Related Articles
- Corporate Computer and Network Security. Coronado, Adolfo S. // Journal of Information Privacy & Security;2012, Vol. 8 Issue 4, p81
The article reviews the book "Corporate Computer and Network Security," by Raymond R. Panko.
- Computer Network Security and Cyber Ethics. Kichuk, Diana // Feliciter;2012, Vol. 58 Issue 3, p122
The article reviews the book "Computer Network Security and Cyber Ethics," by Joseph Migga Kizza.
- Between the Lines. Lorenzetti, Jennifer Patterson // University Business;Mar2004, Vol. 7 Issue 3, p15
Reviews the book "Computers and Network Security in Higher Education," edited by Mark Luker and Rodney Petersen.
- The Complete Reference: Network Security (Book). // District Administration;Sep2004, Vol. 40 Issue 9, p73
Reviews the book "The Complete Reference: Network Security."
- Information Security Analyst. Nolan, Abby // Booklist;4/1/2013, Vol. 109 Issue 15, p60
The article reviews the book "Information Security Analyst," by Wil Mara, part of the Cool STEM Careers book series.
- Deep Souths (Book). Willis, John C. // Journal of Southern History;Feb2003, Vol. 69 Issue 1, p200
Reviews the book 'Deep Souths: Delta, Piedmont, and Sea Island Society in the Age of Segregation,' by J. William Harris.
- From To-Be-Determined to Must-Have in One Step. Sedighi, Art // IEEE Software;Sep/Oct2007, Vol. 24 Issue 5, p102
The article reviews the book "Introduction to Network Security," by Neal Krawertz.
- Security in Sensor Networks. Brooks, Richard R. // International Journal of Distributed Sensor Networks;2008, Vol. 4 Issue 4, p371
The article reviews the book "Security in Sensor Networks," edited by Yang Xiao
- The Tao of Network Security Monitoring: Beyond Intrusion Detection. Bianco, David // Information Security;Dec2004, Vol. 7 Issue 12, p16
Reviews the book "The Tao of Network Security Monitoring: Beyond Intrusion Detection," by Richard Bejtlich.