Electronic Documents Search

Documents found: 60

  • Global cyber security labor shortage and international business risk

    Other creators Christiansen Bryan; Piekarz Agnieszka
    Organization IGI Global,
    Collection Электронные книги зарубежных издательств; Общая коллекция
    Subjects International business enterprises — Security measures.; Computer security.; Information technology — Security measures.; Computer crimes — Prevention.; Data protection.; BUSINESS & ECONOMICS / Industrial Management; BUSINESS & ECONOMICS / Management; BUSINESS & ECONOMICS / Management Science; BUSINESS & ECONOMICS / Organizational Behavior; EBSCO eBooks
    Document type Other
    File type PDF
    Language English
    Rights Доступ по паролю из сети Интернет (чтение, печать, копирование)
  • Cloud Security Automation: Get to grips with automating your cloud security on AWS and OpenStack.

    Creators Priyam Prashant.
    Imprint Birmingham: Packt Publishing, 2018
    Collection Электронные книги зарубежных издательств; Общая коллекция
    Subjects Cloud computing — Security measures.; Computer networks — Security measures.; Computers — Networking — Security.; Computers — System Administration — General.; Computer networking & communications.; Network security.; Computers — Security — General.; Computer security.; COMPUTERS / Computer Literacy; COMPUTERS / Computer Science; COMPUTERS / Data Processing; COMPUTERS / Hardware / General; COMPUTERS / Information Technology; COMPUTERS / Machine Theory; COMPUTERS / Reference; EBSCO eBooks
    Document type Other
    File type PDF
    Language English
    Rights Доступ по паролю из сети Интернет (чтение, печать, копирование)
  • Cloud Security Automation: Get to grips with automating your cloud security on AWS and OpenStack.

    Creators Priyam Prashant.
    Imprint Birmingham: Packt Publishing, 2018
    Collection Электронные книги зарубежных издательств; Общая коллекция
    Subjects Cloud computing — Security measures.; Computer networks — Security measures.; Computers — Networking — Security.; Computers — System Administration — General.; Computer networking & communications.; Network security.; Computers — Security — General.; Computer security.; COMPUTERS / Computer Literacy; COMPUTERS / Computer Science; COMPUTERS / Data Processing; COMPUTERS / Hardware / General; COMPUTERS / Information Technology; COMPUTERS / Machine Theory; COMPUTERS / Reference; EBSCO eBooks
    Document type Other
    File type PDF
    Language English
    Rights Доступ по паролю из сети Интернет (чтение, печать, копирование)
  • Hands-on cybersecurity with Blockchain: implement DDoS protection, PKI-based identity, 2FA, and DNS security using Blockchain

    Creators Gupta Rajneesh
    Collection Электронные книги зарубежных издательств; Общая коллекция
    Subjects Computer security.; Computer networks — Security measures.; Blockchains (Databases); Database security.; Denial of service attacks.; COMPUTERS — Security — General.; COMPUTERS — Networking — Security.; COMPUTERS — Security — Online Safety & Privacy.; Data capture & analysis.; Network security.; EBSCO eBooks
    Document type Other
    File type PDF
    Language English
    Rights Доступ по паролю из сети Интернет (чтение, печать, копирование)
  • Hands-on cybersecurity with Blockchain: implement DDoS protection, PKI-based identity, 2FA, and DNS security using Blockchain

    Creators Gupta Rajneesh
    Collection Электронные книги зарубежных издательств; Общая коллекция
    Subjects Computer security.; Computer networks — Security measures.; Blockchains (Databases); Database security.; Denial of service attacks.; COMPUTERS — Security — General.; COMPUTERS — Networking — Security.; COMPUTERS — Security — Online Safety & Privacy.; Data capture & analysis.; Network security.; EBSCO eBooks
    Document type Other
    File type PDF
    Language English
    Rights Доступ по паролю из сети Интернет (чтение, печать, копирование)
  • Learn ethical hacking from scratch: your stepping stone to penetration testing

    Creators Sabih Zaid
    Collection Электронные книги зарубежных издательств; Общая коллекция
    Subjects Penetration testing (Computer security); Hacking.; Computer networks — Security measures.; Computer security.; COMPUTERS / Security / General.; EBSCO eBooks
    Document type Other
    File type PDF
    Language English
    Rights Доступ по паролю из сети Интернет (чтение, печать, копирование)
  • Hands-on Spring Security 5 for Reactive applications: learn effective ways to secure your applications with Spring and Spring WebFlux

    Creators John Tomcy
    Collection Электронные книги зарубежных издательств; Общая коллекция
    Subjects Web applications — Security measures.; Application software — Development.; Computer security.; COMPUTERS / Software Development & Engineering / General.; COMPUTERS / Web / Web Programming.; COMPUTERS / Security / General.; EBSCO eBooks
    Document type Other
    File type PDF
    Language English
    Rights Доступ по паролю из сети Интернет (чтение, печать, копирование)
  • Hands-on Spring Security 5 for Reactive applications: learn effective ways to secure your applications with Spring and Spring WebFlux

    Creators John Tomcy
    Collection Электронные книги зарубежных издательств; Общая коллекция
    Subjects Web applications — Security measures.; Application software — Development.; Computer security.; COMPUTERS / Software Development & Engineering / General.; COMPUTERS / Web / Web Programming.; COMPUTERS / Security / General.; EBSCO eBooks
    Document type Other
    File type PDF
    Language English
    Rights Доступ по паролю из сети Интернет (чтение, печать, копирование)
  • Learn ethical hacking from scratch: your stepping stone to penetration testing

    Creators Sabih Zaid
    Collection Электронные книги зарубежных издательств; Общая коллекция
    Subjects Penetration testing (Computer security); Hacking.; Computer networks — Security measures.; Computer security.; COMPUTERS / Security / General.; EBSCO eBooks
    Document type Other
    File type PDF
    Language English
    Rights Доступ по паролю из сети Интернет (чтение, печать, копирование)
  • Mastering Linux security and hardening: secure your Linux server and protect it from intruders, malware attacks, and other external threats

    Creators Tevault Donald A.,
    Collection Электронные книги зарубежных издательств; Общая коллекция
    Subjects Computer security.; Computer security — Standards.; Computer Security; Sécurité informatique — Normes.; Sécurité informatique.; Linux.; Computer networking & communications.; COMPUTERS — Operating Systems — Linux.; COMPUTERS — Security — General.; EBSCO eBooks
    Document type Other
    File type PDF
    Language English
    Rights Доступ по паролю из сети Интернет (чтение, печать, копирование)

Creators

...

Scientific adviser

...

Publication year

...

Digital publication year

...

Publisher

...

Collection

...

Subjects

...

Document type

...

Language

...

Access

...

Level of education

...

Speciality code (FGOS)

...

Speciality code (OKSO)

...

Speciality code (OKSVNK)

...

Speciality group (FGOS)

...

Speciality group (OKSO)

...

Speciality group (OKSVNK)

...

Journal/newspaper

...