Incident Response in the Age of Cloud: Techniques and best practices to effectively respond to cybersecurity incidents
By: Material type:
TextLanguage: English Publication details: IEEEOther classification:
eBooks
| Cover image | Item type | Current library | Home library | Collection | Shelving location | Call number | Materials specified | Vol info | URL | Copy number | Status | Notes | Date due | Barcode | Item holds | Item hold queue priority | Course reserves | |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
eBooks
|
Central Library | Central Library | Available | CL2128112 |
There are no comments on this title.
Log in to your account to post a comment.
-
5701
Pattern Recognition and Big Data
by Pal Sankar Kumar & Pal Amita -
5702
Pattern Recognition and Image Analysis: Selected Papers from the Ivth Spanish Symposium
by Sanfeliu A Et Al -
5703
Pattern recognition and image processing
by Majumder D Dutta Ed -
5704
Pattern recognition and machine learning
by Bishop Christopher M -
5705
Pattern Recognition in Softcomputing Paradigm
by Pal Nikhil R -
5706
Pattern recognition: A quality of data perspective
by Homenda Wladyslaw -
5707
Pattern Recognition: Architectures, Algorithms and Applications
by Plamondon R, Cheng H D -
5708
Pattern Recognition: from Classical to Modern Approaches
by Pal S K & Pal A -
5709
Pattern recognition: Introduction, features, classifiers and principles
by Beyerer Jurgen -
5710
Pattern recognition: statistical, structural and neural approaches
by Schalkoff Robert J -
5711
Pattern recognition:theory and application
by Zoeller Erwin A Ed. -
5712
Pattern theory: The stochastic analysis of real world signals
by Mumford David; Desolneux Agn`es -
5713
Pattern theory: The stochastic analysis of real-world signals
by Mumford David; Desolneux Agnes -
5714
Pattern-oriented software architecture: A system of patterns
by Buschmann Frank -
5715
Patterns for fault tolerant software
by Hanner Robert S -
5716
Patterns, predictions, and actions: Foundations of machine learning
by Hardt, Moritz -
5717
PC interfacing, communications and Windows programming
by Buchanan William -
5718
PC intern: system programming
by Tischer Michael -
5719
PC interrupts: a programmer's reference to Bios, DOS, and thrid-party calls
by Brown Ralf -
5720
PC/computing customizing windows 3.1
by Bonner Paul -
5721
PCC`s refrence book of personal and home computing
by Mccabe D Wight Ed. -
5722
PCI Compliance
by Williams, Branden -
5723
PCI DSS 3.1
by Williams, Branden -
5724
Pearls of functional algorithm design
by Bird Richard -
5725
Peering Carrier Ethernet Networks
by Kangovi, Sachidananda -
5726
Penetration tester's open source toolkit
by Faircloth Jeremy -
5727
Penetration Tester's Open Source Toolkit
by Faircloth, Jeremy -
5728
Penetration testing essentials
by Oriyano Sean-Philip -
5729
PentiumTM processor system architecture by Mindshare,Inc and REFs
by Anderson Don -
5730
People and computers
by Vinsonhaler John, and others -
5731
People oriented computer systems: the computer in crisis
by Tomeski Edward A -
5732
Performance analysis for Java web sites
by Joines Stacy -
5733
Performance analysis of data sharing environments
by Dan Asit -
5734
Performance analysis of queuing and computer networks.
by Dattatreya G R -
5735
Performance analysis of queuing and computer networks.
by Dattatreya G R -
5736
Performance analysis of queuing and computer networks.
by Dattatreya G R -
5737
Performance analysis queuing and computer networks
by Dattatreya G R -
5738
Performance control: Service and resource control in complex IBM computing centres
by Hoie Tore A -
5739
Performance evaluation of computer and communication systems
by Boudec Jean-Yves Le -
5740
Performance measurement of computer systems
by Mckerrow Phillip -
5741
Perl testing: A developer's notebook
by Langworth Ian -
5742
Personal computer book
by Bradbeer Robin -
5743
Personal computing with the VCSD P-system
by Overgaard Mark -
5744
Personal data protections
by Court J M -
5745
Personal networks:wireless networking for personal devices
by Jacobsson Martin -
5746
Personal Wireless Communications: Pwc'05 - Proceedings of the 10Th Ifip Conference
by Lorenz Pascal -
5747
Personalization Techniques and Recommender Systems
by Uchyigit Gulden Et Al -
5748
Perspective in Theoretical Computer Science, a: Commemorative Volume for Gift Siromoney
by Narasimhan R -
5749
Perspectives on Data Science for Software Engineering
by Menzies, Tim -
5750
Perspectives on software requirements
by Sampaio do Prado Leite Julio Cesar Ed.
Incident Response in the Age of Cloud: Techniques and best practices to effectively respond to cybersecurity incidents
APA
Ozkaya, .Incident Response in the Age of Cloud: Techniques and best practices to effectively respond to cybersecurity incidents. : IEEE.
Chicago
Ozkaya, .Incident Response in the Age of Cloud: Techniques and best practices to effectively respond to cybersecurity incidents. : IEEE.
Harvard
Ozkaya, .Incident Response in the Age of Cloud: Techniques and best practices to effectively respond to cybersecurity incidents. : IEEE.
MLA
Ozkaya, .: IEEE. .
