Computer Security

Also known as cybersecurity or IT security, is the protection of information systems from theft or damage to the hardware, the software, and to the information on them, as well as from disruption or misdirection of the services they provide.

All categories

Books under this sub-category (18 books)

Ten Strategies of a World-Class Cybersecurity Operations Center

Post date: 23 Oct 2016
Covers ten key qualities of leading Cyber Security Operations Centers (CSOCs), ranging from their structure and organization, to processes that best enable smooth operations, to approaches that extract maximum value from key CSOC technology investments.
Publisher: The MITRE Corporation
Publication date: 31 Dec 2014
Document Type: Book
 
Ten Strategies of a World-Class Cybersecurity Operations Center

Ten Strategies of a World-Class Cybersecurity Operations Center

Post date: 23 Oct 2016
Covers ten key qualities of leading Cyber Security Operations Centers (CSOCs), ranging from their structure and organization, to processes that best enable smooth operations, to approaches that extract maximum value from key CSOC technology investments.
Publisher: The MITRE Corporation
Publication date: 31 Dec 2014
Document Type: Book


The SysSec Red Book: A Roadmap for Systems Security Research

Post date: 15 Nov 2016
The Red Book presents a roadmap in the area of systems security, as prepared by the SysSec consortium and its constituency in the first half of 2013.
Publisher: SysSec
Publication date: 01 Sep 2013
License: Standard Copyright License
Document Type: Book
 
The SysSec Red Book: A Roadmap for Systems Security Research

The SysSec Red Book: A Roadmap for Systems Security Research

Post date: 15 Nov 2016
The Red Book presents a roadmap in the area of systems security, as prepared by the SysSec consortium and its constituency in the first half of 2013.
Publisher: SysSec
Publication date: 01 Sep 2013
License: Standard Copyright License Document Type: Book


Why Should I Care? Mobile Security for The Rest of Us

Post date: 02 Mar 2017
A guide for a coordinated effort between employees and IT/security personnel to truly secure mobile computing in the enterprise.
Publication date: 01 Dec 2012
Document Type: Book
 
Why Should I Care? Mobile Security for The Rest of Us

Why Should I Care? Mobile Security for The Rest of Us

Post date: 02 Mar 2017
A guide for a coordinated effort between employees and IT/security personnel to truly secure mobile computing in the enterprise.
Publication date: 01 Dec 2012
Document Type: Book


Book Categories
Sponsors
Icons8, a free icon pack