Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
  Browse All Reviews > Computing Milieux (K) > Management Of Computing And Information Systems (K.6) > Security and Protection (K.6.5)
  Security and Protection (K.6.5) See Reviews  
Subject Descriptors:
Authentication (93)
Invasive Software (59)
Physical Security (2)
Unauthorized Access (115)
Proper Nouns:
There are no proper nouns with reviews under K.6.5.
Reviews limited to:

Reviews about "Security and Protection (K.6.5)":
Advances in user authentication
Dasgupta D., Roy A., Nag A.,  Springer International Publishing, New York, NY, 2017. 360 pp. Type: Book (978-3-319588-06-3)
Handbook of system safety and security: cyber risk and risk management, cyber security, threat analysis, functional safety, software systems, and cyber physical systems
Griffor E.,  Syngress Publishing, Cambridge, MA, 2016. 300 pp. Type: Book (978-0-128037-73-7)
Advanced persistent training: take your security awareness program to the next level
Schroeder J.,  Apress, New York, NY, 2017. 92 pp. Type: Book (978-1-484228-34-0)
Advanced persistent security: a cyberwarfare approach to implementing adaptive enterprise protection, detection, and reaction strategies
Winkler I., Gomes A.,  Syngress Publishing, Cambridge, MA, 2016. 260 pp. Type: Book (978-0-128093-16-0)
Cybersecurity for industry 4.0: analysis for design and manufacturing
Thames L., Schaefer D.,  Springer International Publishing, New York, NY, 2017. 265 pp. Type: Book (978-3-319506-59-3)
Global supply chain security and management: appraising programs, preventing crimes
Prokop D.,  Butterworth-Heinemann, Newton, MA, 2017. 200 pp. Type: Book (978-0-128007-48-8)
Cyber security. Simply. Make it happen.: leveraging digitization through IT security
Abolhassan F.,  Springer International Publishing, New York, NY, 2017. 127 pp. Type: Book (978-3-319465-28-9)
Related Topics
K.6.5 Security and Protection
  - Social Issues
  - Security and Protection
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2018 ThinkLoud, Inc.
Terms of Use
| Privacy Policy