Amoroso, Edward G.
993  results:
Search for persons X
?
2

Cloud Security:

, In: Computer and Information Security Handbook,
Amoroso, Edward G. - p. 923-930 , 2017
 
?
3

Contributors:

, In: Computer and Information Security Handbook,
 
?
4

Protecting Virtual Infrastructure:

, In: Computer and Information Security Handbook,
Amoroso, Edward G. - p. 945-951 , 2017
 
?
5

Software-Defined Networking and Network Function Virtualiza..:

, In: Computer and Information Security Handbook,
Amoroso, Edward G. - p. 953-961 , 2017
 
?
6

Practical methods for securing the cloud:

Amoroso, Edward G.
IEEE Cloud Computing.  1 (2014)  1 - p. 28-38 , 2014
 
?
 
?
8

A View from the C-Suite:

Amoroso, Edward G. ; Thompson, Hugh
IEEE Security & Privacy.  11 (2013)  1 - p. 11-12 , 2013
 
?
9

Response:

, In: Cyber Attacks,
Amoroso, Edward G. - p. 193-206 , 2011
 
?
10

Depth:

, In: Cyber Attacks,
Amoroso, Edward G. - p. 109-127 , 2011
 
?
11

Acknowledgment:

, In: Cyber Attacks,
Amoroso, Edward G. - p. xi , 2011
 
?
12

Deception:

, In: Cyber Attacks,
Amoroso, Edward G. - p. 31-50 , 2011
 
?
13

Diversity:

, In: Cyber Attacks,
Amoroso, Edward G. - p. 73-87 , 2011
 
?
14

Awareness:

, In: Cyber Attacks,
Amoroso, Edward G. - p. 179-192 , 2011
 
?
15

Introduction:

, In: Cyber Attacks,
Amoroso, Edward G. - p. 1-29 , 2011
 
1-15