Internet -- Security measures
Resource Information
The concept Internet -- Security measures represents the subject, aboutness, idea or notion of resources found in Sydney Jones Library, University of Liverpool.
The Resource
Internet -- Security measures
Resource Information
The concept Internet -- Security measures represents the subject, aboutness, idea or notion of resources found in Sydney Jones Library, University of Liverpool.
- Label
- Internet -- Security measures
198 Items that share the Concept Internet -- Security measures
Context
Context of Internet -- Security measuresSubject of
No resources found
No enriched resources found
- 125 sposobów na bezpieczeństwo sieci
- Advanced persistent threat : understanding the danger and how to protect your organization
- Advanced persistent threat : understanding the danger and how to protect your organization
- Advances in cyber security : technology, operations, and experiences
- Aggressive network self-defense
- Anonymous communication networks : protecting privacy on the web
- Anonymous communication networks : protecting privacy on the web
- Automated security management
- Big Data und allgemein zugängliche Daten im Krisenmanagement : Exemplarische technische und normative Gestaltung von Analysen zur Entscheidungsunterstützung
- Big data e privacy by design : anonimizzazione pseudonimizzazione sicurezza
- Bio-inspiring cyber security and cloud services : trends and innovations
- Botnets
- Building Internet Firewalls : Internet and Web security
- Building Internet Firewalls : Internet and Web security
- Building an effective cybersecurity program
- Casting the dark web in a new light : by examining cybercrime through a value-chain lens, we can better understand how the ecosystem works and find new strategies for combating it
- Cellular authentication for mobile and internet services
- Chinese cybersecurity and defense
- Cisco secure Internet security solutions
- Cisco secure Internet security solutions
- CompTIA Security+
- Computational network science : an algorithmic approach
- Computer security and the internet : tools and jewels
- Confronting cyber risk : an embedded endurance strategy for cybersecurity
- Crimeware : understanding new attacks and defenses
- Crimeware : understanding new attacks and defenses
- Cyber Risks for Business Professionals : a Management Guide
- Cyber conflict : competing national perspectives
- Cyber guerilla
- Cyber reconnaissance, surveillance, and defense
- Cyber reconnaissance, surveillance, and defense
- Cyber resilience of systems and networks
- Cyber risks for business professionals : a management guide
- Cyber security : deterrence and IT protection for critical infrastructures
- Cyber security and IT infrastructure protection
- Cyber threat intelligence
- Cybercrime : wie Sie Gefahren im Internet erkennen und sich schützen
- Cyberpatterns : unifying design patterns with security and attack patterns
- Cybersecurity
- Cybersecurity : managing systems, conducting testing, and investigating intrusions
- Cybersecurity in Switzerland
- Cybersecurity systems for human cognition augmentation
- Cyberwar, cyberterror, cybercrime : a guide to the role of standards in an environment of change and danger
- Datennutzungs- und datenschutzverträge : muster, klauseln, erläuterungen
- Designing Network Security Second Edition
- Designing and building enterprise DMZs
- Designing network security
- Die Kunst der Anonymität im Internet : so schützen Sie Ihre Identität und Ihre Daten
- Digital DNA : disruption and the challenges for global governance
- Digital enlightenment yearbook 2012
- Digital enlightenment yearbook 2013 : the value of personal data
- Digital privacy : PRIME--Privacy and Identity Management for Europe
- Distributed Denial of Service (DDoS) : practical detection and defense
- Distributed systems security : issues, processes, and solutions
- Distributed systems security : issues, processes, and solutions
- Dr. Tom Shinder's ISA server 2006 migration guide
- Dr. Tom Shinder's ISA server 2006 migration guide
- Enabling secure and privacy preserving communications in smart grids
- Engineering secure future internet services and systems : current research
- Enterprise cybersecurity : how to build a successful cyberdefense program against advanced threats
- Essential computer security : everyone's guide to e-mail, Internet, and wireless security
- Essential computer security : everyone's guide to e-mail, Internet, and wireless security
- Essential computer security : everyone's guide to e-mail, internet, and wireless security
- Essentials of computer networks, internet and database technologies
- Exposed : how revealing your data and eliminating privacy increases trust and liberates humanity
- Facebook essentials!
- Facebook me! : a guide to having fun with your friends and promoting your projects on Facebook
- Facebook me! : a guide to socializing, sharing, and promoting on Facebook
- Facebook me! : a guide to socializing, sharing, and promoting on Facebook
- Facebook nation : total information awareness
- Facebook nation : total information awareness
- Facebook nation : total information awareness
- Fundamentals of IP and SoC Security : Design, Verification, and Debug
- Getting started with cybersecurity science
- Global initiatives to secure cyberspace : an emerging landscape
- Google Hacking for Penetration Testers
- Google hacking for penetration testers
- Google hacking for penetration testers
- Google hacking for penetration testers, Volume 2
- Google hacking for penetration testers, Volume 2
- Hack proofing your e-commerce site : the only way to stop a hacker is to think like one
- Hands-on cybersecurity for finance : identify vulnerabilities and secure your financial services from security breaches
- Hop integrity in the Internet
- How personal & Internet security works
- How to attack and defend your website
- How to attack and defend your website
- IPSec : the new security standard for the Internet, intranets, and virtual private networks
- IPSec : the new security standard for the Internet, intranets, and virtual private networks
- Impacts and risk assessment of technology for Internet security : enabled information small-medium enterprises (TEISMES)
- Impacts and risk assessment of technology for internet security : enabled information small-medium enterprises (TEISMES)
- Information security : principles and practices
- Insider threats in cyber security
- Intelligent methods for cyber warfare
- International relations in the cyber age : the co-evolution dilemma
- Internet Privacy Rights : Rights to Protect Autonomy
- Internet denial of service : attack and defense mechanisms
- Internet denial of service : attack and defense mechanisms
- Internet of things for smart cities : technologies, big data and security
- Internet security : a jumpstart for systems administrators and IT managers
- Internet security : a jumpstart for systems administrators and IT managers
- Internet security : a jumpstart for systems administrators and IT managers
- Internet security : how to defend against attackers on the Web
- Intrusion detection & prevention
- IoT security issues
- Linux essentials for cybersecurity lab manual
- Logistics information management, Vol. 15, No. 5/6, Special issue on internet security
- Managing digital certificates across the enterprise
- Managing online risk : apps, mobile, and social media security
- Managing online risk : apps, mobile, and social media security
- Mapping security : the corporate security sourcebook for today's global economy
- Microsoft ISA Server 2006 unleashed
- Microsoft ISA Server 2006 unleashed
- Moving target defense : creating asymmetric uncertainty for cyber threats
- My online privacy for seniors
- Myspace : safe online networking for your kids
- Network Intrusion Detection, Third Edition
- Network and security issues for internet mobile entertainment
- Network forensics
- Network intrusion analysis : methodologies, tools, and techniques for incident analysis and response
- Network intrusion detection
- Network science and cybersecurity
- Network security hacks
- Network security hacks
- Network security hacks
- New solutions for cybersecurity
- Nicht hackbare rechner und nicht brechbare kryptographie
- Online information review., Volume 31, Number 5, Issues in online security
- Organized chaos : reimagining the internet
- Part-themed issue on internet security
- Pervasive wireless environments : detecting and localizing user spoofing
- Practical internet security
- Preserving privacy against side-channel leaks : from data publishing to web applications
- Privacy Online OECD Guidance on Policy and Practice
- Privacy and anonymity in the digital era
- Privacy and security for cloud computing
- Privacy defended : protecting yourself online
- Privacy defended : protecting yourself online
- Privacy online : perspectives on privacy and self-disclosure in the social web
- Proceedings of a Workshop on Deterring CyberAttacks: Informing Strategies and Developing Options for U. S. Policy
- Proceedings of a workshop on deterring cyberattacks : informing strategies and developing options for U.S. policy
- Procuring penetration testing services
- RC4 stream cipher and its variants
- RC4 stream cipher and its variants
- SCION : a secure internet architecture
- SSL and TLS : theory and practice
- Secure connected objects
- Securing social media in the enterprise
- Security : secrets, intruders and ID tags
- Security and the networked society
- Security strategies in Web applications and social networking
- Security threat mitigation and response : understanding Cisco security MARS
- Security threat mitigation and response : understanding Cisco security MARS
- Sicherheit von Webanwendungen in der Praxis : wie sich Unternehmen schützen können : Hintergründe, Maßnahmen, Prüfverfahren und Prozesse
- Situational privacy and self-disclosure : communication processes in online environments
- SpamAssassin
- SpamAssassin
- Spring Security in action
- Sweetie 2.0. Using artificial intelligence to fight webcam child sex tourism
- Synchronizing Internet Protocol Security (SIPSec)
- The basics of cyber warfare : understanding the fundamentals of cyber warfare in theory and practice
- The business blockchain : promise, practice, and application of the next Internet technology
- The business of cybersecurity : foundations and ideologies
- The cloud security ecosystem : technical, legal, business and management issues
- The death of the Internet
- The digital big bang : the hard stuff, the soft stuff, and the future of cybersecurity
- The executive guide to information security : threats, challenges, and solutions
- The flip side of free : understanding the economics of the internet
- The future of the Internet and how to stop it
- The second economy : the race for trust, treasure and time in the cybersecurity war
- The smart girl's guide to privacy : practical tips for staying safe online
- The smart girl's guide to privacy : practical tips for staying safe online
- The web application hacker's handbook : discovering and exploiting security flaws
- The web application hacker's handbook : finding and exploiting security flaws
- The web application hacker's handbook : finding and exploiting security flaws
- Theory and models for cyber situation awareness
- Threat hunting in the cloud : defending AWS, Azure and other cloud platforms against cyberattacks
- Towards the future internet : emerging trends from European research
- Transactions on computational science XXX : special issue on cyberworlds and cybersecurity
- Trust and risk in Internet commerce
- Understanding cyberrisks in IoT : when smart things turn against you
- Web application firewalls : securing modern web applications
- Web commerce security : design and development
- Web commerce security : design and development
- Web hacking : become a professional web pentester
- Web security : a whitehat perspective
- Web security : a whitehat perspective
- What should go on the internet? : privacy, freedom, and security online
- Windows forensic analysis : DVD toolkit
- Windows forensic analysis : DVD toolkit,
- Windows forensic analysis DVD toolkit 2E
- Windows forensic analysis toolkit
- Windows forensic analysis toolkit : advanced analysis techniques for Windows 7
- Windows forensic analysis toolkit : advanced analysis techniques for Windows 7
- Windows forensic analysis toolkit : advanced analysis techniques for Windows 8
- Wireless Communications Security : Solutions for the Internet of Things
- Wireless communications security : solutions for the internet of things
- Youth, pornography and the Internet
- Z/OS WebSphere and J2EE security handbook
Embed
Settings
Select options that apply then copy and paste the RDF/HTML data fragment to include in your application
Embed this data in a secure (HTTPS) page:
Layout options:
Include data citation:
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.liverpool.ac.uk/resource/BmU2Q2KkgfE/" typeof="CategoryCode http://bibfra.me/vocab/lite/Concept"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.liverpool.ac.uk/resource/BmU2Q2KkgfE/">Internet -- Security measures</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.liverpool.ac.uk/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.liverpool.ac.uk/">Sydney Jones Library, University of Liverpool</a></span></span></span></span></div>
Note: Adjust the width and height settings defined in the RDF/HTML code fragment to best match your requirements
Preview
Cite Data - Experimental
Data Citation of the Concept Internet -- Security measures
Copy and paste the following RDF/HTML data fragment to cite this resource
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.liverpool.ac.uk/resource/BmU2Q2KkgfE/" typeof="CategoryCode http://bibfra.me/vocab/lite/Concept"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.liverpool.ac.uk/resource/BmU2Q2KkgfE/">Internet -- Security measures</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.liverpool.ac.uk/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.liverpool.ac.uk/">Sydney Jones Library, University of Liverpool</a></span></span></span></span></div>