by
Stallings, William.
Table of contents only http://www.loc.gov/catdir/toc/fy0706/2006287096.html
Format:
Books
Publication Date
2007
Excerpt:
6
by
McGraw, Gary, 1966-
Table of contents only http://www.loc.gov/catdir/toc/ecip062/2005031598.html
Format:
Books
Publication Date
2006
Excerpt:
touchpoints -- 4. Code review with a tool -- 5. Architectural risk analysis -- 6. Software penetration testing
by
Ben-Natan, Ron.
Format:
Books
Publication Date
2005
Excerpt:
. Application security -- 6. Using granular access control -- 7. Using the database to do too much -- 8
by
Pfleeger, Charles P., 1948-
Format:
Books
Publication Date
2003
Excerpt:
Operating Systems -- Ch. 6. Database Security -- Ch. 7. Security in Networks -- Ch. 8. Administering
by
Poole, Owen.
Format:
Books
Publication Date
2003
Excerpt:
6
by
Pfleeger, Charles P., 1948-
Format:
Books
Publication Date
1997
Excerpt:
Encryption Systems -- 4. Using Encryption: Protocols and Practices -- 5. Program Security -- 6. Protection in
by
Garfinkel, Simson.
Table of contents http://www.gbv.de/dms/bowker/toc/9781565921481.pdf
Contributor biographical information http://catdir.loc.gov/catdir/enhancements/fy0915/96161185-b.html
Publisher description http://catdir.loc.gov/catdir/enhancements/fy0915/96161185-d.html
Umschlagbild http://swbplus.bsz-bw.de/bsz048310409cov.htm
Contributor biographical information http://catdir.loc.gov/catdir/enhancements/fy0915/96161185-b.html
Publisher description http://catdir.loc.gov/catdir/enhancements/fy0915/96161185-d.html
Umschlagbild http://swbplus.bsz-bw.de/bsz048310409cov.htm
Format:
Books
Publication Date
1996
Excerpt:
responsibilities -- 3. Users and passwords -- 4. Users, groups, and the superuser -- 5. The UNIX filesystem -- 6
by
Carroll, John Millar.
Format:
Books
Publication Date
1996
Excerpt:
-- Ch. 6. Physical Access Control -- Ch. 7. Physical Security -- Ch. 8. Environmental Security -- Ch. 9
Limit Search Results
Narrowed by: