Item type | Current library | Home library | Shelving location | Call number | Status | Barcode | |
---|---|---|---|---|---|---|---|
![]() |
American University in Dubai | American University in Dubai | Main Collection | QA 76.9 .A25 S379 2012 (Browse shelf(Opens below)) | Available | 5074607 |
QA 76.9 .A25 S32x 2001 Hacking exposed Windows 2000 : network security secrets & solutions / | QA 76.9 .A25 S35 1996 Applied cryptography : protocols, algorithms, and source code in C / | QA 76.9 .A25 S352 2000 Secrets and lies : digital security in a networked world / | QA 76.9 .A25 S379 2012 Security automation essentials : streamlined enterprise security management & monitoring with SCAP / | QA 76.9 .A25 S56 2006 Hands-on ethical hacking and network defense / | QA 76.9 .A25 S627 2012 Safeguarding critical e-documents : implementing a program for securing confidential information assets / | QA 76.9 .A25 S69 2006 Information security : principles and practice / |
Ch 1. Introduction Ch 2. What Is SCAP Ch 3. SCAP Languages Ch 4. SCAP Enumerations (with case study) Ch 5. SCAP Vulnerability Measurement (with case study) Ch 6. Putting the Pieces Together (with case study) Ch 7. Using SCAP In Your Enterprise (with case study) Ch 8. Emerging SCAP Technologies Ch 9. Conclusion Appendices Index
Includes index.
There are no comments on this title.