Volltext-Artikel, eBooks und vieles mehr aus dem EBSCO Discovery Service

Das Gesuchte nicht gefunden? Schauen Sie in der Onleihe oder machen Sie einen Kaufvorschlag

Treffer 1 - 20 von 52

1

Co-design for Security and Reliability
Manzhosov, Evgeny

Computer science Computer security--Compu... Data encryption (Compute... Computer systems--Reliab... Hacking
Dissertation
2

Scaling Deductive Verification for Real-world Cloud Data Security
Li, Xupeng

Computer science Computer security--Compu... Cloud computing Machine learning Virtual computer systems
Dissertation
3

Automated Verification of Safety and Liveness Properties for Distributed Protocols
Yao, Jianan

Computer science Computer security Computer security--Compu... Distributed parameter sy... Computers--Safety measur...
Dissertation
5

Key management deployment guide: using the IBM Enterprise key management foundation
Using the IBM Enterprise key management foundation

Andreasen, Mike. ; International Business Machines Corporation. International Technical Support Organization.

Computer security -- Man... Computer security -- Com...
Buch
6

Protecting games: a security handbook for game developers and publishers
Davis, Steven B. ; Davis, Steven B.

Computer security -- Com... Computer games. Software protection. Computer networks -- Sec...
Buch
7

Reverse engineering code with IDA Pro
RE code with IDA Pro

Ferguson, Justin. ; Kaminsky, Dan.

IDA Pro (Electronic reso... Debugging in computer sc... Computer security -- Com... Reverse engineering -- C...
Buch
8

Configuring Check Point NGX VPN-1/FireWall-1
Check Point NGX VPN-1/FireWall-1

Stephens, Robert. ; Stiefel, Barry J. ; Watkins, Stephen. ; et al.

FireWall-1. Firewalls (Computer secu... Computer networks -- Sec... Computer security -- Com... Extranets (Computer netw...
Buch
9

Essential Check Point FireWall-1 NG: an installation, configuration, and troubleshooting guide
Welch-Abernathy, Dameon D. ; Welch-Abernathy, Dameon D.

FireWall-1. Computer networks -- Sec... Computer security -- Com...
Buch
10

Methods and Tools for Practical Software Testing and Maintenance
Saieva, Anthony

Computer science Computer security--Compu... Computer software--Secur... Debugging in computer sc...
Dissertation
11

Securing AI-Generated Media With Blockchain Technologies
G. Revathy ; Arul Kumar Natarajan ; Naresh Kshetri ; et al.

Digital media AI art Blockchains (Databases) Information storage and... Generative art Computer security--Compu...
E-Book
12

Analyzing and Securing Software via Robust and Generalizable Learning
Pei, Kexin

Computer science Computer software--Secur... Computer security--Compu... Deep learning (Machine l... Neural networks (Compute...
Dissertation
13

Adaptive and Effective Fuzzing: a Data-Driven Approach
She, Dongdong

Computer science Computer security--Compu... Malware (Computer softwa... Machine learning Google (Firm) Microsoft Corporation
Dissertation
14

Evading EDR : The Definitive Guide to Defeating Endpoint Detection Systems.
Matt Hand ; Matt Hand

Intrusion detection syst... Penetration testing (Com... Computer security--Compu... Operating systems (Compu... Computer networks--Secur...
E-Book
15

Endpoint Detection and Response Essentials : Explore the Landscape of Hacking, Defense, and Deployment in EDR
Boyraz ; Boyraz

Computer networks--Secur... Operating systems (Compu... Computer security--Compu... Penetration testing (Com... Intrusion detection syst...
E-Book
16

Data Exfiltration Threats and Prevention Techniques : Machine Learning and Memory-Based Data Security
Zahir Tari ; Nasrin Sohrabi ; Yasaman Samadi ; et al.

Malware (Computer softwa... Information filtering sy... Malware (Computer softwa... Computer security--Compu... Computer networks--Secur...
E-Book
17

Mobilizing the C-Suite : Waging War Against Cyberattacks
Frank Riccardi ; Frank Riccardi

Computer networks--Secur... Computer security--Compu...
E-Book
18

Ring-LWE: Enhanced Foundations and Applications
Lin, Chengyu

Computer science Data encryption (Compute... Computer security--Compu... Dedekind rings
Dissertation
19

Hardware-Software Co-design for Practical Memory Safety
Hassan, Mohamed

Computer engineering Computer science Memory--Computer program... C++ (Computer program la... Computer security--Compu...
Dissertation
20

Check Point Firewall Administration R81.10+ : A Practical Guide to Check Point Firewall Deployment and Administration
Vladimir Yakovlev ; Vladimir Yakovlev

Computer networks--Secur... Firewalls (Computer secu... Computer security--Compu...
E-Book

Filter