Computer networks -- Security measures
Resource Information
The concept Computer networks -- Security measures represents the subject, aboutness, idea or notion of resources found in University of Missouri-Kansas City Libraries.
The Resource
Computer networks -- Security measures
Resource Information
The concept Computer networks -- Security measures represents the subject, aboutness, idea or notion of resources found in University of Missouri-Kansas City Libraries.
- Label
- Computer networks -- Security measures
75 Items that share the Concept Computer networks -- Security measures
Context
Context of Computer networks -- Security measuresSubject of
No resources found
No enriched resources found
- A control theoretic approach for security of cyber-physical systems
- A framework for multi-mode authentication : overview and implementation guide
- A survey of research in supervisory control and data acquisition (SCADA)
- Access to online resources : a guide for the modern librarian
- Best practices for continuity of operations (handling destructive malware)
- Beyond convergence : world without order
- Cisco security
- Cisco security architectures
- Computer network attack and international law
- Creating a patch and vulnerability management program : recommendations of the National Institute of Standards and Technology (NIST)
- Current security management & ethical issues of information technology
- Cyber infrastructure protection
- Cyber infrastructure protection
- Cybersecurity and information sharing
- Cyberterrorism and computer crimes : issues surrounding the establishment of an international regime
- Defense against the black arts : how hackers do what they do and how to protect against it
- Design and implementation of a hardened distributed network endpoint security system for improving the security of internet protocol-based networks
- Digital identity guidelines : enrollment and identity proofing
- Disappearing cryptography : information hiding : steganography & watermarking
- Guide to enterprise patch management technologies (draft) : recommendations of the National Institute of Standards and Technology
- Guide to enterprise telework and remote access security (draft) : recommendations of the National Institute of Standards and Technology
- Guide to enterprise telework and remote access security : recommendations of the National Institute of Standards and Technology
- Guidelines on securing public web servers : recommendations of the National Institute of Standards and Technology
- Guidelines on securing public web servers : recommendations of the National Institute of Standards and Technology
- Hack attacks denied : a complete guide to network lockdown
- Hack attacks revealed : a complete reference with custom security hacking toolkit
- Hack proofing ColdFusion
- Hack proofing your network
- Hack proofing your wireless network
- IPSec : securing VPNs
- Improved security planning needed for the customer technology solutions project
- Improvements are needed to strengthen ITA's information technology security program
- Information assurance : trends in vulnerabilities, threats, and technologies
- Information security : USDA needs to implement its departmentwide information security plan : report to the Chairman, Subcommittee on Department Operations, Oversight, Nutrition, and Forestry, Committee on Agriculture, House of Representatives
- Information security best practices : 200 basic rules
- Internet security : hearing before the Subcommittee on Science of the Committee on Science, Space, and Technology, U.S. House of Representatives, One Hundred Third Congress, second session, March 22, 1994
- Learning Python web penetration testing : automate web penetration testing activities using Python
- Lightweight cryptographic protocols for mobile devices
- Local area network management, design, and security : a practical approach
- Malware infections on EDA's systems were overstated and the disruption of IT operations was unwarranted
- Managing Cisco network security
- Managing Cisco network security : building rock-solid networks
- Microsoft .NET Framework security
- Multicast and group security
- Multifactor authentication for e-commerce
- Network Basic Language Translation System : security infrastructure
- Network security : a beginner's guide
- Online privacy, social networking, and crime victimization : hearing before the Subcommittee on Crime, Terrorism, and Homeland Security of the Committee on the Judiciary, House of Representatives, One Hundred Eleventh Congress, second session, July 28, 2010
- PKI : implementing and managing E-security
- PKI assessment guidelines : guidelines to help assess and facilitate interoperable trustworthy public key infrastructures
- PKI security solutions for the Enterprise : solving HIPAA, E-Paper Act, and other compliance issues
- Policy expression and enforcement for handheld devices
- Practical guide for implementing secure intranets and extranets
- Privacy preservation using spherical chord
- Proceedings of the Cybersecurity in Cyber-Physical Systems Workshop, April 23-24, 2012
- Public key infrastructure : examples of risks and internal control objectives associated with certification authorities
- RSA Security's official guide to cryptography
- Reducing systemic cybersecurity risk
- Secure network design
- Security and trust management in Self-Organizing Network (SON) : a new model of communication
- Sharing the knowledge : government-private sector partnerships to enhance information security
- SiDR
- Smart City Open Data Network System : Openness, Security, and Privacy
- Social networking : are online social networks eroding privacy?
- Social-context based routing and security in delay tolerant networks
- Survey of malware threats and recommendations to improve cybersecurity for Industrial Control Systems version 1.0
- Terrorist capabilities for cyberattack : overview and policy issues
- The Internet under crisis conditions : learning from September 11
- The National Infrastructure Advisory Council's final report and recommendations on the insider threat to critical infrastructures
- The U.S. Nuclear Regulatory Commission's cyber security regulatory framework for nuclear power reactors
- The connected world : examining the Internet of Things : hearing before the Committee on Commerce, Science, and Transportation, United States Senate, One Hundred Fourteenth Congress, first session, February 11, 2015
- The international handbook of computer security
- VELOCITY : A NetFlow Based Optimized Geo-IP Lookup Tool
- Web security basics
- Web site privacy with P3P
Embed
Settings
Select options that apply then copy and paste the RDF/HTML data fragment to include in your application
Embed this data in a secure (HTTPS) page:
Layout options:
Include data citation:
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.library.umkc.edu/resource/qdAeOJotAFA/" typeof="CategoryCode http://bibfra.me/vocab/lite/Concept"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.library.umkc.edu/resource/qdAeOJotAFA/">Computer networks -- Security measures</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.library.umkc.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.library.umkc.edu/">University of Missouri-Kansas City Libraries</a></span></span></span></span></div>
Note: Adjust the width and height settings defined in the RDF/HTML code fragment to best match your requirements
Preview
Cite Data - Experimental
Data Citation of the Concept Computer networks -- Security measures
Copy and paste the following RDF/HTML data fragment to cite this resource
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.library.umkc.edu/resource/qdAeOJotAFA/" typeof="CategoryCode http://bibfra.me/vocab/lite/Concept"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.library.umkc.edu/resource/qdAeOJotAFA/">Computer networks -- Security measures</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.library.umkc.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.library.umkc.edu/">University of Missouri-Kansas City Libraries</a></span></span></span></span></div>