Computer security
Resource Information
The concept Computer security represents the subject, aboutness, idea or notion of resources found in University of Missouri-Kansas City Libraries.
The Resource
Computer security
Resource Information
The concept Computer security represents the subject, aboutness, idea or notion of resources found in University of Missouri-Kansas City Libraries.
- Label
- Computer security
136 Items that share the Concept Computer security
Context
Context of Computer securitySubject of
No resources found
No enriched resources found
- A credential reliability and revocation model for federated identifiers
- A new strong proactive verifiable secret sharing scheme with unconditional security
- A statistical test suite for random and pseudorandom number generators for cryptographic applications
- A statistical test suite for random and pseudorandom number generators for cryptographic applications
- A survey of research in supervisory control and data acquisition (SCADA)
- An industrial control system cybersecurity performance testbed
- Anonymous multicast communication for wireless sensor networks using layered encryption and hashing
- Auditing and security : AS/400, NT, Unix, networks, and disaster recovery plans
- Automated security self-evaluation tool user manual
- Automated tools for testing computer system vulnerability
- Beyond convergence : world without order
- Bibliography of selected computer security publications : January 1980-October 1989
- Border gateway protocol security
- CEEME: compensating events based execution monitoring enforcement for Cyber-Physical Systems
- CONTAM to EnergyPlus infiltration features of the CONTAM Results Export Tool
- COTS security protection profile-operating systems (CSPP-OS)
- Cisco security
- Computer security : virus highlights need for improved internet management : report to the chairman, Subcommittee on Telecommunications and Finance, Committee on Energy and Commerce, House of Representatives
- Computer security considerations in federal procurements : a guide for procurement initiators, contracting officers, and computer security officials
- Computer security division 2012 annual report
- Convergence : Illicit networks and national security in the age of globalization
- Current security management & ethical issues of information technology
- CyberShock : surviving hackers, phreakers, identity thieves, Internet terrorists, and weapons of mass disruption
- Cybersecurity: DHS needs to enhance efforts to improve and promote the security of federal and private-sector networks : testimony before the Committee on Homeland Security and Governmental Affairs, U.S. Senate
- Data Breaches of Personally Identifiable Information at Federal Agencies : Analyses and Lessons
- Data management and information security
- Defense against the black arts : how hackers do what they do and how to protect against it
- Defensive code's impact on software performance
- Department of Veterans Affairs : Federal Information Security Management Act assessment for FY 2010
- Derived personal identity verification (PIV) credentials
- Design and implementation of a hardened distributed network endpoint security system for improving the security of internet protocol-based networks
- Designing security architecture solutions
- Digital watermarking
- Digitale Souveränität : Bürger, Unternehmen, Staat
- E-policy : how to develop computer, E-policy, and Internet guidelines to protect your company and its assets
- Engineering principles for information technology security (a baseline for achieving security) : recommendations of the National Institute of Standards and Technology
- Entity authentication using public key cryptography
- Examination of the GAO audit series of HHS cybersecurity : hearing before the Subcommittee on Oversight and Investigations of the Committee on Energy and Commerce, House of Representatives, One Hundred Fifteenth Congress, second session, June 20, 2018
- FHFA's implementation of Active Directory
- File-sharing : a fair share? Maybe not
- Finding and fixing vulnerabilities in information systems : the vulnerability assessment & mitigation methodology
- GDPR and Cyber Security for Business Information Systems
- General procedures for registering computer security objects
- Good security practices for electronic commerce, including electronic data interchange
- Guidance for securing Microsoft Windows XP for IT Professionals : a NIST security configuration checklist : recommendations of the National Institute of Standards and Technology
- Guide for developing security plans for information technology systems
- Guide to Malware incident prevention and handling
- Guide to general server security : recommendations of the National Institute of Standards and Technology
- Hack attacks denied : a complete guide to network lockdown
- Hack attacks revealed : a complete reference with custom security hacking toolkit
- Hack attacks testing : how to conduct your own security audit
- Hack proofing ColdFusion
- Hack proofing XML
- Hack proofing your identity in the information age : protect your family on the internet!
- Hack proofing your network
- How to Survive a Data Breach : A Pocket Guide
- IIS security
- Incident response & computer forensics
- Incident response : investigating computer crime
- Information Security : Principles and Practice
- Information flow properties for cyber-physical systems
- Information hiding techniques for steganography and digital watermarking
- Information security : National Nuclear Security Administration needs to improve contingency planning for its classified supercomputing operations : report to congressional requesters
- Information security : opportunities exist for the Federal Housing Finance Agency to improve controls : report to the Acting Director of the Federal Housing Finance Agency
- Information security best practices : 200 basic rules
- Internet security : hearing before the Subcommittee on Science of the Committee on Science, Space, and Technology, U.S. House of Representatives, One Hundred Third Congress, second session, March 22, 1994
- Introduction to cryptography with Java applets
- Invasion of privacy : big brother and the company hackers
- Java security
- Keeping your site comfortably secure : an introduction to Internet firewalls
- Learning Efficient Deep Feature Extraction For Mobile Ocular Biometrics
- Linux security
- Location privacy policy management system
- Managing risk and information security : protect to enable
- Microsoft .NET Framework security
- Minimizing the effects of malware on your computer
- Minimum security requirements for multi-user operating systems
- Mobile agent security
- Mobile device security : cloud and hybrid builds
- Modeling cyber-physical war-gaming
- Modes of Operation Validation System for the Triple Data Encryption Algorithm (TMOVS) : requirements and procedures
- NSTIC pilots : catalyzing the identity ecosystem
- Network security : a beginner's guide
- Networks of 'things'
- OS Friendly Microprocessor Architecture
- Ocular motion classification for mobile device presentation attack detection
- PKI : implementing and managing E-security
- Play it safe online
- Policy machine : features, architecture, and specification
- PrEServD - Privacy ensured service discovery in mobile peer-to-peer environment
- Principles of Cybercrime :
- Proceedings of the Cybersecurity for Direct Digital Manufacturing (DDM) symposium
- Proceedings of the Cybersecurity in Cyber-Physical Systems Workshop, April 23-24, 2012
- Protect your digital privacy! : survival skills for the information age
- Protected Secret Sharing and its application to threshold cryptography
- Protecting your library's digital sources : the essential guide to planning and preservation
- Recommendation for Cryptographic Key Generation
- Reducing systemic cybersecurity risk
- Report on the static analysis tool exposition (SATE) IV
- Secure communications : briefing before Committee on Science, Subcommittee on Technology, U.S. House of Representatives, One Hundred Fifth Congress, first session, February 11, 1997
- Secure design defects detection and correction
- Securing electronic health records on mobile devices
- Security and trust management in Self-Organizing Network (SON) : a new model of communication
- Security architecture methodology for large net-centric systems
- Security considerations in the information system development life cycle
- Security in open systems
- Security issues in the database language SQL
- Security metrics guide for information technology systems
- Security technologies for the World Wide Web
- Security technologies for the World Wide Web
- Seven simple computer security tips for small business and home computer users
- Seventeenth annual report on federal agency use of voluntary consensus standards and conformity assessment
- Siamese Network-Based Multi-Modal Deepfake Detection
- Situational awareness for electric utilities
- Smoke screen in cyberspace architecture document
- Spyware : background and policy issues for Congress
- Survey of malware threats and recommendations to improve cybersecurity for Industrial Control Systems version 1.0
- Techniques and applications of digital watermarking and content protection
- Terra defender cyber-physical wargame
- Terrorist capabilities for cyberattack : overview and policy issues
- Test results for digital data acquisition tool : EnCase 5.05f
- The Huawei and Snowden questions : Can electronic equipment from untrusted vendors be verified? Can an untrusted vendor build trust into electronic equipment?
- The National Infrastructure Advisory Council's final report and recommendations on the insider threat to critical infrastructures
- The art of deception : controlling the human element of security
- The complete guide to Internet security
- The impact of the FCC's Open Network Architecture on NS/NP telecommunications security
- The international handbook of computer security
- The keyed-hash message authentication code (HMAC)
- The role of technology in countering trafficking in persons : joint hearing before the Subcommittee on Investigations and Oversight Subcommittee on Research and Technology of the Committee on Science, Space, and Technology, House of Representatives, One Hundred Sixteenth Congress, second session, July 28, 2020
- The secure online business : e-commerce, IT functionality & business continuity
- Third-round report of the SHA-3 cryptographic hash algorithm competition
- Top secret/trade secret : accessing and safeguarding restricted information
- Uso compartido de archivos : cómo evaluar los riesgos
- Uso compartido de archivos : cómo evaluar los riesgos = file-sharing : evaluate the risks
- Wireless security : models, threats, and solutions
- XML security
Embed
Settings
Select options that apply then copy and paste the RDF/HTML data fragment to include in your application
Embed this data in a secure (HTTPS) page:
Layout options:
Include data citation:
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.library.umkc.edu/resource/Lgk5GCZ245E/" typeof="CategoryCode http://bibfra.me/vocab/lite/Concept"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.library.umkc.edu/resource/Lgk5GCZ245E/">Computer security</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.library.umkc.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.library.umkc.edu/">University of Missouri-Kansas City Libraries</a></span></span></span></span></div>
Note: Adjust the width and height settings defined in the RDF/HTML code fragment to best match your requirements
Preview
Cite Data - Experimental
Data Citation of the Concept Computer security
Copy and paste the following RDF/HTML data fragment to cite this resource
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.library.umkc.edu/resource/Lgk5GCZ245E/" typeof="CategoryCode http://bibfra.me/vocab/lite/Concept"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.library.umkc.edu/resource/Lgk5GCZ245E/">Computer security</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.library.umkc.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.library.umkc.edu/">University of Missouri-Kansas City Libraries</a></span></span></span></span></div>