Computer networks -- Security measures
Resource Information
The concept Computer networks -- Security measures represents the subject, aboutness, idea or notion of resources found in University of Liverpool.
The Resource
Computer networks -- Security measures
Resource Information
The concept Computer networks -- Security measures represents the subject, aboutness, idea or notion of resources found in University of Liverpool.
- Label
- Computer networks -- Security measures
- Authority link
- http://id.loc.gov/authorities/subjects/sh94001277
38 Items that share the Concept Computer networks -- Security measures
Context
Context of Computer networks -- Security measuresSubject of
No resources found
No enriched resources found
- Accountability and privacy in network security
- Advances in cyber security : technology, operations, and experiences
- Application security in the ISO 27001:2013 environment
- Bug bounty hunting for web security : find and exploit vulnerabilities in web sites and applications
- Cyber-security in critical infrastructures : a game-theoretic approach
- Cybersecurity Today and Tomorrow: Pay Now or Pay Later
- Designing a HIPAA-compliant security operations center : a guide to detecting and responding to healthcare breaches and events
- Dynamic Vulnerability Assessment and Intelligent Control
- Foundations of Security Analysis and Design II : FOSAD 2001/2002 Tutorial Lectures
- Guide to computer network security
- Information Assurance in Computer Networks : Methods, Models and Architectures for Network Security International Workshop MMM-ACNS 2001 St. Petersburg, Russia, May 21-23, 2001 Proceedings
- Intelligent data security solutions for e-health applications
- Internet Under Crisis Conditions: Learning from September 11
- IoT Technologies in Smart Cities : From sensors to big data, security and trust
- Living With Hacktivism : From Conflict to Symbiosis
- Navigating New Cyber Risks : How Businesses Can Plan, Build and Manage Safe Spaces in the Digital Age
- Network Security : A Decision and Game-Theoretic Approach
- Penetration testing : protecting networks and systems
- Privacy Online OECD Guidance on Policy and Practice
- Privileged attack vectors : building effective cyber-defense strategies to protect organizations
- Pro Spring security : securing Spring Framework 5 and Boot 2-based Java applications
- Protocols for authentication and key establishment
- Querying Databases Privately : A New Approach to Private Information Retrieval
- Rational cybersecurity for business : the security leaders' guide to business alignment
- SIP security
- Secure Networking - CQRE [Secure] ' 99 : International Exhibition and Congress Dپsseldorf, Germany, November 30 - December 2, 1999 Proceedings
- Security and Trust Management : 16th International Workshop, STM 2020, Guildford, UK, September 17-18, 2020, Proceedings
- Security and privacy in cyber-physical systems : foundations, principles, and applications
- Security for Ubiquitous Computing
- Security in wireless ad hoc and sensor networks
- Stochastic models in reliability, network security and system safety : essays dedicated to Professor Jinhua Cao on the occasion of his 80th birthday
- The cybersecurity playbook : how every leader and employee can contribute to a culture of security
- The security of critical infrastructures : risk, resilience and defense
- Toward a Safer and More Secure Cyberspace
- Transactions on computational science XXXV : special issue on signal processing and security in distributed systems
- Wireless Communications Security : Solutions for the Internet of Things
- Wireless communications security : solutions for the internet of things
- Zero trust networks with VMware NSX : build highly secure network architectures for your data centers
Embed
Settings
Select options that apply then copy and paste the RDF/HTML data fragment to include in your application
Embed this data in a secure (HTTPS) page:
Layout options:
Include data citation:
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.liverpool.ac.uk/resource/P4Ts5kN3RvA/" typeof="CategoryCode http://bibfra.me/vocab/lite/Concept"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.liverpool.ac.uk/resource/P4Ts5kN3RvA/">Computer networks -- Security measures</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.liverpool.ac.uk/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.liverpool.ac.uk/">University of Liverpool</a></span></span></span></span></div>
Note: Adjust the width and height settings defined in the RDF/HTML code fragment to best match your requirements
Preview
Cite Data - Experimental
Data Citation of the Concept Computer networks -- Security measures
Copy and paste the following RDF/HTML data fragment to cite this resource
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.liverpool.ac.uk/resource/P4Ts5kN3RvA/" typeof="CategoryCode http://bibfra.me/vocab/lite/Concept"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.liverpool.ac.uk/resource/P4Ts5kN3RvA/">Computer networks -- Security measures</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.liverpool.ac.uk/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.liverpool.ac.uk/">University of Liverpool</a></span></span></span></span></div>