Computer networks + Security measures
Label
Computer networks + Security measures
Name
Computer networks + Security measures
Sub focus
Actions
Incoming Resources
- Social engineering, how crowdmasters, phreaks, hackers, and trolls created a new form of manipulative communication, Robert W. Gehl and Sean T. Lawson
- Cybersecurity today and tomorrow, pay now or pay later, Computer Science and Telecommunications Board, Division of Engineering and Physical Sciences, National Research Council
- Conoce todo sobre Kali Linux, David Santo Orcero
- The international handbook of computer security, Jae K. Shim ... [et al.]
- Beginning security with Microsoft technologies, protecting Office 365, devices, and data, Vasantha Lakshmi
- Advanced persistent threat, understanding the danger and how to protect your organization, Dr. Eric Cole
- CCNA routing and switching complete review guide, Todd Lammle
- Hunting cyber criminals, a hacker's guide to online intelligence gathering tools and techniques, Vinny Troia, PhD
- Cybersecurity
- Network security hacks, Andrew Lockhart
- Hands-on incident response and digital forensics, Mike Sheward
- You'll see this message when it is too late, the legal and economic aftermath of cybersecurity breaches, Josephine Wolff
- Conquer the web, the ultimate cybersecurity guide, edited by Jonathan Reuvid
- How cybersecurity really works, a hands-on guide for total beginners, by Sam Grubb
- Anti-hacker tool kit, Mike Shema ... [et al.]
- Cybersecurity program development for business, the essential planning guide, Chris Moschovitis
- Cyberjutsu, cybersecurity for the modern ninja, by Ben McCarty
- Comptia PenTest+ certification, by Glen E. Clarke, MCT
- Current security management & ethical issues of information technology, edited by Rasool Azari
- The Internet under crisis conditions, learning from September 11, Committee on the Internet Under Crisis Conditions: Learning from September 11, Computer Science and Telecommunications Board, Division on Engineering and Physical Sciences, National Research Council of the National Academies
- International relations in the cyber age, the co-evolution dilemma, Nazli Choucri and David D. Clark
- Beautiful security, edited by Andy Oram and John Viega
- Hacking exposed Cisco networks, Cisco security secrets & solutions, Andrew A. Vladimirov ... [et al.]
- Practical guide for implementing secure intranets and extranets, Kaustubh M. Phaltankar
- The secret to cybersecurity, a simple plan to protect your family and business from cybercrime, Scott E. Augenbaum
- Network attacks & exploitation, a framework, Matthew Monte
- NT & virtual private networks seminar, participant's guide, [Charlie Scott]
- Snort for dummies, by Charlie Scott, Paul Wolfe, and Bert Hayes
- MCSE self-paced training kit (exam 70-298), designing security for a Microsoft Windows Server 2003 network, Roberta Bragg
- Cisco security architectures, Gilbert Held, Kent Hundley
- Defense against the black arts, how hackers do what they do and how to protect against it, Jesse Varsalone, Matthew McFadden ; with Sean Morrissey ... [et al.] ; foreword by Joe McCray
- Hacking for dummies, by Kevin Beaver, CISSP ; foreword by Richard Stiennon, Chief Research Analyst, IT-Harvest, author of There will be cyberwar
- Network security, a beginner's guide, Eric Maiwald
- How to stop e-mail spam, spyware, malware, computer viruses, and hackers from ruining your computer or network, the complete guide for your home and work, by Bruce C. Brown
- Hack attacks revealed, a complete reference with custom security hacking toolkit, John Chirillo
- Hacking for dummies, by Kevin Beaver
- The basics of cyber safety, computer and mobile device safety made easy, John Sammons, Michael Cross
- Hacking the hacker, learn from the experts who take down hackers, Roger A. Grimes
- Cyberspies, the secret history of surveillance, hacking, and digital espionage, Gordon Corera
- Rise of the hackers, produced and directed by Kate Dart ; produced for Nova by BBC
- Introduction to network security, theory and practice, Jie Wang, University of Massachusetts Lowell, US ; Zachary A. Kissel, Merrimack College, US
- Defending the digital frontier, a security agenda, Mark W. Doll, Sajay Rai, Jose Granado
- Hack attacks denied, a complete guide to network lockdown, John Chirillo
- Hadoop security, Ben Spivey & Joey Echeverria
- Hacking, the art of exploitation, Jon Erickson
- Hacking exposed computer forensics, secrets & solutions, Chris Davis, David Cowen, Aaron Philipp
- Ciberseguridad, protege tu identidad y tus datos, Mary-Lane Kamberg ; traducido por Alberto Jim?nez
- Information assurance handbook, effective computer security and risk management strategies, Corey Schou, Steven Hernandez
- Security fundamentals, Crystal Panek
- Trust in cyberspace, Fred B. Schneider, editor ; Committee on Information Systems Trustworthiness, Computer Science and Telecommunications Board, Commission on Physical Sciences, Mathematics, and Applications, National Research Council