Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
Search
  Browse All Reviews > Computing Milieux (K) > Management Of Computing And Information Systems (K.6) > Security and Protection (K.6.5)
 
  Security and Protection (K.6.5) See Reviews  
 
Subject Descriptors:
Authentication (94)
Insurance (1)
Invasive Software (60)
Physical Security (2)
Unauthorized Access (116)
 
Proper Nouns:
There are no proper nouns with reviews under K.6.5.
 
 
Reviews limited to:
 
 

Reviews about "Security and Protection (K.6.5)":
 Phishing and communication channels: a guide to identifying and mitigating phishing attacks
Sonowal G., Apress, New York, NY, 2022. 240 pp.  Type: Book (978-1-484277-43-0)
 The modern security operations center
Muniz J., Pearson, Hoboken, NJ, 2021. 752 pp.  Type: Book (978-1-356198-58-0)
Cyber Security: Power and Technology
Lehto M., Neittaanmaki P., Springer, Switzerland, 2018. 288 pp.  Type: Book (978-3-319753-06-5)
Computer security and the Internet
van Oorschot P., Springer International Publishing, New York, NY, 2020. 387 pp.  Type: Book (978-3-030336-48-6), Reviews: (2 of 2)
Computer security and the Internet
van Oorschot P., Springer International Publishing, New York, NY, 2020. 387 pp.  Type: Book (978-3-030336-48-6), Reviews: (1 of 2)
How to manage cybersecurity risk: a security leader’s roadmap with Open FAIR
Carlson C., Brown Walker Press, Boca Raton, FL, 2019. 308 pp.  Type: Book (978-1-627342-76-6)
Cybersecurity is not very important
Odlyzko A. Ubiquity 2019(June): 1-23, 2019.  Type: Article
more...
Related Topics
K.6.5 Security and Protection
  - Social Issues
  - Security and Protection
   
 
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2023 ThinkLoud®
Terms of Use
| Privacy Policy