Search
for Topics
All Reviews
Browse All Reviews
>
Computing Milieux (K)
>
Management Of Computing And Information Systems (K.6)
> Security and Protection (K.6.5)
Options:
All Media Types
Journals
Proceedings
Div Books
Whole Books
Other
Date Reviewed
Title
Author
Publisher
Published Date
Descending
Ascending
1-10 of 457 Reviews about "
Security and Protection (K.6.5)
":
Date Reviewed
Information security planning: a practical approach (2nd ed.)
Lincke S., Springer International Publishing, Cham, Switzerland, 2024. 445 pp. Type: Book (9783031431173)
Information security planning
presents a comprehensive guide to the basics of information security planning. The author’s perspective addresses critical issues and challenges for emerging information security, including security aware...
Apr 3 2024
Cyber malware: offensive and defensive systems
Akhgar B., Almomani I., Maglaras L., Ferrag M., Ayres N., Springer International Publishing, Cham, Switzerland, 2023. 280 pp. Type: Book (9783031349683)
Cyber malware: offensive and defensive systems
provides a thorough examination of the constantly changing realm of cyber threats and the defense mechanisms created to fend them off. For those working in the field of cybersecurity, this book...
Feb 21 2024
Security chaos engineering: sustaining resilience in software and systems
Shortridge K., Rinehart A., O’Reilly, Sebastopol, CA, 2023. 428 pp. Type: Book (9781098113827)
The remarkable progress in data communications and networking necessitates new behaviors, principles, and disciplines concerning security. In addition to security techniques like encryption, authentication, established demilitarized zones (DMZs), ...
Feb 20 2024
Eight reasons to prioritize brain-computer interface cybersecurity
López Bernal S., Huertas Celdrán A., Martínez Pérez G. Communications of the ACM 66(4): 68-78, 2023. Type: Article
In this thought-provoking article, the authors astutely highlight the significance of prioritizing brain-computer interface (BCI) cybersecurity. Their comprehensive work sheds light on the emerging field of BCI and the critical need to protect the...
Sep 29 2023
Zero trust architecture
Green-Ortiz C., Fowler B., Houck D., Hensel H., Lloyd P., McDonald A., Frazier J., Cisco Press, Indianapolis, IN, 2023. 336 pp. Type: Book (137899734)
“Don’t trust anyone” is common advice in many spy novels and movies. Good advice as well for modern Internet-connected network infrastructures, where there are no longer demarcations between internal-only and external access poin...
Sep 25 2023
Computer security fundamentals (5th ed.)
Easttom C., Pearson, Hoboken, NJ, 2023. 512 pp. Type: Book (0137984756)
Computer security fundamentals
, by Chuck Easttom, is a compilation of concepts and tools used in computer security. The book is composed of 15 chapters that can be gathered into four distinct parts....
Jun 7 2023
Big breaches: cybersecurity lessons for everyone
Daswani N., Elbayadi M., Apress, New York, NY, 2021. 476 pp. Type: Book (978-1-484266-54-0)
This large work begins with an introductory preface that provides historical perspective on cybercriminals and introduces the authors and the basic tenets of the book. The work is divided into two broad parts: the first gives detailed descriptions...
Mar 31 2023
Phishing and communication channels: a guide to identifying and mitigating phishing attacks
Sonowal G., Apress, New York, NY, 2022. 240 pp. Type: Book (978-1-484277-43-0)
It is not far-fetched to say that most (if not all)
CR
readers have been subjected to some sort of phishing attack--and even more likely if we consider the wide taxonomy of activities that Sonowal’s book covers. Can we as individ...
Jan 12 2023
The modern security operations center
Muniz J., Pearson, Hoboken, NJ, 2021. 752 pp. Type: Book (978-1-356198-58-0)
Cybersecurity involves carrying out complete and continuous activities to investigate and eliminate threats. As a recommended solution, a security operations center (SOC) allows an organization to achieve a level of security by monitor...
Jun 24 2022
Cyber Security: Power and Technology
Lehto M., Neittaanmaki P., Springer, Switzerland, 2018. 288 pp. Type: Book (978-3-319753-06-5)
The book is split into two parts: “Cyber Power” (110 pages) and “Cyber Security Technology” (160 pages). They are very different in nature, likely appealing to two separate audiences....
Feb 22 2022
Display
5
10
15
25
50
100
per page
Reproduction in whole or in part without permission is prohibited. Copyright 1999-2024 ThinkLoud
®
Terms of Use
|
Privacy Policy