204 Results Found Subscribe to search results
000000000000IIE
Print
37. 
Cover image for Professional Java for web applications : featuring WebSockets, Spring Framework, JPA Hibernate, and Spring Security
by 
Williams, Nicholas S. author.
Format: 
Books
Publication Date 
2014
Excerpt: 
Spring Security / Williams, Nicholas S. author.
Available: Copies:
38. 
Cover image for Hacking exposed : unified communications & VoIP security secrets & solutions
by 
Collier, Mark D., author.
Format: 
Books
Publication Date 
2014
Excerpt: 
Computer networks -- Security measures.
Available: Copies:
by 
Stewart, James Michael.
Format: 
Books
Publication Date 
2014
Excerpt: 
Computer networks -- Security measures.
Available: Copies:
41. 
Cover image for Managing cyber attacks in international law, business, and relations : in search of cyber peace
by 
Shackelford, Scott J. author.
Format: 
Books
Publication Date 
2014
Excerpt: 
Computer networks -- Security measures.
Available: Copies:
by 
Jacobs, Stuart.
Format: 
Books
Publication Date 
2014
Excerpt: 
Computer networks -- Security measures.
Available: Copies:
43. 
Cover image for Android security : attacks and defenses
by 
Misra, Anmol.
Format: 
Books
Publication Date 
2013
Excerpt: 
Operating systems (Computers) -- Security measures.
Available: Copies:
44. 
Cover image for Hacking exposed : mobile security secrets & solutions
by 
Bergman, Neil.
Format: 
Books
Publication Date 
2013
Excerpt: 
Computer networks -- Security measures.
Available: Copies:
45. 
Cover image for Cyber attacks : protecting national infrastructure
by 
Amoroso, Edward.
Format: 
Books
Publication Date 
2013
Excerpt: 
Computer networks -- Security measures.
Available: Copies:
by 
Ghernaouti-Hélie, Solange, 1958-....
Format: 
Books
Publication Date 
2013
Excerpt: 
Cyber power : Crime, conflict and security in cyberspace. Ghernaouti-Hélie, Solange, 1958-....
Available: Copies:
47. 
Cover image for Network security : a beginner's guide
by 
Maiwald, Eric.
Format: 
Books
Publication Date 
2013
Excerpt: 
Computer networks -- Security measures.
Available: Copies:
48. 
Cover image for Advanced DPA theory and practice : towards the security limits of secure embedded circuits
by 
Peeters, Eric, author.
Format: 
Books
Publication Date 
2013
Excerpt: 
Embedded computer systems -- Security measures.
Available: Copies:
Limit Search Results
Access Level
Author
Format
Language
Subject