Computer networks + Security measures
Label
Computer networks + Security measures
Name
Computer networks + Security measures
Sub focus
Actions
Incoming Resources
- The basics of cyber safety, computer and mobile device safety made easy, John Sammons, Michael Cross
- People-centric security, transforming your enterprise security culture, Lance Hayden
- Beautiful security, edited by Andy Oram and John Viega
- Threat modeling, designing for security, Adam Shostack
- Hacking, by Kevin Beaver
- Information security, USDA needs to implement its departmentwide information security plan : report to the Chairman, Subcommittee on Department Operations, Oversight, Nutrition, and Forestry, Committee on Agriculture, House of Representatives, United States General Accounting Office
- Cyber security, a practitioner's guide, David Sutton
- Hacking for dummies, by Kevin Beaver
- Cyberspies, the secret history of surveillance, hacking, and digital espionage, Gordon Corera
- Malware infections on EDA's systems were overstated and the disruption of IT operations was unwarranted
- Cybersecurity and cyberwar, what everyone needs to know, P.W. Singer and Allan Friedman
- Hacking, the art of exploitation, Jon Erickson
- Cyber smart, five habits to protect your family, money, and identity from cyber criminals, Bart R. McDonough
- Cybersecurity for beginners, Raef Meeuwisse
- Hacking for dummies, by Kevin Beaver ; foreword by Stuart McClure
- Hacker's challenge, test your incident response skills using 20 scenarios, Mike Schiffman
- Computer forensics with FTK, Fernando Carbone
- Hacking exposed, mobile security secrets & solutions, Neil Bergman, Mike Stanfield, Jason Rouse, Joel Scambray
- Home and small business guide to protecting your computer network, electronic assets, and privacy, Philip Alexander
- Network security assessment, know your network, Chris McNab
- Using the Internet safely for seniors for dummies, by Linda Criddle and Nancy Muir
- Picture yourself networking your home or small office, step-by-step instruction for designing, installing, and managing a wired or wireless computer network, Dennis C. Brewer
- The practice of network security monitoring, understanding incident detection and response, by Richard Bejtlich
- Guide to enterprise patch management technologies (draft), recommendations of the National Institute of Standards and Technology, Murugiah Souppaya, Karen Scarfone
- Ciberseguridad, protege to identidad y tus datos, Mary-Lane Kambert ; translated by Alberto Jiménez
- Tor and the dark net, remain anonymous and evade NSA spying, James Smith
- Cybersecurity essentials, Charles J. Brooks, Christopher Grow, Philip Craig, Donald Short
- World Wide Web, web accessibility and services, Lourdes Lavigne
- Hacking the hacker, learn from the experts who take down hackers, Roger A. Grimes
- Cisco ASA, all-in-one firewall, IPS, and VPN adaptive security appliance, Jazib Frahim, Omar Santos
- Hacking for dummies, by Kevin Beaver, CISSP
- Practical vulnerability management, a strategic approach to managing cyber risk, Andrew Magnusson
- Policy expression and enforcement for handheld devices, Wayne Jensen ... [and others]
- Creating a patch and vulnerability management program, recommendations of the National Institute of Standards and Technology (NIST), Peter Mell, Tiffany Bergeron, David Henning
- Information assurance, trends in vulnerabilities, threats, and technologies, edited by Jacques S. Gansler and Hans Binnendijk
- Guidelines on securing public web servers, recommendations of the National Institute of Standards and Technology, Miles Tracy, Wayne Jansen, and Mark McLamon
- Improved security planning needed for the customer technology solutions project
- Executive's guide to cyber risk, securing the future today, Siegfried Moyo
- The basics of cyber warfare, understanding the fundamentals of cyber warfare in theory and practice, Steve Winterfeld, Jason Andress ; technical editor, Andrew Hay
- Network attacks & exploitation, a framework, Matthew Monte
- A framework for multi-mode authentication, overview and implementation guide, Wayne Jansen [and others]
- Computer network attack and international law, Michael N. Schmitt & Brian T. O'Donnell, editors
- Thinking about cybersecurity, from cyber crime to cyber warfare, Paul Rosenzweig
- Introduction to information security, a strategic-based approach, Timothy Shimeall, Jonathan M. Spring
- The hacker playbook, practical guide to penetration testing, Peter Kim
- Takedown, the pursuit and capture of Kevin Mitnick, America's most wanted computer outlaw, by the man who did it, Tsutomu Shimomura with John Markoff
- Firewall fundamentals, Wes Noonan, Ido Dubrawsky
- Linux security cookbook, Daniel J. Barrett, Richard Silverman, and Robert G. Byrnes
- Protect your home PC, hackers, viruses, and privacy
- Hacking For Dummies