by
McGraw, Gary, 1966-
Table of contents only http://www.loc.gov/catdir/toc/ecip062/2005031598.html
Format:
Books
Publication Date
2006
Excerpt:
Addison-Wesley software security series. o2006021146 o2006021146
by
Merkow, Mark S.
Format:
Books
Publication Date
2010
Excerpt:
Secure and resilient software development / Merkow, Mark S.
by
Adomi, Esharenana E.
Format:
Books
Publication Date
2008
Excerpt:
Security and software for cybercafes / Adomi, Esharenana E.
by
Slade, Robert M.
Publisher description http://www.loc.gov/catdir/description/mh041/2003070176.html
Contributor biographical information http://www.loc.gov/catdir/bios/mh042/2003070176.html
Table of contents http://www.loc.gov/catdir/toc/mh041/2003070176.html
Contributor biographical information http://www.loc.gov/catdir/bios/mh042/2003070176.html
Table of contents http://www.loc.gov/catdir/toc/mh041/2003070176.html
Format:
Books
Publication Date
2004
Excerpt:
Software forensics : collecting evidence from the scene of a digital crime / Slade, Robert M.
by
Stallings, William, author.
Format:
Books
Publication Date
2018
Excerpt:
Part One: Computer Security Technology and Principles -- Part Two: Software and System Security
by
Pfleeger, Charles P., 1948- author.
Format:
Regular print
Publication Date
2015
Excerpt:
the primary source of vulnerability -- software, operating system, protocol, user error -- and not
by
Jacobson, Douglas.
Format:
Books
Publication Date
2013
Excerpt:
Software -- 6.5.1.Antivirus Signatures -- 6.5.2.Function of Antivirus Software -- 6.5.3.Antivirus
by
Mjølsnes, Stig F.
Format:
Books
Publication Date
2012
Excerpt:
.F. Mjølsnes -- 1.4.10.Software Security / S.F. Mjølsnes -- 1.4.11.ICT Security Evaluation / S.F. Mjølsnes -- 1
by
Shema, Mike, author.
Format:
Books
Publication Date
2012
Excerpt:
Application software -- Security measures.
by
Timm, Carl.
Format:
Books
Publication Date
2010
Excerpt:
Malware (Computer software) -- Prevention.
by
Calder, Alan, 1957-
Format:
Books
Publication Date
2008
Excerpt:
. Communications and operations management -- 13. Controls against malicious software (malware) and back-ups -- 14
by
Stallings, William.
Format:
Books
Publication Date
2003
Excerpt:
-- Intruders -- Malicious Software -- Firewalls. Standards Cited in this Book -- Some Aspects of Number Theory.
Limit Search Results
Narrowed by: