Computer security
Resource Information
The concept Computer security represents the subject, aboutness, idea or notion of resources found in Missouri University of Science & Technology Library.
The Resource
Computer security
Resource Information
The concept Computer security represents the subject, aboutness, idea or notion of resources found in Missouri University of Science & Technology Library.
- Label
- Computer security
- Source
- blmlsh
82 Items that share the Concept Computer security
Context
Context of Computer securitySubject of
No resources found
No enriched resources found
- A practical guide to trusted computing
- Absolute beginner's guide to security, spam, spyware and viruses
- Advanced host intrusion prevention with CSA
- Ajax security
- An introduction to information security and ISO27001 : a pocket guide
- Applied security visualization
- Buffer-Overflows und Format-String-Schwachstellen : Funktionsweisen, Exploits und Gegenmassnahmen
- Building secure software : how to avoid security problems the right way
- Chained exploits : advanced hacking attacks from start to finish
- Check Point NGX R65 security administration
- Cisco DCUCI quick reference
- Computer forensics for dummies
- Computer security basics
- Computer-related risks
- Creating the secure managed desktop : using group policy, SoftGrid, Microsoft deployment toolkit, and other management tools
- Crimeware : understanding new attacks and defenses
- Cryptography in C and C++
- Deployment guide series, IBM Tivoli Identity Manager 5.0
- Dissecting the hack : the f0rb1dd3n network
- Endpoint security
- Enemy at the water cooler : real-life stories of insider threats and Enterprise Security Management countermeasures
- Foundations of Mac OS X Leopard security
- Fuzzing : brute force vulnerabilty discovery
- Geekonomics : the real cost of insecure software
- Googling security : how much does Google know about you?
- Gray hat Python : Python programming for hackers and reverse engineers
- Group policy : fundamentals, security, and the managed desktop
- Group policy : fundamentals, security, and troubleshooting
- Hacking : the art of exploitation
- Hacking : the next generation
- Hacking for dummies
- How personal & Internet security works
- How to cheat at Windows system administration using command line scripts
- Hunting security bugs
- ISO27001 in a Windows Environment : the best practice handbook for a Microsoft Windows environment
- Information assurance : dependability and security in networked systems
- Internet forensics
- Is it safe? : protecting your computer, your business, and yourself online
- Linux annoyances for geeks
- Linux on IBM eserver zSeries and S/390 : best security practices
- Mainframe basics for security professionals : getting started with RACF
- Mastering System Center Data Protection Manager 2007
- Microsoft Windows XP networking and security : also covers Windows 2000
- Microsoft Windows server 2008 security resource kit
- Microsoft windows security resource kit
- Modern cryptanalysis : techniques for advanced code breaking
- Network security : private communication in a public world
- Network security bible
- Network security hacks
- Netzwerkangriffe von innen
- OS X exploits and defense
- Reversing : secrets of reverse engineering
- SOA security
- Secure coding in C and C++
- Secure programming with static analysis
- Securing the Vista environment
- Security policies and implementation issues
- Security power tools
- Snort 2.0 intrusion detection
- Snort 2.1 intrusion detection
- Software security engineering : a guide for project managers
- Solaris security essentials
- Surreptitious software : obfuscation, watermarking, and tamperproofing for software protection
- The CERT C secure coding standard
- The CSSLP prep guide : mastering the Certified Secure Software Lifecycle Professional
- The art of deception : controlling the human element of security
- The art of software security assessment : identifying and preventing software vulnerabilities
- The craft of system security
- The myths of security : what the computer security industry doesn't want you to know
- The new school of information security
- The security development lifecycle : SDL, a process for developing demonstrably more secure software
- Understanding Windows CardSpace : an introduction to the concepts and challenges of digital identities
- VMware vSphere and virtual infrastructure security : securing the virtual environment
- Virtual honeypots : from botnet tracking to intrusion detection
- Virtualization and forensics : a digital forensic investigator's guide to virtual environments
- WarDriving & wireless penetration testing
- Windows Vista security : securing Vista against malicious attacks
- Windows Vista security for dummies
- Windows forensic analysis DVD toolkit 2E
- Windows lockdown! : your XP and Vista guide against hacks, attacks, and other Internet mayhem
- Windows vista security : praxisorientierte Sicherheit für Profis
- Zabbix 1.8 network monitoring
Embed
Settings
Select options that apply then copy and paste the RDF/HTML data fragment to include in your application
Embed this data in a secure (HTTPS) page:
Layout options:
Include data citation:
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.library.mst.edu/resource/QErmXy8x0Dg/" typeof="CategoryCode http://bibfra.me/vocab/lite/Concept"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.library.mst.edu/resource/QErmXy8x0Dg/">Computer security</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.library.mst.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.library.mst.edu/">Missouri University of Science & Technology Library</a></span></span></span></span></div>
Note: Adjust the width and height settings defined in the RDF/HTML code fragment to best match your requirements
Preview
Cite Data - Experimental
Data Citation of the Concept Computer security
Copy and paste the following RDF/HTML data fragment to cite this resource
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.library.mst.edu/resource/QErmXy8x0Dg/" typeof="CategoryCode http://bibfra.me/vocab/lite/Concept"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.library.mst.edu/resource/QErmXy8x0Dg/">Computer security</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.library.mst.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.library.mst.edu/">Missouri University of Science & Technology Library</a></span></span></span></span></div>