20 Results Found Subscribe to search results
00000000IIE
Print
by 
Stallings, William.
Format: 
Books
Publication Date 
2007
Excerpt: 
6
Available: Copies:
by 
McGraw, Gary, 1966-
Format: 
Books
Publication Date 
2006
Excerpt: 
touchpoints -- 4. Code review with a tool -- 5. Architectural risk analysis -- 6. Software penetration testing
Available: Copies:
by 
Ben-Natan, Ron.
Format: 
Books
Publication Date 
2005
Excerpt: 
. Application security -- 6. Using granular access control -- 7. Using the database to do too much -- 8
Available: Copies:
by 
Pfleeger, Charles P., 1948-
Format: 
Books
Publication Date 
2003
Excerpt: 
Operating Systems -- Ch. 6. Database Security -- Ch. 7. Security in Networks -- Ch. 8. Administering
Available: Copies:
by 
Poole, Owen.
Format: 
Books
Publication Date 
2003
Excerpt: 
6
Available: Copies:
by 
Pfleeger, Charles P., 1948-
Format: 
Books
Publication Date 
1997
Excerpt: 
Encryption Systems -- 4. Using Encryption: Protocols and Practices -- 5. Program Security -- 6. Protection in
Available: Copies:
by 
Garfinkel, Simson.
Format: 
Books
Publication Date 
1996
Excerpt: 
responsibilities -- 3. Users and passwords -- 4. Users, groups, and the superuser -- 5. The UNIX filesystem -- 6
Available: Copies:
by 
Carroll, John Millar.
Format: 
Books
Publication Date 
1996
Excerpt: 
-- Ch. 6. Physical Access Control -- Ch. 7. Physical Security -- Ch. 8. Environmental Security -- Ch. 9
Available: Copies:
Limit Search Results
Access Level
Format
Language
Item Available