152 Results Found Subscribe to search results
000000000000IIE
Print
1. 
Cover image for Network security essentials : applications and standards
by 
Stallings, William.
Format: 
Books
Publication Date 
2011
Excerpt: 
Computer networks -- Security measures.
Available: Copies:
2. 
Cover image for Ethics for the information age
by 
Quinn, Michael J. (Michael Jay)
Format: 
Books
Publication Date 
2011
Excerpt: 
Computers and civilization.
Available: Copies:
3. 
Cover image for Computer networks.
by 
Tanenbaum, Andrew S., 1944-
Format: 
Books
Publication Date 
2011
Excerpt: 
Computer networks. Tanenbaum, Andrew S., 1944-
Available: Copies:
4. 
Cover image for Gray hat hacking : the ethical hacker's handbook
by 
Harper, Allen.
Format: 
Books
Publication Date 
2011
Excerpt: 
Computer security.
Available: Copies:
5. 
Cover image for Architecture of network systems
by 
Serpanos, Dimitrios Nikolaou.
Format: 
Books
Publication Date 
2011
Excerpt: 
Computer network architectures.
Available: Copies:
6. 
Cover image for Succeeding with technology : computer system concepts for your life
by 
Baldauf, Ken.
Format: 
Books
Publication Date 
2011
Excerpt: 
Succeeding with technology : computer system concepts for your life / Baldauf, Ken.
Available: Copies:
7. 
Cover image for Hacking exposed computer forensics : secrets & solutions
by 
Davis, Chris.
Format: 
Books
Publication Date 
2010
Excerpt: 
Computer security.
Available: Copies:
8. 
Cover image for Internet fraud casebook : the World Wide Web of deceit
by 
Wells, Joseph T.
Format: 
Books
Publication Date 
2010
Excerpt: 
Computer security -- Case studies.
Available: Copies:
9. 
Cover image for Secure and resilient software development
by 
Merkow, Mark S.
Format: 
Books
Publication Date 
2010
Excerpt: 
Computer security.
Available: Copies:
10. 
Cover image for Introduction to information systems
by 
O'Brien, James A., 1936-
Format: 
Books
Publication Date 
2010
Excerpt: 
. Computer software ; 5. Data resource management ; Telecommunications and networks -- Module III. Business
Available: Copies:
11. 
Cover image for IT audit, control, and security
by 
Moeller, Robert R.
Format: 
Books
Publication Date 
2010
Excerpt: 
Computer networks -- Security measures.
Available: Copies:
12. 
Cover image for Seven deadliest social network attacks
by 
Timm, Carl.
Format: 
Books
Publication Date 
2010
Excerpt: 
Computer networks -- Security measures.
Available: Copies:
Limit Search Results
Access Level
Author
Format
Item Category 1
Language
Subject
Item Available