Search Images Maps Play YouTube News Gmail Drive More »
Sign in
Books Books 31 - 40 of about 47 related to Analyzing Computer Security: A Threat/vulnerability/countermeasure Approach.   

Security+ Exam Guide

Christopher Crayton - Computers - 2003 - 416 pages
No preview available - About this book

Computer Security

Dieter Gollmann - Computers - 2011 - 436 pages
This text moves away from the 'multi-level' security approach to compare and evaluate design alternatives in computer security. It provides technology-proof insights, and ...
Limited preview - About this book

Network Defense and Countermeasures: Principles and Practices

Chuck Easttom - Computers - 2013 - 483 pages
Network Defense and Countermeasures: Principles and Practices Everything you need to know about modern network attacks and defense, in one book Clearly explains core network ...
Limited preview - About this book

Security+

Kalani Kirk Hausman, Diane Barrett, Martin Weiss - Computers - 2003 - 484 pages
Offers test-taking strategies and tips while covering topics including communications security, protocols, intrusion detection components, cryptography, and business continuity.
Limited preview - About this book

Information Security Intelligence: Cryptographic Principles and Applications

Thomas Calabrese - Computers - 2004 - 555 pages
Safeguarding the confidentiality, authenticity, integrity, and non-repudiation of information is paramount to organizational stability and success. This new book provides an ...
Limited preview - About this book

Fundamentals of Network Security

John E. Canavan - Computers - 2001 - 319 pages
Many books focus on one operating system when considering network security. John E. Canavan's reference work covers principles and practical applications that can be used with ...
Limited preview - About this book

Maximum Windows 2000 Security

Mark Burnett, Chris Amaris, Chris Doyle, L. J. Locher, Rand Morimoto - Computers - 2001 - 596 pages
This guide reveals the holes and weaknesses that compromise Windows 2000 security and how to fix them. Topics covered include physical and file system security, password ...
Limited preview - About this book




  1. My library
  2. Help
  3. Advanced Book Search