Computer networks -- Security measures
Resource Information
The concept Computer networks -- Security measures represents the subject, aboutness, idea or notion of resources found in Missouri University of Science & Technology Library.
The Resource
Computer networks -- Security measures
Resource Information
The concept Computer networks -- Security measures represents the subject, aboutness, idea or notion of resources found in Missouri University of Science & Technology Library.
- Label
- Computer networks -- Security measures
- Source
- blmlsh
89 Items that share the Concept Computer networks -- Security measures
Context
Context of Computer networks -- Security measuresSubject of
No resources found
No enriched resources found
- Ajax security
- Apache cookbook
- Apache cookbook
- Applied security visualization
- Beautiful security
- Business continuity & disaster recovery for IT professionals
- CCSP SNAA quick reference
- CCSP SNAF quick reference
- Chained exploits : advanced hacking attacks from start to finish
- Cisco ASA : all-in-one firewall, IPS, Anti-X, and VPN adaptive security appliance
- Cisco ASA, PIX, and FWSM firewall handbook
- Cisco CCSP SNRS quick reference
- Cisco NAC appliance : enforcing host security with clean access
- Cisco Network Admission Control, Vol. 1, NAC architecture and design
- Cisco firewall technology
- Cisco secure firewall services module (FWSM)
- Cloud security and privacy
- Computer security basics
- Configuring Juniper Networks NetScreen & SSG firewalls
- Counter hack reloaded : a step-by-step guide to computer attacks and effective defenses
- Deploying Microsoft Forefront Protection 2010 for Exchange Server
- Deploying Microsoft Forefront Threat Management Gateway 2010
- Deploying Microsoft Forefront Unified Access Gateway 2010
- Deploying zone-based firewalls
- Designing and building enterprise DMZs
- Disappearing cryptography : information hiding, steganography & watermarking
- Dissecting the hack : the f0rb1dd3n network
- End-to-end network security : defense-in-depth
- Endpoint security
- Enemy at the water cooler : real-life stories of insider threats and Enterprise Security Management countermeasures
- Exploiting online games : cheating massively distributed systems
- Fuzzing : brute force vulnerabilty discovery
- Googling security : how much does Google know about you?
- Hacking : the art of exploitation
- Hacking : the next generation
- Hacking VoIP
- Hacking for dummies
- How to break Web software : functional and security testing of Web applications and Web services
- How to cheat at Windows system administration using command line scripts
- Hunting security bugs
- IPv6 security
- Implementing Cisco IOS network security (IINS)
- Information assurance : dependability and security in networked systems
- Inside network security assessment : guarding your IT infrastructure
- Is it safe? : protecting your computer, your business, and yourself online
- Mac OS X security and mobility v10.6
- Mastering System Center Data Protection Manager 2007
- Microsoft Windows XP networking and security : also covers Windows 2000
- Microsoft Windows server 2008 security resource kit
- Microsoft windows security resource kit
- Nessus, Snort, & Ethereal power tools : customizing open source security applications
- Network access control for dummies
- Network security assessment
- Network security assessment : from vulnerability to patch
- Network security bible
- Network security first-step
- Network security hacks
- Network security technologies and solutions
- Netzwerkangriffe von innen
- Netzwerksicherheit für Dummies
- PCI compliance : implementing effective PCI data security standards
- Penetration tester's open source toolkit
- Professional penetration testing : creating and operating a formal hacking lab
- Router security strategies : securing IP network traffic planes
- SELinux by example : using security enhanced Linux
- SOA security
- Screenos cookbook
- Security monitoring
- Security monitoring with Cisco security MARS
- Security policies and implementation issues
- Security power tools
- Security threat mitigation and response : understanding Cisco security MARS
- Selecting the right NAP architecture
- Self-defending networks : the next generation of network security
- Silence on the wire : a field guide to passive reconnaissance and indirect attacks
- Snort 2.1 intrusion detection
- Software security engineering : a guide for project managers
- Spring security 3 : secure your web applications against malicious intruders with this easy to follow practical guide
- The art of software security assessment : identifying and preventing software vulnerabilities
- The craft of system security
- Unauthorised access : physical penetration testing for IT security teams
- Windows Server 2003 security cookbook
- Windows Server 2008 Active Directory domain services
- Windows Server 2008 PKI and certificate security
- Windows Server 2008 networking and network access protection (NAP)
- Windows forensic analysis DVD toolkit 2E
- Windows lockdown! : your XP and Vista guide against hacks, attacks, and other Internet mayhem
- Z/OS WebSphere and J2EE security handbook
- Zabbix 1.8 network monitoring
Embed
Settings
Select options that apply then copy and paste the RDF/HTML data fragment to include in your application
Embed this data in a secure (HTTPS) page:
Layout options:
Include data citation:
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.library.mst.edu/resource/M0QRx_1YwHQ/" typeof="CategoryCode http://bibfra.me/vocab/lite/Concept"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.library.mst.edu/resource/M0QRx_1YwHQ/">Computer networks -- Security measures</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.library.mst.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.library.mst.edu/">Missouri University of Science & Technology Library</a></span></span></span></span></div>
Note: Adjust the width and height settings defined in the RDF/HTML code fragment to best match your requirements
Preview
Cite Data - Experimental
Data Citation of the Concept Computer networks -- Security measures
Copy and paste the following RDF/HTML data fragment to cite this resource
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.library.mst.edu/resource/M0QRx_1YwHQ/" typeof="CategoryCode http://bibfra.me/vocab/lite/Concept"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.library.mst.edu/resource/M0QRx_1YwHQ/">Computer networks -- Security measures</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.library.mst.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.library.mst.edu/">Missouri University of Science & Technology Library</a></span></span></span></span></div>