234 Results Found Subscribe to search results
000000000000IIE
Print
1. 
Cover image for Security fundamentals : exam 98-367
by 
Gambrel, Bryan.
Format: 
Books
Publication Date 
2012
Excerpt: 
Computer security -- Examinations -- Study guides.
Available:
Copies:
2. 
Cover image for A multidisciplinary introduction to information security
by 
Mjølsnes, Stig F.
Format: 
Books
Publication Date 
2012
Excerpt: 
Computer networks -- Security measures.
Available:
Copies:
3. 
Cover image for Role mining in business : taming role-based access control administration
by 
Colantonio, Alessandro.
Format: 
Books
Publication Date 
2012
Excerpt: 
Computer security.
Available:
Copies:
by 
Shoemaker, Dan.
Format: 
Books
Publication Date 
2012
Excerpt: 
Computer security -- Textbooks.
Available:
Copies:
by 
Baldauf, Ken.
Format: 
Books
Publication Date 
2011
Excerpt: 
Succeeding with technology : computer system concepts for your life / Baldauf, Ken.
Available:
Copies:
by 
Stallings, William.
Format: 
Books
Publication Date 
2011
Excerpt: 
Computer networks -- Security measures.
Available:
Copies:
by 
Quinn, Michael J. (Michael Jay)
Format: 
Books
Publication Date 
2011
Excerpt: 
Computers and civilization.
Available:
Copies:
8. 
Cover image for iPhone and iOS forensics : investigation, analysis, and mobile security for Apple iPhone, iPad, and iOS devices
by 
Hoog, Andrew.
Format: 
Books
Publication Date 
2011
Excerpt: 
iPhone and iOS forensics : investigation, analysis, and mobile security for Apple iPhone, iPad, and
Available:
Copies:
9. 
Cover image for Android forensics : investigation, analysis, and mobile security for Google Android
by 
Hoog, Andrew.
Format: 
Books
Publication Date 
2011
Excerpt: 
Android forensics : investigation, analysis, and mobile security for Google Android / Hoog, Andrew.
Available:
Copies:
by 
Gibson, Darril.
Format: 
Books
Publication Date 
2011
Excerpt: 
Computer security.
Available:
Copies:
11. 
Cover image for Architecture of network systems
by 
Serpanos, Dimitrios Nikolaou.
Format: 
Books
Publication Date 
2011
Excerpt: 
Computer network architectures.
Available:
Copies:
12. 
Cover image for Security risk management : building an information security risk management program from the ground up
by 
Wheeler, Evan.
Format: 
Books
Publication Date 
2011
Excerpt: 
Security risk management : building an information security risk management program from the ground
Available:
Copies:
Limit Search Results
Access Level
Author
Format
Language
Subject
Item Available