Computer networks -- Security measures
Resource Information
The concept Computer networks -- Security measures represents the subject, aboutness, idea or notion of resources found in University of Missouri Libraries.
The Resource
Computer networks -- Security measures
Resource Information
The concept Computer networks -- Security measures represents the subject, aboutness, idea or notion of resources found in University of Missouri Libraries.
- Label
- Computer networks -- Security measures
- Authority link
- http://id.worldcat.org/fast/00872341
- Source
- fast
A sample of Items that share the Concept Computer networks -- Security measures See All
Context
Context of Computer networks -- Security measuresSubject of
No resources found
No enriched resources found
- (ISC)2 CISSP : Certified Information Systems Security Professional : official practice tests
- 10 don'ts on your digital devices : the non-techie's survival guide to cyber security and privacy
- 125 sposobów na bezpieczeństwo sieci
- 12th Asia Joint Conference on Information Security : AsiaJCIS 2017 : proceedings : 10-11 August 2017, The Korean Federation of Science and Technology Societies, Gangnam-gu, Seoul, Korea
- 12th International Conference on System Safety and Cyber-Security 2017 (SCSS) : Oct. 31 2017-Nov. 1, 2017
- 13th Asia Joint Conference on Information Security : AsiaJCIS 2018 : proceedings : 8-9 August 2018, Guilin, China
- 13th International ISC Conference on Information Security & Cryptology : 7-8 September 2016, Faculty of Computer Science & Engineering, Shahid Beheshti University, Tehran, Iran
- 1995 New Security Paradigms Workshop : proceedings, August 22-25, 1995, La Jolla, California
- 2005 Workshop of the 1st Intl Conference on Security and Privacy for Emerging Areas in Communication Networks : SECURECOMM : Athens, Greece, 5-9 September, 2005
- 2006 International Conference on Intelligent Information Hiding and Multimedia Processing : (IIH-MSP 2006) : proceedings ; 18-20 December, 2006, Pasadena, California, USA
- 2006 SecureComm and workshops : 28 August-1 September 2006, Baltimore, MD
- 2007 3rd IEEE Workshop on Secure Network Protocols : Bejing, China, 16 October 2007
- 2007 Third International Conference on Security and Privacy in Communication Networks and the Workshops
- 2008 Third International Conference on Risks and Security of Internet and Systems (CRiSIS 2008) : proceedings : Tozeur, Tunisia, October 28-30, 2008
- 2009 4th International Conference on Malicious and Unwanted Software : MALWARE : 13-14 October 2009, Montréal, Québec, Canada
- 2009 Symposium on Bio-inspired Learning and Intelligent Systems for Security
- 2009 Third International Conference on Network and System Security : proceedings : NSS 2009 : 19-21 October 2009, Golf Coast, Queensland, Australia
- 2009 proceedings of the 1st International Workshop on Security and Communication Networks : May 20-22, 2009, Trondheim, Norway
- 2010 2nd International Workshop on Security and Communication Networks (IWSCN) : May 26-28, 2010, Karlstad, Sweden
- 2010 6th IEEE Workshop on Secure Network Protocols : NPSEC '10 : Kyoto, Japan, October 5, 2010
- 2010 ASID : 2010 International Conference on Anti-Counterfeiting, Security and Identification, July 18-20, 2010, Chengdu, China
- 2010 First ACIS International Symposium on Cryptography, and Network Security, Data Mining and Knowledge Discovery, E-Commerce and Its Applications, and Embedded Systems : CDEE 2010 : 23-24 October 2010, Qinhuangdao, Hebei, China
- 2010 Fourth International Conference on Network and System Security : NSS 2010 : proceedings : 1-3 September 2010, Melbourne, Australia
- 2010 Second International Conference on Multimedia Information Networking and Security : MINES 2010 : 4-6 November 2010, Nanjing, Jiangsu, China
- 2010 Sixth International Conference on Information Assurance and Security
- 2011 Conference on Network and Information Systems Security : SAR-SSI 2011, 18021 May 2011, Ile de Ré, La Rochelle, France : proceedings
- 2011 IEEE International Conference on Anti-Counterfeiting, Security and Identification
- 2011 International Conference for Internet Technology and Secured Transactions : 11-14 December 2011 : Abu Dhabi, United Arab Emirites
- 2011 Ninth Annual International Conference on Privacy, Security and Trust : Concordia University, Montreal, Quebec, Canada, July 19-21, 2011
- 2011 Seventh European Conference on Computer Network Defense : proceedings, EC2ND 2011 : 6-7 September 2011, Gothenburg, Sweden
- 2011 Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing
- 2011 Third International Workshop on Security Measurements and Metrics : Metrisec 2011 : proceedings : 21 September 2011, Banff, Alberta, Canada
- 2012 9th International ISC Conference on Information Security and Cryptology : 13-14 September 2012 : Faculty of Electrical & Computer Engineering : University of Tabriz, Tabriz, Iran
- 2012 European Intelligence and Security Informatics Conference : Proceedings : Odense, Denmark, 22-24 August 2012
- 2012 Tenth Annual International Conference on Privacy, Security and Trust : Institut Mines-Telecom, Paris, France, July 16-18, 2012
- 2012 eCrime Researchers Summit : [October 22-25, 2012, Las Croabas, Puerto Rico]
- 2013 10th International ISC Conference on Information Security and Cryptology (ISCISC)
- 2013 8th International Conference for Internet Technology and Secured Transactions (ICITST) : December 9-12, 2013, London, UK
- 2013 APWG eCrime Researchers Summit
- 2013 Eleventh Annual Conference on Privacy, Security and Trust
- 2013 Fourth Cybercrime and Trustworthy Computing Workshop
- 2013 IEEE Conference on Communications and Network Security (CNS)
- 2013 IEEE Symposium on Computational Intelligence in Cyber Security (CICS)
- 2013 IEEE Symposium on Computational Intelligence in Dynamic and Uncertain Environments (CIDUE)
- 2013 International Conference on Information and Network Security (ICINS 2013)
- 2013 International Conference on Optical Imaging Sensor and Security (ICOSS)
- 2013 International Conference on Risks and Security of Internet and Systems (CRiSIS)
- 2013 National Security Days (JNS3)
- 2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing
- 2013 World Congress on Internet Security (WorldCIS) : [December 9-12, 2013, London, UK]
- 2014 11th International ISC Conference on Information Security and Cryptology : 3-4 September 2014 : School of Electrical and Computer Engineering, College of Engineering, University of Tehran, Tehran, Iran
- 2014 9th International Conference for Internet Technology and Secured Transactions (ICITST)
- 2014 Conference on Information Assurance and Cyber Security (CIACS)
- 2014 Eighth International Conference on IT Security Incident Management & IT Forensics
- 2014 IEEE Conference on Communications and Network Security
- 2014 IEEE International Symposium on Independent Computing (ISIC 2014) : Orlando, Florida, USA 9-12 December 2014
- 2014 IEEE Joint Intelligence and Security Informatics Conference : proceedings : JISIC 2014 : 24-26 September 2014, The Hague, The Netherlands
- 2014 Sixth International Conference on Communication Systems and Networks (COMSNETS) : January 7-10, 2014, Bangalore, India
- 2014 Twelfth Annual International Conference on Privacy, Security and Trust
- 2014 World Congress on Internet Security (WorldCIS)
- 2015 10th International Conference for Internet Technology and Secured Transactions (ICITST)
- 2015 10th International Conference on Malicious and Unwanted Software (MALWARE) : 20-22 Oct. 2015
- 2015 Conference on Information Assurance and Cyber Security (CIACS) : conference proceedings : 18 December, 2015, Military College of Signals, National University of Sciences and Technology, Rawalpindi, Pakistan
- 2015 IEEE Conference on Communications and Network Security (CNS)
- 2015 International Conference on Cyber Security of Smart Cities, Industrial Control System and Communications (SSIC) : SSIC'2015 : proceedings : 05-07 August 2015, Shanghai, China
- 2015 World Congress on Internet Security (WorldCIS)
- 2015 World Symposium on Computer Networks and Information Security (WSCNIS) : Hammamet, Tunisia, 19-21 September 2015
- 2016 11th International Conference for Internet Technology and Secured Transactions (ICITST) : 5-7 Dec. 2016
- 2016 14th Annual Conference on Privacy, Security and Trust (PST) : 12-14 Dec. 2016
- 2016 8th IFIP International Conference on New Technologies, Mobility and Security (NTMS) : Larnaca, Cyprus, 21 - 23 November 2016
- 2016 IEEE Conference on Communications and Network Security (CNS)
- 2016 International Conference on Cyber Security of Smart Cities, Industrial Control System and Communications (SSIC) : SSIC'2016 : proceedings : 18-19 July 2016, Paris, France
- 2017 12th International Conference for Internet Technology and Secured Transactions (ICITST)
- 2017 14th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology (ISCISC) : September 6-7, 2017, Shiraz University, Shiraz, Iran
- 2017 15th Annual Conference on Privacy, Security and Trust : PST 2017 : proceedings : Calgary, Canada, 27-29 August 2017
- 2017 17th IEEE International Conference on Computer and Information Technology : proceedings : CIT 2017 ; IEEE International Workshop on Secure and Resource-Efficient Edge Computing 2017 : SecureEdge 2017 ; IEEE International Symposium on Recent Advances of Computer and Information Technologies 2017 : RACIT 2017 : 21-23 August 2017, Helsinki, Finland
- 2017 European Intelligence and Security Informatics Conference : EISIC 2017 : proceedings : 11-13 September 2017, Athens, Greece
- 2017 IEEE Conference on Applications, Information and Network Security : AINS 2007 : 13th-14th November 2017, Miri Marriott Resort & Spa, Miri, Sarawak, Malaysia
- 2017 IEEE Conference on Communications and Network Security (CNS)
- 2017 International Conference on Nascent Technologies in the Engineering Field (ICNTE-2017) : proceedings : January 27-28, 2017, Agnel Charities' Fr. C. Rodrigues Institute of Technology, Agnel Technical Education Complex, Sector 9-A, Vashi, Navi Mumbai, India
- 2018 15th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology (ISCISC) : August 28-29, 2018, Shahid Rajaee Teacher Training University - Tehran, Iran
- 2018 16th Annual Conference on Privacy, Security and Trust (PST) : August 28-30, 2018, Belfast, Northern Ireland, United Kingdom
- 2018 9th IFIP International Conference on New Technologies, Mobility & Security : proceedings of NTMS 2018 Conference and Workshop : 26-28 February 2018, Paris, France
- 2018 Fifth International Conference on Social Networks Analysis, Management and Security (SNAMS) : 15-18 October, 2018 Valencia, Spain
- 2018 IEEE Conference on Communications and Network Security (CNS)
- 2018 Third International Conference on Security of Smart Cities, Industrial Control System and Communications (SSIC) : SSIC'2018 : proceedings : 18-19 October 2018, Shanghai, China
- 2019 14th Asia Joint Conference on Information Security : AsiaJCIS 2019 : proceedings : Kobe, Japan, 1-2 August 2019
- 2019 3rd Cyber Security in Networking Conference (CSNet)
- 2019 9th IFIP International Conference on New Technologies, Mobility & Security : proceedings of NTMS 2019 Conference and Workshop : 24-26 June 2019, Canary Islands - Spain
- 2019 IEEE Conference on Application, Information and Network Security (AINS) : 19st-21th November 2019, Parkroyal Penang Resort, Penang, Malaysia
- 2019 IEEE Conference on Communications and Network Security (CNS)
- 2019 Sixth International Conference on Social Networks Analysis, Management and Security (SNAMS) : Granada, Spain, October 22-25, 2019
- 2020 15th Asia Joint Conference on Information Security : AsiaJCIS 2020 : proceedings : Taipei, Taiwan, 20-21 August 2020
- 2020 IEEE Conference on Application, Information and Network Security (AINS) : 17-19 November 2020
- 2020 IEEE Conference on Communications and Network Security (CNS)
- 21 steps to improve cyber security of SCADA networks
- 21st Century IRS Act : report (to accompany H.R. 5445)
- 24 deadly sins of software security : programming flaws and how to fix them
- 3rd International Conference on Malicious and Unwanted Software : Malware '08 to be held at the Hilton Alexandria Mark Center, Alexandria, VA, USA, October 7-8, 2008
- 5th International Conference on IT Security Incident Management & IT Forensics : IMF 2009 : proceedings : 15-17 September 2009, Stuttgart, Germany
- 7th IET International Conference on System Safety, incorporating the Cyber Security Conference 2012
- 802.11 Security
- 9th International Conference on IT Security Incident Management & IT Forensics 2015 : proceedings, May 18th-20th, 2015, Magdeburg, Germany
- A guide to computer network security
- A machine learning approach to phishing detection and defense
- A machine learning approach to phishing detection and defense
- A multidisciplinary introduction to information security
- A practical guide to TPM 2.0 : using the Trusted Platform Module in the new age of security
- A practical guide to computer forensics investigations
- A study of black hole attack solutions : on AODV routing protocol in MANET
- AAA identity management security
- ACDT 2015, the proceedings : the First Asian Conference on Defence Technology : April 23-25, 2015, Hua Hin, Thailand
- ACDT 2016 : 2016 Second Asian Conference on Defence Technology (ACDT) : January 21-23, 2016, Chiang Mai, Thailand
- AVIEN malware defense guide for the Enterprise
- AWS SECURITY COOKBOOK;PRACTICAL SOLUTIONS FOR MANAGING SECURITY POLICIES, MONITORING, AUDITING, AND COMPLIANCE WITH AWS
- Academic and legal implications of VA's data loss : hearing before the Committee on Veterans' Affairs, House of Representatives, One Hundred Ninth Congress, second session, June 22, 2006
- Access control systems : security, identity management and trust models
- Access to online resources : a guide for the modern librarian
- Achieving systems safety : proceedings of the twentieth Safety-Critical Systems Symposium, Bristol, UK, 7-9th February 2012
- Active Directory administration cookbook : actionable, proven solutions to identity management and authentication on servers and in the cloud
- Adaptive Security Management Architecture
- Advanced infrastructure penetration testing : defend your systems from methodized and proficient attackers
- Advanced penetration testing for highly-secured environments : employee the most advanced pentesting techniques and tools to build highly-secured systems and environments
- Advanced persistent security : a cyberwarfare approach to implementing adaptive enterprise protection, detection, and reaction strategies
- Advanced persistent threat : understanding the danger and how to protect your organization
- Advanced persistent training : take your security awareness program to the next level
- Advances in Network Management
- Advances in computer science and information technology : first International Conference on Computer Science and Information Technology, CCSIT 2011, Bangalore, India, January 2-4, 2011, proceedings, Part I
- Advances in computer science--Asian 2006 : secure software and related issues : 11th Asian Computing Science Conference, Tokyo, Japan, December 6-8, 2006 : revised selected papers
- Advances in cryptology-- EUROCRYPT 2014 : 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Copenhagen, Denmark, May 11-15, 2014. Proceedings
- Advances in information and computer security : 4th International Workshop on Security, IWSEC 2009 Toyama, Japan, October 28-30, 2009, proceedings
- Advances in information and computer security : 5th international workshop on security, IWSEC 2010, Kobe, Japan, November 22-24, 2010 : proceedings
- Advances in information and computer security : 6th international workshop, IWSEC 2011, Tokyo, Japan, November 8-10, 2011 : proceedings
- Advances in information and computer security : 7th International Workshop on Security, IWSEC 2012, Fukuoka, Japan, November 7-9, 2012. Proceedings
- Advances in information and computer security : 8th International Workshop on Security, IWSEC 2013, Okinawa, Japan, November 18-20, 2013, Proceedings
- Advances in network security and applications : 4th International Conference, CNSA 2011, Chennai, India, July 15-17, 2011, Proceedings
- Advances in networks and communications : first International Conference on Computer Science and Information Technology, CCSIT 2011, Bangalore, India, January 2-4, 2011. proceedings, Part II
- Advances in security of information and communication networks : first international conference, SecNet 2013, Cairo, Egypt, September 3-5, 2013 : proceedings
- Advances in security technology : international conference, SecTech 2008, and its special sessions, Sanya, Hainan Island, China, December 13-15, 2008 : revised selected papers
- Agencies in peril : are we doing enough to protect federal IT and secure sensitive information? Hearing before the Federal Financial Management, Government Information, Federal Services, and International Security Subcommittee of the Committee on Homeland Security and Governmental Affairs, United States Senate; One Hundred Tenth Congress, second session; March 12, 2008
- Agile security : an introduction for developers
- Ajax security
- Anomaly detection for monitoring : a statistical approach to time series anomaly detection
- Anonymous communication networks : protecting privacy on the web
- Ansible quick start guide : Control and monitor infrastructures of any size, physical or virtual
- Anti-Counterfeiting, Security and Identification (ASID), 2012 International Conference on : date, 24-26 Aug. 2012
- Anti-counterfeiting, Security and Identification, 2008, ASID 2008, 2nd International Conference on
- Anti-counterfeiting, Security, Identification, 2007 IEEE International Workshop
- Anti-hacker tool kit
- Antivirus bypass techniques : learn practical techniques and tactics to combat, bypass, and evade antivirus software
- Apache cookbook
- Apache cookbook
- Application security in the ISO 27001:2013 environment
- Applications and techniques in information security : 5th international conference, ATIS 2014, Melbourne, VIC, Australia, November 26-28, 2014 : proceedings
- Applied cryptography and network security : 10th International Conference, ACNS 2012, Singapore, June 26-29, 2012. Proceedings
- Applied cryptography and network security : 12th International Conference, ACNS 2014, Lausanne, Switzerland, June 10-13, 2014. Proceedings
- Applied cryptography and network security : 8th international conference, ACNS 2010, Beijing, China, June 22-25, 2010 ; proceedings
- Applied cryptography and network security : 9th International Conference, ACNS 2011, Nerja, Spain, June 7-10, 2011, Proceedings
- Applied cyber security and the smart grid : implementing security controls into the modern power infrastructure
- Applied incident response
- Applied information security : a hands-on approach
- Applied network security : master the art of detecting and averting advanced network security attacks and techniques
- Applied network security monitoring : collection, detection, and analysis
- Applied security visualization
- Are your bits flipped? : overcoming tech misconceptions
- AsiaJCIS 2013 : 2013 Eighth Asia Joint Conference on Information Security : proceedings : 25-26 July 2013, Seoul, South Korea
- AsiaJCIS 2014 : 2014 Ninth Asia Joint Conference on Information Security : proceedings : Wuchang, Wuhan, China, 4-5 September 2014
- AsiaJCIS 2015 : 2015 10th Asia Joint Conference on Information Security : proceedings : 24-26 May 2015, Kaohsiung City, Taiwan
- AsiaJCIS 2016 : 11th Asia Joint Conference on Information Security : proceedings : Fukuoka, Japan, 4-5 August 2016
- Assessing information security : strategies, tactics, logic and framework
- Assessing network security
- Asset protection through security awareness
- Auditing IT infrastructures for compliance
- Auditing IT infrastructures for compliance
- Authentication in insecure environments : using visual cryptography and non-transferable credentials in practise
- Autonomic and trusted computing : 4th international conference, ATC 2007, Hong Kong, China, July 11-13, 2007 : proceedings
- Autonomic and trusted computing : 5th international conference, ATC 2008, Oslo, Norway, June 23-25, 2008 ; proceedings
- Autonomic and trusted computing : 6th international conference, ATC 2009, Brisbane, Australia, July 7-9, 2009 : proceedings
- Autonomic and trusted computing : 7th international conference, ATC 2010, Xi'an, China, October 26-29, 2010 : proceedings
- Autonomic and trusted computing : 8th International Conference, ATC 2011, Banff, Canada, September 2-4, 2011, proceedings
- Autonomic and trusted computing : third international conference, ATC 2006, Wuhan, China, September 3-6, 2006 : proceedings
- Availability, reliability, and security in information systems : IFIP WG 8.4, 8.9, TC 5 International Cross-Domain Conference, CD-ARES 2014 and 4th International Workshop on Security and Cognitive Informatics for Homeland Defense, SeCIHD 2014, Fribourg, Switzerland, September 8-12, 2014. Proceedings
- Availability, reliability, and security in information systems and HCI : IFIP WG 8.4, 8.9, TC 5 International Cross-Domain Conference, CD-ARES 2013, Regensburg, Germany, September 2-6, 2013 : proceedings
- BLISS 2009 : proceedings : 2009 International Symposium on Bio-inspired, Learning, and Intelligent Systems for Security : 20-22 August, 2009, Edinburgh, United Kingdom
- Beautiful security
- Becoming the hacker : the playbook for getting inside the mind of an attacker
- Beyond cybersecurity : protecting your digital business
- Bezpieczenstwo tozsamosci i danych w projektach Web
- Binary analysis cookbook : actionable recipes for disassembling and analyzing binaries for security risks
- Biometrics for network security
- Bluetooth security attacks : comparative analysis, attacks, and countermeasures
- Bootstrapping trust in modern computers
- Botnet detection : countering the largest security threat
- Botnets : the killer web app
- Break-glass : handling exceptional situations in access control
- Bug bounty hunting for web security : find and exploit vulnerabilities in web sites and applications
- Building Internet Firewalls : Internet and Web security
- Building a computer network : LiveLessons
- Building a modern security program : adapting security for DevOps and cloud
- Building a pentesting lab for wireless networks : build your own secure enterprise or home penetration testing lab to dig into the various hacking techniques
- Building an intelligence-led security program
- Building secure servers with Linux
- Building virtual pentesting labs for advanced penetration testing : learn how to build complex virtual architectures that allow you to perform virtually any required testing methodology and perfect it
- Burp Suite cookbook : practical recipes to help you master web penetration testing with Burp Suite
- Business continuity & disaster recovery for IT professionals
- Business continuity and disaster recovery for infosec managers
- Business continuity and disaster recovery planning for IT professionals
- CCIE collaboration lab exam
- CCIE collaboration quick reference
- CCIE routing and switching v5.0 exam roundup : networking talks
- CCIE security v3.0 quick reference
- CCIE security v4.0 : (video training)
- CCNA Cyber Ops SECOPS 210-255 complete video course
- CCNA Security 640-554 Official Cert Guide
- CCNA security live lessons : a hands-on guide to implementing security on Cisco routers and switches
- CCNP Security Firewall 642-617 official cert guide
- CCNP Security Firewall 642-617 quick reference
- CCNP security IPS 642-627 quick reference
- CCNP security VPN 642-647 official cert guide
- CCNP security VPN 642-647 quick reference
- CCNP security secure 642-637 quick reference
- CCSP Certified Cloud Security Professional exam guide
- CCSP Certified Cloud Security Professional practice exams
- CCSP SNAA quick reference
- CCSP SNAF quick reference
- CCSP self-study : Cisco secure intrusion detection system (CSIDS)
- CEH v11 certified ethical hacker study guide
- CISSP official (ISC)2 practice tests
- CISSP practice exams
- CISSP video mentor
- CMS security handbook : the comprehensive guide for WordPress, Joomla!, Drupal, and Plone
- COMSNETS 2015 : 2015 7th International Conference on Communication Systems and Networks : proceedings : 6-10 January 2015, Bangalore, India
- CONGRESS 2009 : proceedings : 2009 World Congress on Privacy, Security, Trust and the Management of e-Business : 25-27 August 2009 : Saint John, New Brunswick, Canada
- CRiSIS 2009 : post-proceedings of the Fourth International Conference on Risk and Security of Internet and Systems : Toulouse, France, October 19-22, 2009
- CRiSIS 2011 : 6th International Conference on Risks and Security of Internet and Systems : 26-28 September 2011, Timișoara, Romania
- CSNet'17 : Rio de Janeiro, RJ - Brazil, 18-20 October 2017
- CSNet'18 : 2018 2nd Cyber Security in Networking Conference (CSNet) : Paris, France, October 24 - 26, 2018
- CTC 2012 : Proceedings, 2012 Third Cybercrime and Trustworthy Computing Workshop : 29-30 October 2012, Ballarat, VIC, Australia
- CYBERAbuja 2015 : International Conference on Cyberspace Governance : proceedings : the Imperative for National & Economic Security : proceedings : @ Shehu Musa Yar'Adua Centre Abuja, 4th-7th November, 2015
- Case studies in secure computing : achievements and trends
- Chained exploits : advanced hacking attacks from start to finish
- Check Point VPN-1/FireWall-1 on AIX : a cookbook for stand-alone and high availability solutions
- Cisco ASA 5500-X series next-generation firewalls : LiveLessons
- Cisco ASA : all-in-one firewall, IPS, Anti-X, and VPN adaptive security appliance
- Cisco ASA : all-in-one firewall, IPS, and VPN adaptive security appliance
- Cisco ASA : all-in-one next-generation firewall, IPS, and VPN services
- Cisco ASA and PIX firewall handbook
- Cisco ASA, PIX, and FWSM firewall handbook
- Cisco CCSP SNRS quick reference
- Cisco FirePOWER and Advanced Malware Protection : LiveLessons
- Cisco Firepower Threat Defense (FTD) : configuration and troubleshooting best practices for the Next-Generation Firewall (NGFW), Next-Generation Intrusion Prevention System (NGIPS), and Advanced Malware Protection (AMP)
- Cisco IOS access lists
- Cisco ISE for BYOD and secure unified access
- Cisco Intelligent WAN (IWAN)
- Cisco NAC appliance : enforcing host security with clean access
- Cisco Network Admission Control, Vol. 1, NAC architecture and design
- Cisco Security Agent
- Cisco bring your own device (BYOD) networking
- Cisco firewall : video mentor
- Cisco firewall technology
- Cisco network security troubleshooting handbook
- Cisco next-generation security solutions : all-in-one Cisco ASA FirePOWER services, NGIPS, and AMP
- Cisco router and switch forensics : investigating and analyzing malicious network activity
- Cisco router firewall security
- Cisco secure Internet security solutions
- Cisco secure firewall services module (FWSM)
- Cisco security professional's guide to secure intrusion detection systems
- Client-side attacks and defense
- Cloud computing security : foundations and challenges
- Cloud security and privacy
- Cloud security automation : get to grips with automating your cloud security on AWS and OpenStack
- Collaborative Security Technologies (CoSec), 2010 IEEE 2nd Workshop on : date,15-15 Dec. 2010
- Colloquium on "Designing Secure Systems" : on Friday, 19 June 1992
- Colloquium on "Security and Networks" : on Monday, 25 June 1990
- Communication technologies, information security and sustainable development : third International Multi-topic Conference, IMTIC 2013, Jamshoro, Pakistan, December 18-20, 2013, Revised Selected Papers
- Communications and multimedia security : 10th IFIP TC-6 TC-11 International Conference, CMS 2006, Heraklion, Crete, Greece, October 19-21, 2006 : proceedings
- Communications and multimedia security : 12th IFIP TC 6 / TC 11 International Conference, CMS 2011, Ghent, Belgium, October 19-21, 2011 : proceedings
- Communications and multimedia security : 8th IFIP TC-6 TC-11 Conference on Communications and Multimedia Security, Sept. 15-18, 2004, Windermere, the Lake District, United Kingdom
- Communications and multimedia security : advanced techniques for network and data protection : 7th IFIP-TC6 TC11 international conference, CMS 2003, Torino, Italy, October 2-3, 2003 : proceedings
- Communications and multimedia security : proceedings
- Communications and networking : an introduction
- CompTIA PenTest+ : Exam PT0-001, Practice Test
- CompTIA security+ (SYO-401) : complete video course
- CompTIA security+ SYO-201 video mentor : learn exam essentials from the expert
- Computational network science : an algorithmic approach
- Computer Theory and Applications (ICCTA), 2012 22nd International Conference on : date 13-15 Oct. 2012
- Computer and information security handbook
- Computer and information security handbook
- Computer and information security handbook, second edition
- Computer applications for security, control and system engineering : International Conferences, SecTech, CA, CES3 2012, held in conjunction with GST 2012, Jeju Island, Korea, November 28-December 2, 2012. Proceedings
- Computer forensics : a pocket guide
- Computer forensics : incident response essentials
- Computer forensics jumpstart
- Computer incident response and product security
- Computer information systems and industrial management : 11th IFIP TC 8 International Conference, CISIM 2012, Venice, Italy, September 26-28, 2012. Proceedings
- Computer information systems and industrial management : 12th IFIP TC8 International Conference, CISIM 2013, Krakow, Poland, September 25-27, 2013. Proceedings
- Computer information systems and industrial management : 13th IFIP TC8 International Conference, CISIM 2014, Ho Chi Minh City, Vietnam, November 5-7, 2014. Proceedings
- Computer insecurities at DOE headquarters : DOE's failure to get its own cyber house in order ; hearing before the Subcommittee on Oversight and Investigations of the Committee on Commerce, House of Representatives; One Hundred Sixth Congress, second session; June 13, 2000
- Computer network security
- Computer network security
- Computer network security : 5th International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2010, St. Petersburg, Russia, September 8-10, 2010 : proceedings
- Computer network security : 6th international conference on mathematical methods, models and architectures for computer network security, MMM-ACNS 2012, St. Petersburg, Russia, October 17-19, 2012 : proceedings
- Computer network security : Fourth International Conference on Math