Search Results - Data and Security::005.8: Computer Security

Refine Results
  1. 1

    Cyber security in parallel and distributed computing : concepts, techniques, applications and case studies by Le, Dac-Nhuong, Kumar, Raghvendra, Mishra, Brojo Kishore, Khari, Manju, Chatterjee, Jyotir Moy

    ISBN: 1119488052, 9781119488057
    Published: Beverly, Mass John Wiley & Sons 2019
    “… This important book cover subjects such as: Research and solutions for the problem of hidden image detection Security aspects of data mining and possible solution techniques A comparative analysis of various methods used in e-commerce security…”
    Get full text
    eBook Book
  2. 2

    Computer Security and Encryption - An Introduction by Chauhan, S. R, Jangra, S

    ISBN: 1683925319, 9781683925316
    Published: Berlin Mercury Learning and Information 2020
    “…Because of the rapid growth of cybercrime, cryptography and system security may be the fastest growing technologies in our culture today…”
    Get full text
    eBook
  3. 3

    Cybersecurity - A Self-Teaching Introduction by Goyal, K. K, Garg, Amit

    ISBN: 1683924983, 9781683924982
    Published: Herndon, VA Mercury Learning and Information 2020
    “… It introduces all of the major subjects related to cybersecurity, including data security, threats and viruses, malicious software, firewalls and VPNs, security architecture and design, security…”
    Get full text
    eBook
  4. 4

    Hardware Security - A Hands-On Learning Approach by Bhunia, Swarup, Tehranipoor, Mohammad H.

    ISBN: 0128124776, 9780128124772
    Published: Cambridge, MA Elsevier 2019
    “…This book provides a broad, comprehensive and practical overview of hardware security that encompasses all levels of the electronic hardware infrastructure…”
    Get full text
    eBook Book
  5. 5

    IT Governance – An international guide to data security and ISO 27001/ISO 27002, Eighth edition by Calder, Alan, Watkins, Steve

    ISBN: 1787784088, 9781787784086
    Published: Ely IT Governance Publishing 27.06.2024
    “… (information security management system) that complies with ISO 27001 and ISO 27002; Highlight why data protection and information security are vital in our ever-changing online and physical environments…”
    Get full text
    eBook
  6. 6

    Rational Cybersecurity for Business: The Security Leaders' Guide to Business Alignment by Blum, Dan

    ISBN: 9781484259511, 1484259513, 9781484259528, 1484259521
    Published: Berkeley, CA Springer Nature 2020
    “…Use the guidance in this comprehensive field guide to gain the support of your top executives for aligning a rational cybersecurity plan with your business…”
    Get full text
    eBook
  7. 7

    Privacy Technologies and Policy: 13th Annual Privacy Forum, APF 2025, Frankfurt am Main, Germany, October 22–23, 2025, Proceedings

    ISBN: 9783032075734, 3032075742, 3032075734, 9783032075741
    Published: Cham Springer Nature 2026
    “…This open access book constitutes the refereed proceedings of the 13th Annual Privacy Forum on Privacy Technologies and Policy, APF 2025, held in Frankfurt am…”
    Get full text
    eBook
  8. 8

    Internet of Things Security: Fundamentals, Techniques and Applications by Shandilya, Shishir K

    ISBN: 9788793609532, 8793609531
    Published: River Publishers 2020
    “…Internet of Things (IoT) security deals with safeguarding the devices and communications of IoT systems, by implementing protective measures and avoiding procedures which can lead to intrusions and attacks…”
    Get full text
    eBook
  9. 9

    Information Security Breaches: Avoidance and Treatment based on ISO27001 by Krausz, Michael

    ISBN: 1849280274, 9781849280273, 9781849285834, 1849285837, 9781849280280, 1849280282
    Published: Ely IT Governance Publishing 09.12.2009
    “… This book tells you the plans and procedures you need to put in place to tackle an information security breach should it occur…”
    Get full text
    eBook
  10. 10

    Nine Steps to Success - An ISO 27001:2022 Implementation Overview by Calder, Alan

    ISBN: 1787785424, 9781787785427
    Published: Ely IT Governance Publishing 2024
    “…:2022, the international standard for Information Security Management Systems (ISMS). The book outlines a structured, step-by-step approach to achieving compliance…”
    Get full text
    eBook
  11. 11

    IT Governance – An International Guide to Data Security and ISO 27001/ISO 27002 (8th Edition) by Calder, Alan, Watkins, Steve

    ISBN: 1787784096, 9781787784093, 1787784088, 9781787784086
    Published: IT Governance Publishing 2024
    “… (information security management system) that complies with ISO 27001 and ISO 27002;* Highlight why data protection and information security are vital in our ever-changing online and physical environments…”
    Get full text
    eBook
  12. 12

    NIST CSF 2.0: Your essential introduction to managing cybersecurity risks by Pattison, Andrew

    ISBN: 9781787785700, 178778570X, 9781787785694, 1787785696
    Published: Ely IT Governance Publishing 27.02.2025
    “…A concise introduction to the NIST CSF 2.0 The NIST CSF (Cybersecurity Framework…”
    Get full text
    eBook
  13. 13

    Security, Privacy and Reliability in Computer Communications and Networks by Sha, Kewei, Striegel, Aaron, Song, Min

    ISBN: 1000795276, 9781000795271, 8793379897, 9788793379893
    Published: United Kingdom River Publishers 2017
    “… Security, Privacy and Reliability in Computer Communications and Networks studies and presents recent advances reflecting the state-of-the-art research achievements in novel cryptographic algorithm…”
    Get full text
    eBook
  14. 14

    SQL Injection Strategies: Practical techniques to secure old vulnerabilities against modern attacks by Galluccio, Ettore, Lombari, Gabriele, Caselli, Edoardo

    ISBN: 9781839217135, 1839217138, 183921564X, 9781839215643
    Published: Birmingham Packt Publishing 2020
    “… SQL Injection Strategies is an end-to-end guide for beginners looking to learn how to perform SQL injection and test the security of web applications, websites, or databases, using both manual and automated techniques…”
    Get full text
    eBook
  15. 15

    Information Security and Privacy Quick Reference - The Essential Handbook for Every CISO, CSO, and Chief Privacy Officer by Shelley Joe, Chapple Mike, Stewart James Michael

    ISBN: 9781394353316, 1394353316
    Published: John Wiley & Sons 2025
    “…A fast, accurate, and up-to-date desk reference for information security and privacy practitioners…”
    Get full text
    eBook
  16. 16

    Intelligent Cybersecurity and Resilience for Critical Industries: Challenges and Applications by Zaydi, Mounia, Maleh, Yassine, Chenevert, Gabriel, Zaydi, Hayat, Yaagoubi, Amina El

    ISBN: 8770042268, 9788770042260
    Published: River Publishers 29.04.2025
    “…Intelligent Cybersecurity and Resilience for Critical Industries: Challenges and Applications thoroughly explores cybersecurity principles, strategies…”
    Get full text
    eBook
  17. 17

    Handbook on Securing Cyber-Physical Critical Infrastructure by Das, Sajal K, Kant, Krishna, Zhang, Nan

    ISBN: 0124158153, 9780124158153
    Published: Chantilly Elsevier Science & Technology 2012
    “…The worldwide reach of the Internet allows malicious cyber criminals to coordinate and launch attacks on both cyber and cyber-physical infrastructure from…”
    Get full text
    eBook
  18. 18

    Cyber Security: The complete guide to cyber threats and protection by David Sutton

    ISBN: 9781780175973, 1780175973
    Published: BCS Learning & Development Limited 2022
    “…Cyber security has never been more essential than it is today, it's not a case of if an attack will happen…”
    Get full text
    eBook
  19. 19

    Demystifying Internet of Things Security: Successful IoT Device/Edge and Platform Security Deployment by Cheruvu, Sunil, Kumar, Anil, Smith, Ned, Wheeler, David M

    ISBN: 1484228960, 9781484228968, 9781484228951, 1484228952
    Published: Berkeley, CA Springer Nature 2020
    “…Break down the misconceptions of the Internet of Things by examining the different security building blocks available in Intel Architecture (IA…”
    Get full text
    eBook
  20. 20

    Large Language Models in Cybersecurity: Threats, Exposure and Mitigation by Kucharavy, Andrei, Plancherel, Octave, Mulder, Valentin, Mermoud, Alain, Lenders, Vincent

    ISBN: 9783031548260, 3031548264, 3031548272, 9783031548277
    Published: Cham Springer Nature 2024
    “…This open access book provides cybersecurity practitioners with the knowledge needed to understand the risks of the increased availability of powerful large language models (LLMs…”
    Get full text
    eBook