76 Results Found Subscribe to search results
000000000000IIE
Print
13. 
Cover image for Principles of information security
by 
Whitman, Michael E., 1964-
Format: 
Books
Publication Date 
2012
Available: Copies:
14. 
Cover image for Hacking web apps : detecting and preventing web application security problems
by 
Shema, Mike, author.
Format: 
Books
Publication Date 
2012
Available: Copies:
15. 
Cover image for A multidisciplinary introduction to information security
by 
Mjølsnes, Stig F.
Format: 
Books
Publication Date 
2012
Available: Copies:
16. 
Cover image for Role mining in business : taming role-based access control administration
by 
Colantonio, Alessandro.
Format: 
Books
Publication Date 
2012
Available: Copies:
17. 
Cover image for Network security essentials : applications and standards
by 
Stallings, William.
Format: 
Books
Publication Date 
2011
Available: Copies:
18. 
Cover image for Gray hat hacking : the ethical hacker's handbook
by 
Harper, Allen.
Format: 
Books
Publication Date 
2011
Available: Copies:
19. 
Cover image for Managing risk in information systems
by 
Gibson, Darril.
Format: 
Books
Publication Date 
2011
Available: Copies:
by 
Rowlingson, Robert.
Format: 
Books
Publication Date 
2011
Available: Copies:
21. 
Cover image for IT audit, control, and security
by 
Moeller, Robert R.
Format: 
Books
Publication Date 
2010
Available: Copies:
22. 
Cover image for Hacking exposed computer forensics : secrets & solutions
by 
Davis, Chris.
Format: 
Books
Publication Date 
2010
Available: Copies:
23. 
Cover image for Secure and resilient software development
by 
Merkow, Mark S.
Format: 
Books
Publication Date 
2010
Available: Copies:
24. 
Cover image for Mobile device security : a comprehensive guide to securing your information in a moving world
by 
Fried, Stephen, 1962-
Format: 
Books
Publication Date 
2010
Available: Copies:
Limit Search Results
Access Level
Author
Format
Language
Subject
Item Available