156 Results Found Subscribe to search results
000000000000IIE
Print
37. 
Cover image for Advanced DPA theory and practice : towards the security limits of secure embedded circuits
by 
Peeters, Eric, author.
Format: 
Books
Publication Date 
2013
Excerpt: 
Embedded computer systems -- Security measures.
Available: Copies:
38. 
Cover image for Hacking web apps : detecting and preventing web application security problems
by 
Shema, Mike, author.
Format: 
Books
Publication Date 
2012
Excerpt: 
Computer networks -- Security measures.
Available: Copies:
39. 
Cover image for A multidisciplinary introduction to information security
by 
Mjølsnes, Stig F.
Format: 
Books
Publication Date 
2012
Excerpt: 
Computer networks -- Security measures.
Available: Copies:
40. 
Cover image for Safety health and security in wastewater systems
by 
Water Environment Federation
Format: 
Books
Publication Date 
2012
Excerpt: 
Safety health and security in wastewater systems / Water Environment Federation
Available: Copies:
41. 
Cover image for Role mining in business : taming role-based access control administration
by 
Colantonio, Alessandro.
Format: 
Books
Publication Date 
2012
Excerpt: 
Computer security.
Available: Copies:
42. 
Cover image for Security risk management : building an information security risk management program from the ground up
by 
Wheeler, Evan.
Format: 
Books
Publication Date 
2011
Excerpt: 
Security risk management : building an information security risk management program from the ground
Available: Copies:
43. 
Cover image for Architecture of network systems
by 
Serpanos, Dimitrios Nikolaou.
Format: 
Books
Publication Date 
2011
Excerpt: 
Computer network architectures.
Available: Copies:
44. 
Cover image for Succeeding with technology : computer system concepts for your life
by 
Baldauf, Ken.
Format: 
Books
Publication Date 
2011
Excerpt: 
Succeeding with technology : computer system concepts for your life / Baldauf, Ken.
Available: Copies:
45. 
Cover image for Frameworks for ICT policy : government, social and legal issues
by 
Adomi, Esharenana E.
Format: 
Books
Publication Date 
2011
Excerpt: 
Information technology -- Security measures -- Cross-cultural studies.
Available: Copies:
46. 
Cover image for Cybercrime and espionage : an analysis of subversive multivector threats
by 
Gragido, Will.
Format: 
Books
Publication Date 
2011
Excerpt: 
Computer crimes -- Prevention.
Available: Copies:
47. 
Cover image for Ethics for the information age
by 
Quinn, Michael J. (Michael Jay)
Format: 
Books
Publication Date 
2011
Excerpt: 
Computers and civilization.
Available: Copies:
48. 
Cover image for Cybercrime : investigating high-technology computer crime
by 
Moore, Robert, 1976-
Format: 
Books
Publication Date 
2011
Excerpt: 
Computer security -- Law and legislation -- United States.
Available: Copies:
Limit Search Results
Access Level
Author
Format
Item Category 1
Language
Subject
Item Available