COMPUTERS / Security / General
Resource Information
The concept COMPUTERS / Security / General represents the subject, aboutness, idea or notion of resources found in University of Missouri Libraries.
The Resource
COMPUTERS / Security / General
Resource Information
The concept COMPUTERS / Security / General represents the subject, aboutness, idea or notion of resources found in University of Missouri Libraries.
- Label
- COMPUTERS / Security / General
- Source
- bisacsh
34 Items that share the Concept COMPUTERS / Security / General
Context
Context of COMPUTERS / Security / GeneralSubject of
No resources found
No enriched resources found
- Abusing the Internet of things : blackouts, freakouts, and stakeouts
- An introduction to crime and crime causation
- Basiswissen Sichere Software : aus- und Weiterbildung zum ISSECO Certified Professionell for Secure Software Engineering
- Blockchain quick start guide : a beginner's guide to developing enterprise-grade decentralized applications
- Building virtual pentesting labs for advanced penetration testing : learn how to build complex virtual architectures that allow you to perform virtually any required testing methodology and perfect it
- CEH v10 : certified ethical hacker study guide
- CISSP exam cram
- CISSP in 21 days : boost your confidence and get the competitive edge you need to crack the exam in just 21 days!
- CISSP official (ISC)2 practice tests
- Combating human trafficking : a multidisciplinary approach
- CompTIA PenTest+ : Exam PT0-001, Practice Test
- Compliance in der IT-Sicherheit : ISO 2700x-Standard und DSGVO
- Current and emerging trends in cyber operations : policy, strategy, and practice
- Economics of information security and privacy III
- Eleventh Hour CISSPĀ®
- Financial cybersecurity risk management : leadership perspectives and guidance for systems and institutions
- Hands-on Spring Security 5 for Reactive applications : learn effective ways to secure your applications with Spring and Spring WebFlux
- Hands-on machine learning for cybersecurity : safeguard your system by making your machines intelligent using the Python ecosystem
- How I discovered World War II's greatest spy : and other stories of intelligence and code
- Kali Linux 2 : assuring security by penetration testing
- Kali Linux web penetration testing cookbook : identify, exploit, and prevent web application vulnerabilities with Kali Linux 2018.x
- Learn ethical hacking from scratch : your stepping stone to penetration testing
- Learn social engineering : learn the art of human hacking with an internationally renowned expert
- Mastering pfSense : master the art of managing, securing, and monitoring your network using the powerful pfSense 2.3
- Multimedia security : watermarking, steganography, and forensics
- Penetration testing bootcamp : quickly get up and running with pentesting techniques
- Practical cyber intelligence : how action-based intelligence can be an effective response to incidents
- Python : penetration testing for developers : unleash the power of Python scripting to execute effective and efficient penetration tests : a course in three modules
- Quick start guide to penetration testing : with NMAP, OpenVAS and Metasploit
- Raspberry Pi : making amazing projects right from scratch! : explore the powers of Raspberry Pi and build your very own projects right out of the box : a course in three modules
- Smart grid security : an end-to-end view of security in the new electrical grid
- The future of violence : robots and germs, hackers and drones--confronting a new age of threat
- What They Didn't Teach at the Academy : Topics, Stories, and Reality Beyond the Classroom
- Wireless and mobile device security
Embed
Settings
Select options that apply then copy and paste the RDF/HTML data fragment to include in your application
Embed this data in a secure (HTTPS) page:
Layout options:
Include data citation:
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.library.missouri.edu/resource/rG8MB10r9Hk/" typeof="CategoryCode http://bibfra.me/vocab/lite/Concept"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.library.missouri.edu/resource/rG8MB10r9Hk/">COMPUTERS / Security / General</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.library.missouri.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.library.missouri.edu/">University of Missouri Libraries</a></span></span></span></span></div>
Note: Adjust the width and height settings defined in the RDF/HTML code fragment to best match your requirements
Preview
Cite Data - Experimental
Data Citation of the Concept COMPUTERS / Security / General
Copy and paste the following RDF/HTML data fragment to cite this resource
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.library.missouri.edu/resource/rG8MB10r9Hk/" typeof="CategoryCode http://bibfra.me/vocab/lite/Concept"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.library.missouri.edu/resource/rG8MB10r9Hk/">COMPUTERS / Security / General</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.library.missouri.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.library.missouri.edu/">University of Missouri Libraries</a></span></span></span></span></div>