32 Results Found Subscribe to search results
000000000000IIE
Print
by 
Stallings, William.
Format: 
Books
Publication Date 
2011
Excerpt: 
2
Available: Copies:
14. 
Cover image for Seven deadliest social network attacks
by 
Timm, Carl.
Format: 
Books
Publication Date 
2010
Excerpt: 
Web 2.0 -- Security measures.
Available: Copies:
15. 
Cover image for Principles of information security
by 
Whitman, Michael E., 1964-
Format: 
Books
Publication Date 
2009
Excerpt: 
1. Introduction to information security -- 2. The need for security -- 3. Legal, ethical, and
Available: Copies:
16. 
Cover image for Microsoft® Windows server 2008 security resource kit
by 
Johansson, Jesper M.
Format: 
Books
Publication Date 
2008
Excerpt: 
2
Available: Copies:
by 
Calder, Alan, 1957-
Format: 
Books
Publication Date 
2008
Excerpt: 
1. Why is information security necessary? -- 2. The Combined Code, the Turnbull Report and Sarbanes
Available: Copies:
by 
Whitman, Michael E., 1964-
Format: 
Books
Publication Date 
2008
Excerpt: 
ch. 1. Introduction to the management of information security -- ch. 2. Planning for security -- ch
Available: Copies:
by 
Lockhart, Andrew.
Format: 
Books
Publication Date 
2007
Excerpt: 
2
Available: Copies:
by 
Pfleeger, Charles P., 1948-
Format: 
Books
Publication Date 
2007
Excerpt: 
Ch. 1. Is there a security problem in computing? -- Ch. 2. Elementary cryptography -- Ch. 3
Available: Copies:
by 
McGraw, Gary, 1966-
Format: 
Books
Publication Date 
2006
Excerpt: 
1. Defining a discipline -- 2. A risk management framework -- 3. Introduction to software security
Available: Copies:
by 
Ben-Natan, Ron.
Format: 
Books
Publication Date 
2005
Excerpt: 
1. Getting started -- 2. Database security within the general security landscape and a defense
Available: Copies:
by 
Brown, Dan, 1964-
Format: 
Books
Publication Date 
2004
Excerpt: 
2
Available: Copies:
by 
Stallings, William.
Format: 
Books
Publication Date 
2003
Excerpt: 
2
Available: Copies:
Limit Search Results
Access Level
Format
Language
Subject
Item Available