199 Results Found Subscribe to search results
000000000000IIE
Print
49. 
Cover image for Hacking web apps : detecting and preventing web application security problems
by 
Shema, Mike, author.
Format: 
Books
Publication Date 
2012
Excerpt: 
Computer networks -- Security measures.
Available: Copies:
50. 
Cover image for Security+ guide to network security fundamentals
by 
Ciampa, Mark D.
Format: 
Books
Publication Date 
2012
Excerpt: 
Computer networks -- Security measures -- Examinations -- Study guides.
Available: Copies:
51. 
Cover image for Principles of information security
by 
Whitman, Michael E., 1964-
Format: 
Books
Publication Date 
2012
Excerpt: 
Computer networks -- Security measures.
Available: Copies:
52. 
Cover image for A multidisciplinary introduction to information security
by 
Mjølsnes, Stig F.
Format: 
Books
Publication Date 
2012
Excerpt: 
Computer networks -- Security measures.
Available: Copies:
53. 
Cover image for Safety health and security in wastewater systems
by 
Water Environment Federation
Format: 
Books
Publication Date 
2012
Excerpt: 
Safety health and security in wastewater systems / Water Environment Federation
Available: Copies:
54. 
Cover image for Role mining in business : taming role-based access control administration
by 
Colantonio, Alessandro.
Format: 
Books
Publication Date 
2012
Excerpt: 
Computer security.
Available: Copies:
55. 
Cover image for Frameworks for ICT policy : government, social and legal issues
by 
Adomi, Esharenana E.
Format: 
Books
Publication Date 
2011
Excerpt: 
Information technology -- Security measures -- Cross-cultural studies.
Available: Copies:
56. 
Cover image for Network security essentials : applications and standards
by 
Stallings, William.
Format: 
Books
Publication Date 
2011
Excerpt: 
Computer networks -- Security measures.
Available: Copies:
57. 
Cover image for Ethics for the information age
by 
Quinn, Michael J. (Michael Jay)
Format: 
Books
Publication Date 
2011
Excerpt: 
Computers and civilization.
Available: Copies:
58. 
Cover image for Cybercrime and espionage : an analysis of subversive multivector threats
by 
Gragido, Will.
Format: 
Books
Publication Date 
2011
Excerpt: 
Computer crimes -- Prevention.
Available: Copies:
59. 
Cover image for iPhone and iOS forensics : investigation, analysis, and mobile security for Apple iPhone, iPad, and iOS devices
by 
Hoog, Andrew.
Format: 
Books
Publication Date 
2011
Excerpt: 
iPhone and iOS forensics : investigation, analysis, and mobile security for Apple iPhone, iPad, and
Available: Copies:
60. 
Cover image for Android forensics : investigation, analysis, and mobile security for Google Android
by 
Hoog, Andrew.
Format: 
Books
Publication Date 
2011
Excerpt: 
Android forensics : investigation, analysis, and mobile security for Google Android / Hoog, Andrew.
Available: Copies:
Limit Search Results
Access Level
Author
Format
Language
Subject