Cyber-risk informatics engineering evaluation with data science
| Main Author: | Sahinoglu, Mehmet 1951- (Author) |
|---|---|
| Format: | Book |
| Language: | English |
| Published: |
Hoboken, New Jersey
John Wiley & Sons
c2016
|
| Subjects: |
Similar Items
Secure and resilient software development
by: Merkow, Mark S., et al.
Published: (2010)
by: Merkow, Mark S., et al.
Published: (2010)
Secure and resilient software requirements, test cases, and testing methods
by: Merkow, Mark S., et al.
Published: (2012)
by: Merkow, Mark S., et al.
Published: (2012)
Computer and cyber security principles, algorithm, applications, and perspectives
Reliable distributed systems technologies, web services, and applications
by: Birman, Kenneth P.
Published: (2005)
by: Birman, Kenneth P.
Published: (2005)
Flexible, reliable software : using patterns and agile development
by: Christensen, Henrik B.
Published: (2010)
by: Christensen, Henrik B.
Published: (2010)
Error-free software know-how and know-why of program correctness
by: Baber, Robert Laurence
Published: (1991)
by: Baber, Robert Laurence
Published: (1991)
Cyber security culture counteracting cyber threats through organizational learning and training
by: Trim, Peter R. J., et al.
Published: (2013)
by: Trim, Peter R. J., et al.
Published: (2013)
Network reliability measures and evaluation
by: Chaturvedi, Sanjay K.
Published: (2016)
by: Chaturvedi, Sanjay K.
Published: (2016)
How to define and build an effective cyber threat intelligence capability
by: Dalziel, Henry
Published: (2015)
by: Dalziel, Henry
Published: (2015)
Software fault tolerance techniques and implementation
by: Pullum, Laura L.
Published: (2001)
by: Pullum, Laura L.
Published: (2001)
Cyber crime, security and digital intelligence
by: Johnson, Mark 1959-
Published: (2013)
by: Johnson, Mark 1959-
Published: (2013)
Information security and IT risk management
by: Agrawal, Manish, et al.
by: Agrawal, Manish, et al.
Microsoft Internet Security and Acceleration (ISA) Server 2000
by: Ballard, Jason 1974-, et al.
Published: (2003)
by: Ballard, Jason 1974-, et al.
Published: (2003)
Human reliability assessment theory and practice
by: Spurgin, Anthony J.
Published: (2010)
by: Spurgin, Anthony J.
Published: (2010)
Fuzzing for software security testing and quality assurance
by: Takanen, Ari, et al.
Published: (2008)
by: Takanen, Ari, et al.
Published: (2008)
Trust and security in collaborative computing
by: Zou, Xukai 1963-, et al.
Published: (2008)
by: Zou, Xukai 1963-, et al.
Published: (2008)
Hunting security bugs
by: Gallagher, Tom, et al.
Published: (2006)
by: Gallagher, Tom, et al.
Published: (2006)
Security software development assessing and managing security risks
by: Ashbaugh, Douglas A.
Published: (2009)
by: Ashbaugh, Douglas A.
Published: (2009)
The engineering of software quality
by: O'Brien, Fergus
Published: (2004)
by: O'Brien, Fergus
Published: (2004)
Security and resilience in intelligent data-centric systems and communication networks
Network security : an introduction to techniques & standard
by: Kamaruzzaman Seman, et al.
Published: (2007)
by: Kamaruzzaman Seman, et al.
Published: (2007)
Cloud security : a general guide to secured computing
by: Masnida Hussin, et al.
Published: (2021)
by: Masnida Hussin, et al.
Published: (2021)
Quality of service in a Cisco networking environment
by: Held, Gilbert 1943-
by: Held, Gilbert 1943-
Using aspect-oriented programming for trustworthy software development
by: Safonov, V. O. (Vladimir Olegovich)
Published: (2008)
by: Safonov, V. O. (Vladimir Olegovich)
Published: (2008)
Computational network science : an algorithmic approach
by: Hexmoor, Henry
Published: (2015)
by: Hexmoor, Henry
Published: (2015)
Hacking exposed 6 network security secrets & solutions
by: McClure, Stuart, et al.
Published: (2009)
by: McClure, Stuart, et al.
Published: (2009)
Hacking exposed network security secrets and solutions
by: McClure, Stuart, et al.
Published: (2005)
by: McClure, Stuart, et al.
Published: (2005)
Insider attack and cyber security beyond the hacker
by: Stolfo, Salvatore J.
Published: (2008)
by: Stolfo, Salvatore J.
Published: (2008)
Software engineering of fault tolerant systems
by: Pelliccione, P. (Patrizio)
Published: (2007)
by: Pelliccione, P. (Patrizio)
Published: (2007)
Information security the complete reference
by: Rhodes-Ousley, Mark
Published: (2013)
by: Rhodes-Ousley, Mark
Published: (2013)
24 deadly sins of software security programming flaws and how to fix them
by: Howard, Michael 1965-, et al.
Published: (2010)
by: Howard, Michael 1965-, et al.
Published: (2010)
Network security essentials applications and standards
by: Stallings, William
Published: (2017)
by: Stallings, William
Published: (2017)
Introduction to security and network forensics
by: Buchanan, William J. 1926-2005
Published: (2011)
by: Buchanan, William J. 1926-2005
Published: (2011)
Understanding security issues
by: Donaldson, Scott E., et al.
by: Donaldson, Scott E., et al.
Hacking exposed 7 network security secrets & solutions
by: McClure, Stuart, et al.
Published: (2012)
by: McClure, Stuart, et al.
Published: (2012)
Computer security fundamentals
by: Easttom, Chuck
Published: (2006)
by: Easttom, Chuck
Published: (2006)
Computer security fundamentals
by: Easttom, Chuck
Published: (2016)
by: Easttom, Chuck
Published: (2016)
Principles of information security
by: Whitman, Michael E. 1964-, et al.
Published: (2009)
by: Whitman, Michael E. 1964-, et al.
Published: (2009)
Computer security fundamentals
by: Easttom, Chuck
Published: (2012)
by: Easttom, Chuck
Published: (2012)
Network security essentials applications and standards
by: Stallings, William
Published: (2007)
by: Stallings, William
Published: (2007)
Similar Items
-
Secure and resilient software development
by: Merkow, Mark S., et al.
Published: (2010) -
Secure and resilient software requirements, test cases, and testing methods
by: Merkow, Mark S., et al.
Published: (2012) - Computer and cyber security principles, algorithm, applications, and perspectives
-
Reliable distributed systems technologies, web services, and applications
by: Birman, Kenneth P.
Published: (2005) -
Flexible, reliable software : using patterns and agile development
by: Christensen, Henrik B.
Published: (2010)