29 results on '"Amoroso, Edward G."'
Search Results
2. Chapter 70 - Software-Defined Networking and Network Function Virtualization Security
3. Chapter 69 - Protecting Virtual Infrastructure
4. The Role of Commercial End-to-End Secure Mobile Voice in Cyberspace
5. Cloud Security
6. Protecting Virtual Infrastructure
7. Contributors
8. Software-Defined Networking and Network Function Virtualization Security
9. Cyber attacks: awareness
10. Exploring Malicious Hacker Communities
11. Contributors to Volume II
12. Introduction
13. Deception
14. Response
15. Correlation
16. Acknowledgment
17. Separation
18. Chapter 68 - Software-Defined Networking and Network Function Virtualization Security
19. Chapter 67 - Protecting Virtual Infrastructure
20. Chapter 64 - Cloud Security
21. Report of an integrity research study group
22. Practical methods for securing the cloud
23. A View from the C-Suite
24. From the Enterprise Perimeter to a Mobility-Enabled Secure Cloud
25. Cyber Security
26. Creating formal specifications from requirements documents
27. A graduate course in computing security technology
28. A graduate course in computing security technology.
29. The formal specification and prototype implementation of a simple editor.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.