Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
Search
  Browse All Reviews > Computing Milieux (K) > Management Of Computing And Information Systems (K.6) > Security and Protection (K.6.5)
 
  Security and Protection (K.6.5) See Reviews  
 
Subject Descriptors:
Authentication (93)
Insurance (1)
Invasive Software (59)
Physical Security (2)
Unauthorized Access (115)
 
Proper Nouns:
There are no proper nouns with reviews under K.6.5.
 
 
Reviews limited to:
 
 

Reviews about "Security and Protection (K.6.5)":
Designing cyber insurance policies in the presence of security interdependence
Khalili M., Naghizadeh P., Liu M.  NetEcon 2017 (Proceedings of the 12th Workshop on the Economics of Networks, Systems and Computation, Cambridge, MA,  Jun 27, 2017) 1-6, 2017. Type: Proceedings
Anomaly detection as a service: challenges, advances, and opportunities
Yao D., Shu X., Cheng L., Stolfo S.,  Morgan & Claypool Publishers, San Rafael, CA, 2017. 173 pp. Type: Book (978-1-681731-09-4)
Guide to digital forensics: a concise and practical introduction
K√§vrestad J.,  Springer International Publishing, New York, NY, 2017. 147 pp. Type: Book (978-3-319674-49-0)
Digital privacy and security using Windows: a practical guide
Hassan N., Hijazi R.,  Apress, New York, NY, 2017. 284 pp. Type: Book (978-1-484227-98-5)
Advances in user authentication
Dasgupta D., Roy A., Nag A.,  Springer International Publishing, New York, NY, 2017. 360 pp. Type: Book (978-3-319588-06-3)
Handbook of system safety and security: cyber risk and risk management, cyber security, threat analysis, functional safety, software systems, and cyber physical systems
Griffor E.,  Syngress Publishing, Cambridge, MA, 2016. 300 pp. Type: Book (978-0-128037-73-7)
Advanced persistent training: take your security awareness program to the next level
Schroeder J.,  Apress, New York, NY, 2017. 92 pp. Type: Book (978-1-484228-34-0)
more...
Related Topics
K.6.5 Security and Protection
  - Social Issues
  - Security and Protection
   
 
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2018 ThinkLoud, Inc.
Terms of Use
| Privacy Policy