Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
Search
  Browse All Reviews > Computing Milieux (K) > Management Of Computing And Information Systems (K.6) > Security and Protection (K.6.5)
 
  Security and Protection (K.6.5) See Reviews  
 
Subject Descriptors:
Authentication (94)
Insurance (1)
Invasive Software (60)
Physical Security (2)
Unauthorized Access (116)
 
Proper Nouns:
There are no proper nouns with reviews under K.6.5.
 
 
Reviews limited to:
 
 

Reviews about "Security and Protection (K.6.5)":
Cyber malware: offensive and defensive systems
Akhgar B., Almomani I., Maglaras L., Ferrag M., Ayres N., Springer International Publishing, Cham, Switzerland, 2023. 280 pp.  Type: Book (9783031349683)
Security chaos engineering: sustaining resilience in software and systems
Shortridge K., Rinehart A., O’Reilly, Sebastopol, CA, 2023. 428 pp.  Type: Book (9781098113827)
 Eight reasons to prioritize brain-computer interface cybersecurity
López Bernal S., Huertas Celdrán A., Martínez Pérez G. Communications of the ACM 66(4): 68-78, 2023.  Type: Article
 Zero trust architecture
Green-Ortiz C., Fowler B., Houck D., Hensel H., Lloyd P., McDonald A., Frazier J., Cisco Press, Indianapolis, IN, 2023. 336 pp.  Type: Book (137899734)
Computer security fundamentals (5th ed.)
Easttom C., Pearson, Hoboken, NJ, 2023. 512 pp.  Type: Book (0137984756)
 Big breaches: cybersecurity lessons for everyone
Daswani N., Elbayadi M., Apress, New York, NY, 2021. 476 pp.  Type: Book (978-1-484266-54-0)
 Phishing and communication channels: a guide to identifying and mitigating phishing attacks
Sonowal G., Apress, New York, NY, 2022. 240 pp.  Type: Book (978-1-484277-43-0)
more...
Related Topics
K.6.5 Security and Protection
  - Security and Protection
  - Social Issues
   
 
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy