Computer networks -- Security measures
Resource Information
The concept Computer networks -- Security measures represents the subject, aboutness, idea or notion of resources found in Boston University Libraries.
The Resource
Computer networks -- Security measures
Resource Information
The concept Computer networks -- Security measures represents the subject, aboutness, idea or notion of resources found in Boston University Libraries.
- Label
- Computer networks -- Security measures
- Authority link
- http://id.loc.gov/authorities/subjects/sh94001277
100+ Items that share the Concept Computer networks -- Security measures
Context
Context of Computer networks -- Security measuresSubject of
- 2005 Workshop of the 1st Intl Conference on Security and Privacy for Emerging Areas in Communication Networks : SECURECOMM : Athens, Greece, 5-9 September, 2005
- A cyberworm that knows no boundaries
- A cyberworm that knows no boundaries
- A guide to computer network security
- A machine-learning approach to phishing detection and defense
- A multidisciplinary introduction to information security
- A study of black hole attack solutions : on AODV routing protocol in MANET
- A study of black hole attack solutions : on AODV routing protocol in MANET
- Advanced penetration testing : hacking the world's most secure networks
- Advances in cyber security : technology, operations, and experiences
- American exceptionalism, the French exception, and digital media law
- American exceptionalism, the French exception, and digital media law
- Application security in the ISO27001 environment
- Applied cyber security and the smart grid : implementing security controls into the modern power infrastructure
- Applied information security : a hands-on approach
- Arithmetic of Finite Fields : 7th International Workshop, WAIFI 2018, Bergen, Norway, June 14-16, 2018, Revised Selected Papers
- Artificial immune system : applications in computer security
- Aspects of network and information security
- Aspects of regulating freedom of expression on the Internet
- Automatic defense against zero-day polymorphic worms in communication networks
- BackTrack 4 : assuring security by penetration testing : master the art of penetration testing with BackTrack
- Best damn firewall book period
- Best damn firewall book period
- Best practices in computer network defense : incident detection and response
- Beyond cybersecurity : protecting your digital business
- Biohackers : the politics of open science
- Bluetooth security attacks : comparative analysis, attacks, and countermeasures
- Bootstrapping trust in modern computers
- Botnets : the killer web app
- Buffer overflow attacks : detect, exploit, prevent
- Buffer overflow attacks : detect, exploit, prevent
- Building DMZs for Enterprise networks
- Building DMZs for Enterprise networks
- Building an intelligence-led security program
- Building virtual pentesting labs for advanced penetration testing : build intricate virtual architecture to practice any penetration testing technique virtually
- Business continuity & disaster recovery planning for IT professionals
- Business continuity and disaster recovery for infosec managers
- Business continuity and disaster recovery planning for IT professionals
- Business continuity management system : a complete framework for implementing ISO 22301
- Business continuity management system : a complete framework for implementing ISO 22301
- CMS security handbook : the comprehensive guide for WordPress, Joomla!, Drupal, and Plone
- Cisco Intelligent WAN (IWAN)
- Cisco Pix firewalls : configure, manage and troubleshoot
- Cisco next-generation security solutions : all-in-one Cisco ASA FirePOWER services, NGIPS, and AMP
- Cisco security professional's guide to secure intrusion detection systems
- Cisco security professional's guide to secure intrusion detection systems
- Cisco security specialist's guide to PIX Firewall
- Cisco security specialist's guide to PIX Firewall
- Client-Honeypots : exploring malicious websites
- Communications and information infrastructure security
- Communications and networking : an introduction
- Complete book of remote access : connectivity and security
- Computer Forensics jumpstart
- Computer and information security handbook
- Computer forensics with FTK : enhance your computer forensics knowledge through illustrations, tips, tricks, and practical real-world scenarios
- Computer network attack and international law
- Computer network security
- Computer network security and cyber ethics
- Computer viruses and malware
- Computer viruses and other malicious software : a threat to the Internet economy
- Configuring ISA server 2000 : building firewalls for windows 2000
- Configuring NetScreen Firewalls
- Configuring SonicWALL firewalls
- Configuring Symantec Antivirus, Corporate Edition
- Conflict in cyber space : theoretical, strategic and legal perspectives
- Counterterrorism and cybersecurity : total information awareness
- Critical infrastructure protection
- Critical infrastructure protection : information infrastructure models, analysis, and defense
- Critical infrastructure protection, II
- Cryptanalytic attacks on RSA
- Cryptographic protocol : security analysis based on trusted freshness
- Cryptography and network security : principles and practice
- Cryptography and network security : principles and practice
- Cryptography for security and privacy in cloud computing
- Cyber adversary characterization : auditing the hacker mind
- Cyber conflict : competing national perspectives
- Cyber security
- Cyber security and IT infrastructure protection
- Cyber security and resiliency policy framework
- Cyber threat! : how to manage the growing risk of cyber attacks
- Cyberpatterns : unifying design patterns with security and attack patterns
- Cybersecurity : managing systems, conducting testing, and investigating intrusions
- Cybersecurity and human rights in the age of cyberveillance
- Cybersecurity for executives : a practical guide
- Cybersecurity law
- Cybersecurity operations handbook
- Cybersecurity today and tomorrow : pay now or pay later
- Cyberterrorism : the use of the Internet for terrorist purposes
- Data privacy : principles and practice
- Data visualization, Part 2
- Defense and detection strategies against Internet worms
- Designing and building enterprise DMZs
- Designing and building enterprise DMZs
- Developer's guide to web application security
- Developer's guide to web application security
- Digital forensics with Kali Linux : perform data acquisition, digital investigation, and threat analysis using Kali Linux tools
- Digital identity, an emergent legal concept : the role and legal nature of digital identity in commercial transactions
- Digital identity: an emergent legal concept : the role and legal nature of digital identity in commercial transactions
- Digital whoness : identity, privacy and freedom in the cyberworld
- Disappearing cryptography : being and nothingness on the Net
- Disruptive security technologies with mobile code and peer-to-peer networks
- Dissecting the hack : the V3rb0ten network
- Distributed denial of service attack and defense
- Distributed networks : intelligence, security, and applications
- Distributed networks : intelligence, security, and applications
- Distributed security and high availability with Tivoli Access Manager and WebSphere Application Server for z/OS
- Dr. Tom Shinder's configuring ISA Server 2004
- Dr. Tom Shinder's configuring ISA Server 2004
- E-commerce and privacy
- Embedded Java security : security for mobile devices
- Enabling secure and privacy preserving communications in smart grids
- Enemy at the water cooler : real-life stories of insider threats and Enterprise Security Management countermeasures
- Enemy at the water cooler : real-life stories of insider threats and Enterprise Security Management countermeasures
- Engineering Secure Internet of Things Systems
- Engineering information security : the application of systems engineering concepts to achieve information assurance
- Engineering information security : the application of systems engineering concepts to achieve information assurance
- Engineering secure future internet services and systems : current research
- Engineering secure two-party computation protocols : design, optimization, and applications of efficient secure function evaluation
- Enterprise business portals II with IBM tivoli access manager
- Essential skills for hackers
- Ethereal : packet sniffing
- ExamWise for CIW security professional : exam 1D0-470
- FISMA certification & accreditation handbook
- File-Sharing Programs and Peer-to-Peer Networks Privacy and Security Risks
- File-Sharing Programs and Peer-to-Peer Networks Privacy and Security Risks
- Firewall policies and VPN configurations
- Firewall policies and VPN configurations
- Formal correctness of security protocols
- Foundations of intrusion tolerant systems
- Foundations of security analysis and design : tutorial lectures
- Fuzzing for software security testing and quality assurance
- Google hacking for penetration testers
- Guide to computer network security
- H.R. 3159, the "Government Network Security Act of 2003," : Fact Sheet
- H.R. 3159, the "Government Network Security Act of 2003," : Fact Sheet
- Hack proofing ColdFusion
- Hack proofing ColdFusion
- Hack proofing Windows 2000
- Hack proofing your network
- Hack proofing your wireless network
- Hack proofing your wireless network
- Hack the stack : using Snort and Ethereal to master the 8 layers of an insecure network
- Hacking : the art of exploitation
- Hacking : the art of exploitation
- Hacking for dummies
- Hacking point of sale : payment application secrets, threats, and solutions
- Hacking the code : ASP. NET web application security
- Hacking the code : ASP. NET web application security
- Hacking web apps : detecting and preventing web application security problems
- Hacking web intelligence : open source intelligence and web reconnaissance concepts and techniques
- Hacking web intelligence : open source intelligence and web reconnaissance concepts and techniques
- Hacking with Kali : practical penetration testing techniques
- Handbook of database security : applications and trends
- Handbook of information security
- Hands-on ethical hacking and network defense
- High noon on the electronic frontier : conceptual issues in cyberspace
- Host integrity monitoring : using Osiris and Samhain
- Host integrity monitoring : using Osiris and Samhain
- How to cheat at Configuring ISA Server 2004
- How to cheat at Configuring ISA Server 2004
- How to cheat at Voip security
- How to cheat at configuring Open Source security tools
- How to cheat at designing security for a Windows Server 2003 network
- How to cheat at managing information security
- How to cheat at managing information security
- How to defeat advanced malware : new tools for protection and forensics
- How to define and build an effective cyber threat intelligence capability
- IBM WebSphere application server v7.0 secruity : secure your WebSphere applications with Java EE and JAAS security standards
- IBM mainframe security beyond the basics : a practical guide from a z/OS and RACF perspective
- IBM system z9 109 technical introduction
- IT audit, control, and security
- IT compliance and controls : best practices for implementation
- Identity and access management solutions : using WebSphere Portal V5.1, Tivoli Identity Manager V4.5.1, and Tivoli Access Manager V5.1
- Identity and data security for web development : best practices
- Identity management : concepts, technologies, and systems
- Implementing 802.1X security solutions for wired and wireless networks
- Implementing NAP and NAC security technologies : the complete guide to network access control
- Implementing PKI Services on z/OS
- Implementing SSH : strategies for optimizing the Secure Shell
- Implementing SSL/TLS using cryptography and PKI
- Implementing homeland security for enterprise IT
- Information assurance : dependability and security in networked systems
- Information assurance : trends in vulnerabilities, threats, and technologies
- Information assurance in computer networks : methods, models, and architectures for network security : international workshop MMM-ACNS 2001, St. Petersburg, Russia, May 21-23, 2001
- Information hiding in communication networks : fundamentals, mechanisms, applications, and countermeasures
- Information security
- Information security : USDA needs to implement its departmentwide information security plan : report to the Chairman, Subcommittee on Department Operations, Oversight, Nutrition, and Forestry, Committee on Agriculture, House of Representatives
- Information security best practices : 205 basic rules
- Information security breaches : avoidance treatment based on ISO27001
- Information security governance
- Information theft prevention : theory and practice
- Innocent code : a security wake-up call for Web programmers
- Insider threat : protecting the enterprise from sabotage, spying, and theft
- Instant Spring Security starter : learn the fundamentals of web authentication and authorization using Spring Security
- Integrated security systems design : concepts, specifications, and implementation
- International guide to cyber security
- Internet applications : the emerging global computer
- Internet security : a jumpstart for systems administrators and IT managers
- Internet security : hearing before the Subcommittee on Science of the Committee on Science, Space, and Technology, U.S. House of Representatives, One Hundred Third Congress, second session, March 22, 1994
- Internet security : hearing before the Subcommittee on Science of the Committee on Science, Space, and Technology, U.S. House of Representatives, One Hundred Third Congress, second session, March 22, 1994.
- Internet security : hearing before the Subcommittee on Science of the Committee on Science, Space, and Technology, U.S. House of Representatives, One Hundred Third Congress, secondsession, March 22, 1994
- Introduction to communication electronic warfare systems
- Introduction to cryptography : principles and applications
- Introduction to network security : theory and practice
- Intrusion detection : a machine learning approach
- Intrusion prevention and active response : deploying network and host IPS
- Intrusion prevention and active response : deploying network and host IPS
- IoT security issues
- Iris biometric model for secured network access
- Joomla! web security : secure your Joomla! website from common security threats with this easy-to-use guide
- Kali Linux CTF Blueprints : build, test, and customize your own Capture the Flag challenges across multiple platforms designed to be attacked with Kali Linux
- Kali Linux network scanning cookbook : over 90 hands-on recipes explaining how to leverage custom scripts and integrated tools in Kali Linux to effectively master network scanning
- Learning pentesting for Android devices : a practical guide to learning penetration testing for Android devices and applications
- MCSE designing security for a Windows Server 2003 network : exam 70-298 : study guide & DVD training system
- Mac security bible
- Malware detection
- Managing Cisco network security
- Managing Cisco network security
- Managing cyber attacks in international law, business, and relations : in search of cyber peace
- Managing cyber attacks in international law, business, and relations : in search of cyber peace
- Managing cyber threats : issues, approaches, and challenges
- Managing information security
- Managing trust in cyberspace
- Mastering metasploit : write and implement sophisticated attack vectors in Metasploit using a completely hands-on approach
- Mastering network security
- Mastering windows network forensics and investigation
- Microsoft DirectAccess best practices and troubleshooting
- Microsoft Forefront UAG 2010 administrator's handbook : take full command of Microsoft Forefront Unified Access Gateway to secure your business applications and provide dynamic remote access with DirectAccess
- Mining social networks and security informatics
- Mobile access safety : beyond BYOD
- Modeling trust context in networks
- Moving target defense : creating asymmetric uncertainty for cyber threats
- Moving target defense II : application of game theory and adversarial modeling
- Multilayered security and privacy protection in car-to-X networks : solutions from application down to physical layer
- Nessus network auditing
- Nessus network auditing
- Nessus, Snort, & Ethereal power tools : customizing open source security applications
- Nessus, Snort, & Ethereal power tools : customizing open source security applications
- Network and data security for non-engineers
- Network and security issues for internet mobile entertainment
- Network and system security
- Network interdiction and stochastic integer programming
- Network intrusion detection and prevention : concepts and techniques
- Network performance and security : testing and analyzing using open source and low-cost tools
- Network perimeter security : building defense in-depth
- Network robustness under large-scale attacks
- Network science and cybersecurity
- Network security
- Network security
- Network security : a practical approach
- Network security : a practical guide
- Network security : current status and future directions
- Network security assessment : from vulnerability to patch
- Network security assessment : from vulnerability to patch
- Network security evaluation : using the NSA IEM
- Network security evaluation : using the NSA IEM
- Network security foundations
- Network security jumpstart
- Network security policies and procedures
- Network security technologies
- Network security technologies and solutions
- Network-wide traffic analysis : methods and applications
- Nokia Network security : solutions handbook
- Nokia Network security : solutions handbook
- Nova collection, Rise of the Hackers
- Once more unto the breach : managing information security in an uncertain world
- Online banking security measures and data protection
- Online privacy, social networking, and crime victimization : hearing before the Subcommittee on Crime, Terrorism, and Homeland Security of the Committee on the Judiciary, House of Representatives, One Hundred Eleventh Congress, second session, July 28, 2010
- OpenVPN 2 cookbook : 100 simple and incredibly effective recipes for harnessing the power of the OpenVPN 2 network
- Operational semantics and verification of security protocols
- Oracle Identity and Access Manager 11g for administrators : administer Oracle Identity and Access Management: installation, configuration, and day-to-day tasks
- PCI DSS : a pocket guide
- PCI DSS : a practical guide to implementing and maintaining compliance
- PCI compliance : implementing effective PCI data security standards
- PCI compliance : understand and implement effective PCI data security standard compliance
- Penetration tester's open source toolkit
- Penetration tester's open source toolkit
- Penetration testing : protecting networks and systems
- Physical security for IT
- Policy-based network management : solutions for the next generation
- Practical cryptography for data internetworks
- Practical deployment of Cisco Identity Services Engine (ISE) : real-world examples of AAA deployments
- Practical embedded security : building secure resource-constrained systems
- Privacy Online : OECD Guidance on Policy and Practice
- Privacy and security for cloud computing
- Professional penetration testing : creating and learning in a hacking lab
- Protecting critical infrastructures against cyber-attack
- Protocol : how control exists after decentralization
- Protocols for secure electronic commerce
- Psychosocial dynamics of cyber security
- Public key infrastructure : building trusted applications and Web services
- Public key infrastructure : examples of risks and internal control objectives associated with certification authorities.
- Python passive network mapping : P2NMAP
- Quantitative security risk assessment of enterprise networks
- SQL injection attacks and defense
- SSH, the secure shell : the definitive guide
- SSL & TLS essentials : securing the Web
- SSL and TLS : designing and building secure systems
- SSL and TLS : theory and practice
- Scalable and secure internet services and architecture
- Secrets and lies : digital security in a networked world
- Secure ICT service provisioning for cloud, mobile and beyond : a workable architectural approach balancing between buyers and providers
- Secure Internet practices : best practices for securing systems in the Internet and e-Business age
- Secure computer and network systems : modeling, analysis and design
- Secure computers and networks : analysis, design, and implementation
- Secure data management in decentralized systems
- Secure electronic commerce : building the infrastructure for digital signatures and encryption
- Secure key establishment
- Secure network design
- Secure networking -- CQRE [Secure] '99 : International Exhibition and Congress, Düsseldorf, Germany, November 30-December 2, 1999 : proceedings
- Secure production deployment of B2B solutions using WebSphere business integration connect
- Secure transaction protocol analysis : models and applications
- Securing IM and P2P applications for the enterprise
- Securing IM and P2P applications for the enterprise
- Securing and controlling Cisco routers
- Securing e-business applications and communications
- Securing information and communications systems : principles, technologies, and applications
- Securing systems : applied security architecture and threat models
- Securing the cloud : cloud computer security techniques and tactics
- Security : secrets, intruders and ID tags
- Security and privacy in cyber-physical systems : foundations, principles, and applications
- Security and privacy in internet of things (IoTs) : models, algorithms, and implementations
- Security and privacy in the digital era, Volume 1
- Security configuration in a TCP/IP Sysplex environment
- Security data visualization : graphical techniques for network analysis
- Security for Web services and service-oriented architectures
- Security for cloud storage systems
- Security for mobile networks and platforms
- Security for multihop wireless networks
- Security for telecommunications network management
- Security in ad hoc and sensor networks
- Security in distributed and networking systems
- Security in fixed and wireless networks
- Security intelligence : a practitioner's guide to solving enterprise security challenges
- Security log management : identifying patterns in the chaos
- Security log management : identifying patterns in the chaos
- Security management of next generation telecommunications networks and services
- Security management of next generation telecommunications networks and services
- Security patterns in practice : designing secure architectures using software patterns
- Security patterns in practice : designing secure architectures using software patterns
- Security risk management : building an information security risk management program from the ground up
- Security sage's guide to hardening the network infrastructure
- Selected Areas in Cryptography – SAC 2018 : 25th International Conference, Calgary, AB, Canada, August 15–17, 2018, Revised Selected Papers
- Selected papers from Kaspersky Lab's CyberSecurity for the Next Generation Conference 2013
- Silence on the wire : a field guide to passive reconnaissance and indirect attacks
- Smart Computing and Communication : Third International Conference, SmartCom 2018, Tokyo, Japan, December 10–12, 2018, Proceedings
- Snort 2.0 intrusion detection
- Snort : IDS and IPS toolkit
- SolarWinds Server & Application Monitor : deployment and administration : an intuitive guide to implementing and calibrating SolarWinds Server & Application Monitor with minimum hassle
- Special ops : host and Network security for Microsoft, UNIX, and Oracle
- Special ops : host and Network security for Microsoft, UNIX, and Oracle
- Spring Security 3 : secure your web applications against malicious intruders with this easy to follow practical guide
- Techno Security's guide to managing risks : for IT managers, auditors, and investigators
- Techno security's guide to e-discovery and digital forensics
- Technology and the law on the use of force : new security challenges in the twenty first century
- The Internet under crisis conditions : learning from September 11
- The National Infrastructure Advisory Council's final report and recommendations on the insider threat to critical infrastructures
- The Stuxnet computer worm : harbinger of an emerging warfare capability
- The basics of IT audit : purposes, processes, and practical information
- The basics of cyber warfare : understanding the fundamentals of cyber warfare in theory and practice
- The basics of web hacking : tools and techniques to attack the Web
- The connected world : examining the Internet of Things : hearing before the Committee on Commerce, Science, and Transportation, United States Senate, One Hundred Fourteenth Congress, first session, February 11, 2015
- The defender's dilemma : charting a course toward cybersecurity
- The defender's dilemma : charting a course toward cybersecurity
- The defendeŕs dilemma : charting a course toward cybersecurity
- The hacker's handbook : the strategy behind breaking into and defending networks
- The misuse of information systems : the impact of security countermeasures
- The network security test lab : a step-by-step guide
- The new era in U.S. national security : an introduction to emerging threats and challenges
- The practice of network security monitoring : understanding incident detection and response
- The security consultant's handbook
- The state of the art in intrusion prevention and detection
- The tangled Web : a guide to securing modern Web applications
- Theoretical and Experimental Methods for Defending Against DDoS Attacks
- Theoretical and experimental methods for defending against DDoS attacks
- Threat modeling : designing for security
- Toward a safer and more secure cyberspace
- Transactions on computational science XVII
- Transactions on computational science XVIII : special issue on cyberworlds
- Trust and security in collaborative computing
- Trust management for service-oriented environments
- Trust, computing, and society
- Tutorial computer and network security
- Unauthorised access : physical penetration testing for IT security teams
- Understanding bitcoin : cryptography, engineering and economics.
- Virtuality and capabilities in a world of ambient intelligence : new challenges to privacy and data protection
- Wars of disruption and resilience : cybered conflict, power, and national security
- Web application defender's cookbook : battling hackers and protecting users
- Web application security is a stack : how to CYA (Cover Your Apps) completely
- Web commerce security : design and development
- Web penetration testing with Kali Linux : a practical guide to implementing penetration testing strategies on websites, web applications, and standard web protocols with Kali Linux
- WebSphere application server for z/OS V5 and J2EE 1.3 security handbook
- What every engineer should know about cyber security and digital forensics
- What should go on the internet? : privacy, freedom, and security online
- White-hat security arsenal : tackling the threats
- Wiki at war : conflict in a socially networked world
- Wiki at war : conflict in a socially networked world
- Windows Server 2003 security cookbook
- Windows forensic analysis : DVD toolkit,
- Windows forensic analysis : DVD toolkit,
- Windows registry forensics : advanced digital forensic analysis of the Windows registry
- Wired/Wireless Internet Communications : 16th IFIP WG 6.2 International Conference, WWIC 2018, Boston, MA, USA, June 18–20, 2018, Proceedings
- Wireless communications security : solutions for the internet of things
- Wireless operational security
- Z/OS WebSphere and J2EE security handbook
- Zabbix 1.8 network monitoring : monitor your network's hardware, servers, and web performance effectively and efficiently
- z/OS 1.6 security services update
- z/OS diagnostic data : collection and analysis
Embed (Experimental)
Settings
Select options that apply then copy and paste the RDF/HTML data fragment to include in your application
Embed this data in a secure (HTTPS) page:
Layout options:
Include data citation:
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.bu.edu/resource/P4Ts5kN3RvA/" typeof="CategoryCode http://bibfra.me/vocab/lite/Concept"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.bu.edu/resource/P4Ts5kN3RvA/">Computer networks -- Security measures</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.bu.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.bu.edu/">Boston University Libraries</a></span></span></span></span></div>
Note: Adjust the width and height settings defined in the RDF/HTML code fragment to best match your requirements
Preview
Cite Data - Experimental
Data Citation of the Concept Computer networks -- Security measures
Copy and paste the following RDF/HTML data fragment to cite this resource
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.bu.edu/resource/P4Ts5kN3RvA/" typeof="CategoryCode http://bibfra.me/vocab/lite/Concept"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.bu.edu/resource/P4Ts5kN3RvA/">Computer networks -- Security measures</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.bu.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.bu.edu/">Boston University Libraries</a></span></span></span></span></div>