General
Ññûëêà
Äàòà
Îáúåì â êáàéòàõ
×èñëî ñòðàíèö
Ñïðàâêà
Is There a Security Problem in Computing?
2006
586
36
Security articles
Strengthening network Security with on DemanD Vulnerability management anD Policy comPliance
2008
763
6
Advanced Information Assurance Handbook
March 2004
10219
283
Fundamental Principles of Network Security
By Christopher Leidigh
2009
1113
14
Building a Successful Security Operations Center
2010
812
11
Around the world in IP attacks
Bob Eisenhardt
2012
94
15
BDNA for Security
Strengthened Security Through Visibility
2010
574
6
Data Drain
by Rich Mogull
2009
835
4
Information Management Policies
By Randolph A. Kahn and Barclay T. Blair
2009
690
23
Essential Guide SIMs
Today security information management systems can be used for proactive risk management and business intelligence. We’ll explain how this can be achieved.
2009
5225
35
Microsoft Security Intelligence Report
December 2009
24387
248
Network Security for 2010 and Beyond – The Impact of The Consumerization, Webification, Virtualization, and Consolidation of IT
Mark Bouchard
2010
254
7
Security Principles
2009
578
18
Unveiling the Security Illusion: the need for active network forensics Unveiling the Security Illusion: the need for active
2010
623
12
Infornation-Centric Security.
Confronting the Threats to Your Network
2009
382
8
Securing Layer 2
2010
771
6
(The Need for) Inherently Secure Communications
2012
349
6
Cybersecurity in 2020: The future looks bleak
May 17, 2016
390
3
Michael Kassner
Encrypted communications could have an undetectable backdoor
Oct 11, 2016
387
2
Lucian Constantin, IDG News Service
Cybersecurity Is Not About Technology: It's about the Business of Cyber Crime. Everywhere.
2017
1593
13
Juniper