and modernization : joint hearing before the Subcommittee on Cybersecurity and Infrastructure Protection of the Committee on Homeland Security, House of Representatives and the Subcommittee on Information Technology of the Committee on Oversight and Government Reform, House of Representatives, One Hundred Fifteenth Congress, second session, March 20, 2018
- Citrix Access Gateway VPX 5.04 Essentials : a Practical Step-by-Step Guide to Provide Secure Remote Access Using the Citrix Access Gateway VPX
- Click, click, who's really there?
- Cloud Security and Governance : Who's on your cloud?
- Coding and cryptology : proceedings of the international workshop, Wuyi Mountain, Fujian, China 11-15 June 2007
- Combating cyber threat
- Combating spyware in the enterprise
- Communications and multimedia security : 15th IFIP TC 6/TC 11 International Conference, CMS 2014, Aveiro, Portugal, September 25-26, 2014 : proceedings
- Compromised data : from social media to big data
- Computer and intrusion forensics
- Computer and network security essentials
- Computer crime, investigation, and the law
- Computer forensics : a pocket guide
- Computer forensics with FTK
- Computer incident response and forensics team management : conducting a successful incident response
- Computer law and security report
- Computer safety, reliability, and security : 33rd International Conference, SAFECOMP 2014, Florence, Italy, September 10-12, 2014, proceedings
- Computer safety, reliability, and security : SAFECOMP 2014 Workshops: ASCoMS, DECSoS, DEVVARTS, ISSE, ReSA4CI, SASSUR, Florence, Italy, September 8-9, 2014 : proceedings
- Computer science and IT : investigating a cyber attack
- Computer security and cryptography
- Computer security digest
- Computer security impact of Y2K : expanded risks or fraud? Joint hearing before the Subcommittee on Technology of the Committee on Science and the Subcommittee on Government Management, Information, and Technology of the Committee on Government Reform, House of Representatives, One Hundred Sixth Congress, first session, August 4, 1999
- Computer security-- ESORICS 2014 : 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part I
- Computer security-- ESORICS 2014 : 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part II
- Computers & security
- Computers at risk : safe computing in the information age
- Conquer the web : the ultimate cybersecurity guide
- Constructive side-channel analysis and secure design : 5th International Workshop, COSADE 2014, Paris, France, April 13-15, 2014. Revised selected papers
- Consumer attitudes toward data breach notifications and loss of personal information
- Consumer online privacy : hearing before the Committee on Commerce, Science, and Transportation, United States Senate, One Hundred Eleventh Congress, second session, July 27, 2010
- Convergence : illicit networks and national security in the age of globalization
- Creating a national framework for cybersecurity : an analysis of issues and options
- Critical Infrastructure Protection
- Critical infrastructure protection VIII : 8th IFIP WG 11.10 International Conference, ICCIP 2014, Arlington, VA, USA, March 17-19, 2014, Revised selected papers
- Critical infrastructure protection against hybrid warfare security related challenges
- Cryptographic hardware and embedded systems -- CHES 2014 : 16th International Workshop, Busan, South Korea, September 23-26, 2014. Proceedings
- Cryptography and network security
- Cyber Security and Privacy : Third Cyber Security and Privacy EU Forum, CSP Forum 2014, Athens, Greece, May 21-22, 2014, Revised Selected Papers
- Cyber adversary characterization : auditing the hacker mind
- Cyber attack
- Cyber blockades
- Cyber crime, security and digital intelligence
- Cyber defence in Industry 4.0 systems and related logistics and IT infrastructures
- Cyber defense and situational awareness
- Cyber infrastructure protection : selected issues and analyses
- Cyber resiliency, security, and cloud computing suitability in military information technology
- Cyber security : a practitioner's guide
- Cyber security : an Introduction for non-technical managers
- Cyber security and IT infrastructure protection
- Cyber security and policy : a substantive dialogue
- Cyber security culture : counteracting cyber threats through organizational learning and training
- Cyber security for educational leaders : a guide to understanding and implementing technology policies
- Cyber spying : tracking your family's (sometimes) secret online lives
- Cyber terrorism : a guide for facility managers
- Cybercrime : hearing before a subcommittee of the Committee on Appropriations, United States Senate ; One Hundred Sixth Congress, second session ; special hearing
- Cyberphobia : identity, trust, security and the Internet
- Cybersecurity
- Cybersecurity
- Cybersecurity : actions needed to strengthen U.S. capabilities
- Cybersecurity : assessing the immediate threat to the United States : hearing before the Subcommittee on National Security, Homeland Defense, and Foreign Operations of the Committee on Oversight and Government Reform, House of Representatives, One Hundred Twelfth Congress, first session, May 25, 2011
- Cybersecurity : next steps to protect our critical infrastructure : hearing before the Committee on Commerce, Science, and Transportation, United States Senate, One Hundred Eleventh Congress, second session, February 23, 2010
- Cybersecurity and cyberwar : what everyone needs to know
- Cybersecurity and privacy : bridging the gap
- Cybersecurity in Finance : Getting the Policy Mix Right
- Cybersecurity operations handbook
- Cybersecurity systems for human cognition augmentation
- Cybersecurity today and tomorrow : pay now or pay later
- Cybersecurity, botnets, and cyberterrorism
- Cybersecurity: DHS needs to enhance efforts to improve and promote the security of federal and private-sector networks : testimony before the Committee on Homeland Security and Governmental Affairs, U.S. Senate
- Cyberwar, cyberterror, cybercrime and cyberactivism : an in-depth guide to the role of standards in cybersecurity environment
- Data and applications security and privacy XXVIII : 28th Annual IFIP WG 11.3 Working Conference, DBSec 2014, Vienna, Austria, July 14-16, 2014 : proceedings
- Data breaches of personally identifiable information at federal agencies : analyses and lessons
- Data privacy in the information age
- Data privacy management and autonomous spontaneous security : 8th International Workshop, DPM 2013, and 6th International Workshop, SETOP 2013, Egham, UK, September 12-13, 2013, Revised selected papers
- Data protection and the cloud : are the risks too great?
- Data security in cloud computing
- Data security, data mining and data management : technologies and challenges
- Databases and information systems VI : selected papers from the Ninth International Baltic Conference, DB & IS 2010
- Defeating the hacker : a non-technical introduction to IT security
- Defense and detection strategies against Internet worms
- Department of Defense Sponsored Information Security Research : New Methods for Protecting Against Cyber Threats
- Dependable software systems engineering
- Dependable software systems engineering
- Designing a holistic prototype and evaluating the requirements of long-term care electronic health record
- Detection of intrusions and malware, and vulnerability assessment : 11th International Conference, DIMVA 2014, Egham, UK, July 10-11, 2014. Proceedings
- Developer's guide to web application security
- Developing a HIPAA compliant EMR system : TigerPlace case study
- Developing secure distributed systems with CORBA
- Differential privacy and applications
- Digital forensics and cyber crime : fifth International Conference, ICDF2C 2013, Moscow, Russia, September 26-27, 2013, Revised selected papers
- Digital forensics and investigations : from data to digital evidence
- Digital signature standard (DSS)
- Digital watermarking and steganography
- Digitale Souveränität : Bürger, Unternehmen, Staat
- Distributed denial of service attack and defense
- Document Security : Protecting Physical and Electronic Content
- Dynamic secrets in communication security
- E-mail Security : a Pocket Guide
- E-policy : how to develop computer, E-policy, and Internet guidelines to protect your company and its assets
- ECrime Researchers Summit : [proceedings]
- EURASIP journal on information security
- Electronic identity
- Elliptic curves in cryptography
- Empirical Research for Software Security : Foundations and Experience
- Empirical research for software security : foundations and experience
- End user information security policy template
- Enemy at the water cooler : real-life stories of insider threats and Enterprise Security Management countermeasures
- Engineering Secure Internet of Things Systems
- Engineering methods and tools for software safety and security
- Enterprise Security : a Data-Centric Approach to Securing the Enterprise
- Enterprise information security and privacy
- Enterprise information systems assurance and system security : managerial and technical issues
- Essential computer security : everyone's guide to e-mail, internet, and wireless security
- Examining the evolving cyber insurance marketplace : hearing before the Subcommittee on Consumer Protection, Product Safety, Insurance, and Data Security of the Committee on Commerce, Science, and Transportation, United States Senate, One Hundred Fourteenth Congress, first session, March 19, 2015
- Examining the role of the Department of Health and Human Services in health care cybersecurity : hearing before the Subcommittee on Oversight and Investigations of the Committee on Energy and Commerce, House of Representatives, One Hundred Fifteenth Congress, first session, June 8, 2017
- Excellence in information integrity
- FISMA certification & accreditation handbook
- Facing cyber threats head on : protecting yourself and your business
- Fast software encryption : 20th International Workshop, FSE 2013, Singapore, March 11-13, 2013. Revised selected papers
- Financial cryptography and data security : FC 2014 Workshops, BITCOIN and WAHC 2014, Christ Church, Barbados, March 7, 2014 : revised selected papers
- Finding and fixing vulnerabilities in information systems : the vulnerability assessment & mitigation methodology
- Formal logical methods for system security and correctness
- Formal models and techniques for analyzing security protocols
- Foundations and practice of security : 6th International Symposium, FPS 2013, La Rochelle, France, October 21-22, 2013, Revised Selected Papers
- From hacking to report writing : an introduction to security and penetration testing
- Future crimes : everything is connected, everyone is vulnerable and what we can do about it
- Future data and security engineering : first International Conference, FDSE 2014, Ho Chi Minh City, Vietnam, November 19-21, 2014, Proceedings
- Fuzzing for software security testing and quality assurance
- Fuzzing for software security testing and quality assurance
- Getting Started with Citrix XenApp 6.5 : Design and Implement Citrix Farms Based on XenApp 6.5
- Getting started with FortiGate : simplify and protect your network using the FortiGate network security applicance
- Google hacking for penetration testers, Volume 2
- HP Nonstop server security : a practical handbook
- Hack proofing ColdFusion
- Hack proofing Linux : a guide to open source security, the only way to stop a hacker is to think like one
- Hack proofing Sun Solaris 8
- Hack proofing Windows 2000
- Hack proofing XML
- Hack proofing your Web applications : the only way to stop a hacker is to think like one
- Hack proofing your identity in the information age : protect your family on the internet!
- Hack proofing your network
- Hack the stack : using snort and ethereal to master the 8 layers of an insecure network
- Hacking Web Apps : Detecting and Preventing Web Application Security Problems
- Hacking point of sale : payment application secrets, threats, and solutions
- Handbook of electronic security and digital forensics
- Handbook on securing cyber-physical critical infrastructure
- Hands-on ethical hacking and network defense
- Honeypots and routers : collecting internet attacks
- Host integrity monitoring : using Osiris and Samhain
- How secure is our critical infrastructure? : hearing before the Committee on Governmental Affairs, United States Senate, One Hundred Seventh Congress, first session, September 12, 2001
- How to cheat at securing SQL server 2005
- How to cheat at securing your network
- Human aspects of information security, privacy, and trust : second International Conference, HAS 2014, held as part of HCI International 2014, Heraklion, Crete, Greece, June 22-27, 2014. Proceedings
- ICT systems security and privacy protection : 29th IFIP TC 11 International Conference, SEC 2014, Marrakech, Morocco, June 2-4, 2014. Proceedings
- IEE proceedings, Information security
- IEEE security & privacy
- IEEE transactions on dependable and secure computing
- IET information security
- IH & MMSec'14 : proceedings of the 2014 ACM Information Hiding and Multimedia Security Workshop : June 11-13, 2014, Salzburg, Austria
- IOMA's security director's report
- ISO27000 and information security : a combined glossary
- IT Governance to Drive High Performance : Lessons from Accenture
- IT ethics handbook : right and wrong for IT professionals
- IT induction and information security awareness : a pocket guide
- Identity, security and democracy : the Wider social and ethical implications of automated systems for human identification
- Identity-based cryptography
- Implementing database security and auditing : a guide for DBAs, information security administrators and auditors
- Implementing email security and tokens : current standards, tools, and practices
- Implementing homeland security for enterprise IT
- Implications of power blackouts for the nation's cybersecurity and critical infrastructure protection : joint hearing of the Subcommittee on Cybersecurity, Science, and Research and Development and the Subcommittee on Infrastructure and Border Security of the Select Committee on Homeland Security, House of Representatives, One Hundred Eighth Congress, first session, September 4, 2003 and September 23, 2003
- Incident management for operations
- InfoSec career hacking : sell your skillz, not your soul
- Information Security : foundations, technologies and applications
- Information and computer security
- Information assurance : dependability and security in networked systems
- Information assurance and computer security
- Information hiding techniques for steganography and digital watermarking
- Information management & computer security
- Information security : 17th international conference, ISC 2014, Hong Kong, China, October 12-14, 2014 : proceedings
- Information security : keeping data safe
- Information security : policy, processes, and practices
- Information security and cryptology -- ICISC 2013 : 16th International Conference, Seoul, Korea, November 27-29, 2013, Revised selected papers
- Information security and employee behaviour : how to reduce risk through employee education, training and awareness
- Information security and privacy : 19th Australasian Conference, ACISP 2014, Wollongong, NSW, Australia, July 7-9, 2014. Proceedings
- Information security applications : 14th International Workshop, WISA 2013, Jeju Island, Korea, August 19-21, 2013 : revised selected papers
- Information security best practices : 200 basic rules
- Information security breaches : avoidance treatment based on ISO27001
- Information security journal
- Information security practice and experience : 10th International Conference, ISPEC 2014, Fuzhou, China, May 5-8, 2014. Proceedings
- Information security technical report
- Information security terms : glossary with acronyms and abbreviations
- Information security theory and practice : securing the internet of things : 8th IFIP WG 11.2 International Workshop, WISTP 2014, Heraklion, Crete, Greece, June 30-July 2, 2014 : proceedings
- Information security, DHS needs to enhance capabilities, improve planning, and support greater adoption of its National Cybersecurity Protection System : report to congressional committees
- Information security, federal agencies need to enhance responses to data breaches : testimony before the Committee on Homeland Security and Governmental Affairs, U.S. Senate
- Information systems security
- Information systems security : 10th international conference, ICISS 2014, Hyderabad, India, December 16-20, 2014, proceedings
- Information technology for counterterrorism : immediate actions and future possibilities
- Information theoretic security : 7th international conference, ICITS 2013, Singapore, November 28-30, 2013, proceedings
- Infosecurity 2008 threat analysis
- Insider threat : protecting the enterprise from sabotage, spying, and theft
- Instant Java password and authentication security : a practical, hands-on guide to securing Java application passwords with hashing techniques
- Instant Kali Linux
- Instant OSSEC Host-based Intrusion Detection System
- Instant messaging security
- Intelligence and security informatics : Pacific asia workshop, paisi 2014, tainan, taiwan, may 13, 2014, proceedings
- Intelligent watermarking techniques
- International journal of computer network and information security
- International journal of information and network security
- International journal of information security
- International journal of information security and privacy
- International journal of information security science
- Internet security : a jumpstart for systems administrators and IT managers
- Introduction to security reduction
- Intrusion detection : a machine learning approach
- Intrusion prevention and active response : deploying network and host IPS
- Investigating and prosecuting 21st century cyber threats : hearing before the Subcommittee on Crime, Terrorism, Homeland Security, and Investigations of the Committee on the Judiciary, House of Representatives, One Hundred Thirteenth Congress, first session, March 13, 2013
- Investigative data mining for security and criminal detection
- Journal of computer security
- Journal of cybersecurity
- Journal of information privacy & security
- Journal of information security and applications
- Journal of trust management
- Just enough governance for Notes : Lotus Notes' development comes of age
- Kali Linux 2
- Kali Linux 2 : assuring security by penetration testing
- Kali Linux network scanning cookbook : over 90 hands-on recipes explaining how to leverage custom scripts and integrated tools in Kali Linux to effectively master network scanning
- Learning iOS security : enhance the security of your iOS platform and applications using iOS-centric security techniques
- Least privilege security for Windows 7, Vista, and XP : secure desktops for regulatory compliance and business agility
- Linux® hardening in hostile networks : server security from TLS to TOR
- Logics and languages for reliability and security
- Lulzsec : 50 days of Lulz
- Malware Detection
- Malware and computer security incidents : handling guides
- Managing Information Security Breaches : Studies from Real Life
- Managing information security breaches : studies from real life
- Managing risk and information security : protect to enable
- Managing risk and information security : protect to enable
- Mastering Metasploit : take your penetration testing and IT security skills to a whole new level with the secrets of Metasploit
- Mastering Microsoft Forefront UAG 2010 Customization : Discover the Secrets to Extending and Customizing Microsoft Forefront Unified Access Gateway
- Mastering the Microsoft Deployment Toolkit : take a deep dive into the world of Windows desktop deployment using the Microsoft Deployment Toolkit
- Meeting security challenges through data analytics and decision support
- Metasploit toolkit for penetration testing, exploit development, and vulnerability research
- Microsoft Forefront UAG 2010 administrator's handbook : take full command of Microsoft Forefront Unified Access Gateway to secure your business applications and provide dynamic remote access with DirectAccess
- Microsoft Vista for IT security professionals
- Microsoft windows security fundamentals
- Mission-critical network planning
- Mobile biometrics
- ModSecurity 2.5 : securing your Apache installation and web applications : prevent web application hacking with this easy-to-use guide
- Modelling cyber security : approaches, methodology, strategies
- Moodle security : learn how to install and configure Moodle in the most secure way possible
- National Institute of Standards and Technology Reauthorization Act of 2018 : report (to accompany H.R. 6229) (including cost estimate of the Congressional Budget Office)
- Navigating new cyber risks : how businesses can plan, build and manage safe spaces in the digital age
- Network attacks & exploitation : a framework
- Network science and cybersecurity
- New threats and countermeasures in digital crime and cyber terrorism
- New threats and countermeasures in digital crime and cyber terrorism
- Nokia network security : solutions handbook
- Online safety
- Online security
- Open source fuzzing tools
- Oracle 11g Anti-hacker's Cookbook
- Oracle Identity and Access Manager 11g for administrators : administer Oracle Identity and Access Management : installation, configuration, and day-to-day tasks
- Organized chaos : reimagining the internet
- Oversight of the Federal Bureau of Investigation : hearing before the Committee on the Judiciary, House of Representatives, One Hundred Fourteenth Congress, first session, October 22, 2015
- PERSPECTIVES ON CYBERSECURITY
- Pairing-based cryptography-- Pairing 2013 : 6th International Conference, Beijing, China, November 22-24, 2013, Revised selected papers
- Penetration tester's open source toolkit
- Penetration tester's open source toolkit
- Perl scripting for Windows security : live response, forensic analysis, and monitoring
- Phishing and countermeasures : understanding the increasing problem of electronic identity theft
- Physical and logical security convergence powered by enterprise security management
- Planning for the future of cyber attack attribution : hearing before the Subcommittee on Technology and Innovation, Committee on Science and Technology, House of Representatives, One Hundred Eleventh Congress, second session, July 15, 2010
- Platform embedded security technology revealed : safeguarding the future of computing with Intel Embedded Security and Management Engine
- Pluggable Authentication Modules : the definitive guide to PAM for Linux sysadmins and C developers : a comprehensive and practical guide to PAM for Linux : how modules work and how to implement them
- Practical Linux security cookbook : secure your Linux machines and keep them secured with the help of exciting recipes
- Practical Windows forensics : leverage the power of digital forensics for Windows systems
- Practical embedded security : building secure resource-constrained systems
- Practical internet of things security : a practical, indispensable security guide that will navigate you through the complex realm of securely building and deploying systems in our IoT-connected world
- Preventing digital extortion : mitigate ransomware, DDoS, and other cyber-extortion attacks
- Principles of security and trust : 7th International Conference, POST 2018, held as part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2018, Thessaloniki, Greece, April 14-20, 2018, Proceedings
- Principles of security and trust : 8th International Conference, POST 2019, held as part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2019, Prague, Czech Republic, April 6-11, 2019, Proceedings
- Principles of security and trust : Third International Conference, POST 2014, held as part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2014, Grenoble, France, April 5-13, 2014, proceedings
- Privacy enhancing technologies : 14th International Symposium, PETS 2014, Amsterdam, the Netherlands, July 16-18, 2014. Proceedings
- Privacy protection and computer forensics
- Privacy rights in the Digital Age
- Privacy rights in the Digital Age
- Privacy technologies and policy : first Annual Privacy Forum, APF 2012, Limassol, Cyprus, October 10-11, 2012, Revised selected papers
- Privacy technologies and policy : second Annual Privacy Forum, APF 2014, Athens, Greece, May 20-21, 2014, proceedings
- Privacy vs. security
- Proceedings
- Proceedings
- Proceedings
- Proceedings of the Singapore Cyber-Security Conference (SG-CRC) 2016 : cyber-security by design
- Proceedings of the Singapore Cyber-Security Conference (SG-CRC) 2016 : cyber-security by design
- Professional ASP.NET 3.5 security, membership, and role management with C♯ and VB
- Programmer's ultimate security deskref
- Progress in cryptology - AFRICACRYPT 2014 : 7th International Conference on Cryptology in Africa, Marrakesh, Morocco, May 28-30, 2014 : proceedings
- Promoting and incentivizing cybersecurity best practices : hearing before the Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies of the Committee on Homeland Security, House of Representatives, One Hundred Fourteenth Congress, first session, July 28, 2015
- Protecting maritime facilities in the 21st century : are our nation's ports at risk for a cyber attack? : hearing before the Subcommittee on Border and Maritime Security of the Committee on Homeland Security, House of Representatives, One Hundred Fourteenth Congress, first session, October 8, 2015
- Protecting personal consumer information from cyber attacks and data breaches : hearing before the Committee on Commerce, Science, and Transportation, United States Senate, One Hundred Thirteenth Congress, second session, March 26, 2014
- Protecting small businesses against emerging and complex cyber-attacks : hearing before the Subcommittee on Health and Technology of the Committee on Small Business, United States House of Representatives, One Hundred Thirteenth Congress, first session, hearing held March 21, 2013
- Protecting your library's digital sources : the essential guide to planning and preservation
- Provable security : 8th International Conference, ProvSec 2014, Hong Kong, China, October 9-10, 2014. Proceedings
- RFID protocol design, optimization, and security for the Internet of things
- Real world effects of cyber-attacks : security issues in computer-controlled production
- Recoverability as a first-class security objective : proceedings of a workshop
- Relation based access control
- Research methods for cyber security
- Rethinking public key infrastructures and digital certificates : building in privacy
- Reversing : secrets of reverse engineering
- Risk assessment and risk-driven testing : first International Workshop, RISK 2013, held in conjunction with ICTSS 2013, Istanbul, Turkey, November 12, 2013. Revised selected papers
- Risk management for computer security : Protecting your network and information assets
- Risk management solutions for Sarbanes-Oxley section 404 IT compliance
- Role mining in business : taming role-based access control administration
- Role-based access control
- Role-based access control
- SC magazine
- SQL injection attacks and defense
- Schneier on security
- Secure IT systems : 19th Nordic Conference, NordSec 2014, Tromsø, Norway, October 15-17, 2014, Proceedings
- Secure computer and network systems : modeling, analysis and design
- Secure smart embedded devices, platforms and applications
- Secure telematic applications for national scale projects
- Securing HP NonStop servers in an open systems world : TCP/IP, OSS, & SQL
- Securing IM and P2P applications for the enterprise
- Securing SCADA systems
- Securing cloud services : a pragmatic approach to security architecture in the cloud
- Securing cyberspace
- Securing information and communications systems : principles, technologies, and applications
- Securing the cloud : cloud computer security techniques and tactics
- Security and communication networks
- Security and control in information systems : a guide for business and accounting
- Security and embedded systems
- Security and game theory : algorithms, deployed systems, lessons learned
- Security and management : the 2016 WorldComp International Conference proceedings
- Security and trust management : 10th International Workshop, STM 2014, Wroclaw, Poland, September 10-11, 2014. Proceedings
- Security for mobility
- Security in computer and information sciences : first International ISCIS Security Workshop 2018, Euro-CYBERSEC 2018, London, UK, February 26-27, 2018, Revised selected papers
- Security in the digital world : for the home user, parent, consumer and home office
- Security informatics
- Security informatics and terrorism : patrolling the Web : social and technical problems of detecting and controlling terrorists' use of the World Wide Web
- Security management : a critical thinking approach
- Security protocols XVIII : 18th International Workshop, Cambridge, UK, March 24-26, 2010, Revised Selected Papers
- Security solutions for hyperconnectivity and the Internet of things
- Security technologies for the World Wide Web
- Security technologies for the World Wide Web
- Security testing handbook for banking applications
- Security, privacy, and applied cryptography engineering : 4th International Conference, SPACE 2014, Pune, India, October 18-22, 2014. Proceedings
- Selected areas in cryptography - SAC 2013 : 20th International Conference, Burnaby, BC, Canada, August 14-16, 2013 : revised selected papers
- Simple computer security : disinfect your PC
- Snort 2.0 intrusion detection
- Snort 2.1 intrusion detection
- Snort : IDS and IPS toolkit
- Sockets, shellcode, porting & coding : reverse engineering exploits and tool coding for security professionals
- Software and systems safety : specification and verification
- Software safety and security : tools for analysis and verification
- Software security engineering : design and applications
- Software system reliability and security
- Software systems safety
- Software update as a mechanism for resilience and security : proceedings of a workshop
- Spring Security essentials : a fast-paced guide for securing your Spring applications effectively with the Spring Security framework
- Stabilization, safety, and security of distributed systems : 16th International Symposium, SSS 2014, Paderborn, Germany, September 28-October 1, 2014. Proceedings
- Stealing the network : how to own a continent
- Stealing the network : how to own a shadow
- Stealing the network : how to own an identity
- Stealing the network : how to own the box
- Summary of discussions at a planning meeting on cyber-security and the insider threat to classified information
- Surveillance systems : design, applications and technology
- Syngress force emerging threat analysis : from mischief to malicious
- Taking down botnets : public and private efforts to disrupt and dismantle cybercriminal networks : hearing before the Subcommittee on Crime and Terrorism of the Committee on the Judiciary, United States Senate, One Hundred Thirteenth Congress, second session, July 15, 2014
- Target store data breaches : examination and insight
- Techniques and applications of digital watermarking and content protection
- Techno Security's guide to managing risks : for IT managers, auditors, and investigators
- Techno security's guide to e-discovery and digital forensics
- Technology and privacy : the new landscape
- Ten laws for security
- Ten rules of information security for the smaller business
- Terminal compromise
- Terrorist use of cyberspace and cyber terrorism : new challenges and reponses
- Testing software and systems : 26th IFIP WG 6.1 International Conference, ICTSS 2014, Madrid, Spain, September 23-25, 2014. Proceedings
- The Huawei and Snowden questions : Can electronic equipment from untrusted vendors be verified? Can an untrusted vendor build trust into electronic equipment?
- The InfoSec handbook : an introduction to information security
- The art of intrusion : the real stories behind the exploits of hackers, intruders & deceivers
- The basics of IT audit : purposes, processes, and practical information
- The chief information security officer : insights, tools and survival skills
- The cloud : understanding the security, privacy and trust challenges
- The complete guide to Internet security
- The current state of DHS's efforts to secure federal networks : hearing before the Subcommittee on Cybersecurity and Infrastructure Protection of the Committee on Homeland Security, House of Representatives, One Hundred Fifteenth Congress, first session, March 28, 2017
- The current state of private-sector engagement for cybersecurity : hearing before the Subcommittee on Cybersecurity and Infrastructure Protection of the Committee on Homeland Security, House of Representatives, One Hundred Fifteenth Congress, first session, March 9, 2017
- The dark side of personalization : online privacy concerns influence customer behavior
- The disaster recovery handbook : a step-by-step plan to ensure business continuity and protect vital operations, facilities, and assets
- The information systems security officer's guide : establishing and managing an information protection program
- The insider threat : combatting the enemy within
- The international handbook of computer security
- The internet of things : emergence, perspectives, privacy and security issues
- The misuse of information systems : the impact of security countermeasures
- The nuclear effect of computer malware : impact of politics on computer-controlled operational processes
- The personal security handbook : practical tools for keeping yourself, your family & your things safe at work, home or on the road
- The privacy engineer's manifesto : getting from policy to code to QA to value
- The privacy engineer's manifesto : getting from policy to code to QA to value
- The second economy : the race for trust, treasure and time in the cybersecurity war
- The state of online consumer privacy : hearing before the Committee on Commerce, Science, and Transportation, United States Senate, One Hundred Twelfth Congress, first session, March 16, 2011
- The state of small business security in a cyber economy : hearing before the Subcommittee on Regulatory Reform and Oversight of the Committee on Small Business, House of Representatives, One Hundred Ninth Congress, second session, Washington, DC, March 16, 2006
- The status and outlook for cybersecurity efforts in the energy industry : hearing before the Committee on Energy and Natural Resources, United States Senate, One Hundred Sixteenth Congress, first session, February 14, 2019
- Timely actions needed to improve DOT's cybersecurity : Department of Transportation
- Topics in cryptology -- CT-RSA 2014 : the Cryptographers' track at the RSA Conference 2014, San Francisco, CA, USA, February 25-28, 2014 : proceedings
- Toward a safer and more secure cyberspace
- Trojans, worms, and spyware : a computer security professional's guide to malicious code
- Trust Management VIII : 8th IFIP WG 11.11 International Conference, IFIPTM 2014, Singapore, July 7-10, 2014. Proceedings
- Trust and security in collaborative computing
- Trust and trustworthy computing : 7th International Conference, Trust 2014, Heraklion, Crete, Greece, June 30-July 2, 2014 : proceedings
- Trust management in cloud services
- Trusted cloud computing
- Trusted computing
- Trusted computing platforms : TPM2.0 in context
- Trusted platform module basics : using TPM in embedded systems
- Trusted platform modules : why, when and how to use them
- Trustworthy execution on mobile devices
- Trustworthy global computing : 8th International Symposium, TGC 2013, Buenos Aires, Argentina, August 30-31, 2013 : revised selected papers
- Trustworthy global computing : 9th International Symposium, TGC 2014, Rome, Italy, September 5-6, 2014. Revised selected papers
- Trustworthy reconfigurable systems : enhancing the security capabilities of reconfigurable hardware architectures
- Understanding security issues
- Understanding the cyber threat and implications for the 21st century economy : hearing before the Subcommittee on Oversight and Investigations of the Committee on Energy and Commerce, House of Representatives, One Hundred Fourteenth Congress, first session, March 3, 2015
- Understanding the cybersecurity of America's aviation sector : joint hearing before the Subcommittee on Cybersecurity and Infrastructure Protection and the Subcommittee on Transportation and Protective Security of the Committee on Homeland Security, House of Representatives, One Hundred Fifteenth Congress, second session, September 6, 2018
- User's guide to cryptography and standards
- Verification of infinite-state systems with applications to security
- WarDriving & wireless penetration testing
- WarDriving : drive, detect, defend : a guide to wireless security
- Web Penetration Testing with Kali Linux : a Practical Guide to Implementing Penetration Testing Strategies on Websites, Web Applications, and Standard Web Protocols with Kali Linux
- Web and information security
- Web application vulnerabilities : detect, exploit, prevent
- Web commerce security : design and development
- What Is Cybersecurity?
- What should go on the internet : privacy, freedom, and security online
- Who goes there? : authentication through the lens of privacy
- Windows Malware analysis essentials : master the fundamentals of malware analysis for the Windows platform and enhance your anti-malware skill set
- Windows Server 2003 security infrastructures
- Windows forensic analysis : DVD toolkit
- Wireless operational security
- Writing security tools and exploits
- Zabbix 1.8 network monitoring : monitor your network's hardware, servers, and web performance effectively and efficiently
- Zabbix Network Monitoring - Second Edition
- Zen and the art of information security
- Zero day exploit : countdown to darkness
- Zero days, thousands of nights : the life and times of zero-day vulnerabilities and their exploits
Embed
Settings
Select options that apply then copy and paste the RDF/HTML data fragment to include in your application
Embed this data in a secure (HTTPS) page:
Layout options:
Include data citation:
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.umsl.edu/resource/sYZEa-kaPdo/" typeof="CategoryCode http://bibfra.me/vocab/lite/Concept"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.umsl.edu/resource/sYZEa-kaPdo/">Computer security</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.umsl.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.umsl.edu/">University of Missouri-St. Louis Libraries</a></span></span></span></span></div>
Note: Adjust the width and height settings defined in the RDF/HTML code fragment to best match your requirements
Preview
Cite Data - Experimental
Data Citation of the Concept Computer security
Copy and paste the following RDF/HTML data fragment to cite this resource
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.umsl.edu/resource/sYZEa-kaPdo/" typeof="CategoryCode http://bibfra.me/vocab/lite/Concept"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.umsl.edu/resource/sYZEa-kaPdo/">Computer security</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.umsl.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.umsl.edu/">University of Missouri-St. Louis Libraries</a></span></span></span></span></div>