enow.com Web Search

Search results

  1. Results from the WOW.Com Content Network
  2. This Is How They Tell Me the World Ends - Wikipedia

    en.wikipedia.org/wiki/This_Is_How_They_Tell_Me...

    This Is How They Tell Me the World Ends: The Cyberweapons Arms Race is a non-fiction book published in 2021 by American journalist and author Nicole Perlroth.The book's main topic is cyberwarfare, and it examines the rapid proliferation and development of cyberweapons by nation-states and non-state actors.

  3. Rainbow Series - Wikipedia

    en.wikipedia.org/wiki/Rainbow_Series

    The Rainbow Series (sometimes known as the Rainbow Books) is a series of computer security standards and guidelines published by the United States government in the 1980s and 1990s. They were originally published by the U.S. Department of Defense Computer Security Center, and then by the National Computer Security Center .

  4. Principles of Information Security - Wikipedia

    en.wikipedia.org/wiki/Principles_of_Information...

    Principles of Information Security is a textbook written by Michael Whitman and Herbert Mattord and published by Course Technology. [ 1 ] It is in widespread use in higher education in the United States as well as in many English -speaking countries.

  5. The Cuckoo's Egg (book) - Wikipedia

    en.wikipedia.org/wiki/The_Cuckoo's_Egg_(book)

    The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage is a 1989 book written by Clifford Stoll. It is his first-person account of the hunt for a computer hacker who broke into a computer at Lawrence Berkeley National Laboratory (LBNL). Stoll's use of the term extended the metaphor Cuckoo's egg from brood parasitism in birds to ...

  6. Category:Computer security books - Wikipedia

    en.wikipedia.org/wiki/Category:Computer_security...

    Download as PDF; Printable version ... This category should contain all articles related to computer security and information security ... Pages in category "Computer ...

  7. The CIS Critical Security Controls for Effective Cyber Defense

    en.wikipedia.org/wiki/The_CIS_Critical_Security...

    The CIS Controls (formerly called the Center for Internet Security Critical Security Controls for Effective Cyber Defense) is a publication of best practice guidelines for computer security. The project was initiated early in 2008 in response to extreme data losses experienced by organizations in the US defense industrial base. [1]

  8. Richard Benham - Wikipedia

    en.wikipedia.org/wiki/Richard_Benham

    Richard Benham (born August 1965) is a pioneering figure in the field of Cyber Security, known for his contributions as an academic, innovator, entrepreneur, and best-selling author. He was the world's first formal Professor of Cyber Security Management at Coventry University in 2013 and now holds a visiting Chair at Abertay University in Cyber ...

  9. Kingpin (book) - Wikipedia

    en.wikipedia.org/wiki/Kingpin_(book)

    This article about a crime novel of the 2010s is a stub. You can help Wikipedia by expanding it. See guidelines for writing about novels. Further suggestions might be found on the article's talk page.