by
Schackow, Stefan, 1970-
Table of contents http://www.loc.gov/catdir/toc/ecip063/2005032278.html
Format:
Books
Publication Date
2006
Excerpt:
Professional ASP.NET 2.0 security, membership, and role management / Schackow, Stefan, 1970-
by
Whitman, Michael E., 1964- author.
Format:
Books
Publication Date
2018
Excerpt:
2
by
Sutton, David (Information security practitioner), author.
Format:
Books
Publication Date
2017
Excerpt:
2
by
Whitman, Michael E., 1964- author.
Format:
Books
Publication Date
2016
Excerpt:
2
by
Mukhopadhyay, Debdeep.
Format:
Books
Publication Date
2015
Excerpt:
1. Background -- 2. Hardware design of cryptographic algorithms -- 3. Side channel analysis -- 4
by
Pfleeger, Charles P., 1948- author.
Format:
Regular print
Publication Date
2015
Excerpt:
2
by
Stallings, William, author.
Format:
Books
Publication Date
2014
Excerpt:
2
by
Goodrich, M. T. (Michael T.)
Format:
Books
Publication Date
2014
Excerpt:
2
by
Jacobson, Douglas.
Format:
Books
Publication Date
2013
Excerpt:
.Introduction -- 2.2.Computers -- 2.2.1.Hardware -- 2.2.2.Operating Systems -- 2.2.3.Applications -- 2.2.4.Users
by
Whitman, Michael E., 1964-
Format:
Books
Publication Date
2012
Excerpt:
2
by
Mjølsnes, Stig F.
Format:
Books
Publication Date
2012
Excerpt:
.G. Kjeldsberg / E.J. Aas -- 2.2.1.RSA as Hardwired Electronics / P.G. Kjeldsberg / E.J. Aas -- 2.2.2.AES as
by
Shema, Mike, author.
Format:
Books
Publication Date
2012
Excerpt:
2
by
Stallings, William.
Format:
Books
Publication Date
2011
Excerpt:
2
by
Timm, Carl.
Format:
Books
Publication Date
2010
Excerpt:
Web 2.0 -- Security measures.
by
Whitman, Michael E., 1964-
Format:
Books
Publication Date
2009
Excerpt:
1. Introduction to information security -- 2. The need for security -- 3. Legal, ethical, and
by
Whitman, Michael E., 1964-
Format:
Books
Publication Date
2008
Excerpt:
ch. 1. Introduction to the management of information security -- ch. 2. Planning for security -- ch
by
Calder, Alan, 1957-
Format:
Books
Publication Date
2008
Excerpt:
1. Why is information security necessary? -- 2. The Combined Code, the Turnbull Report and Sarbanes
by
Johansson, Jesper M.
Format:
Books
Publication Date
2008
Excerpt:
2
by
Lockhart, Andrew.
Format:
Books
Publication Date
2007
Excerpt:
2
by
Pfleeger, Charles P., 1948-
Table of contents only http://www.loc.gov/catdir/toc/ecip0619/2006026798.html
Format:
Books
Publication Date
2007
Excerpt:
Ch. 1. Is there a security problem in computing? -- Ch. 2. Elementary cryptography -- Ch. 3
by
McGraw, Gary, 1966-
Table of contents only http://www.loc.gov/catdir/toc/ecip062/2005031598.html
Format:
Books
Publication Date
2006
Excerpt:
1. Defining a discipline -- 2. A risk management framework -- 3. Introduction to software security
by
Ben-Natan, Ron.
Format:
Books
Publication Date
2005
Excerpt:
1. Getting started -- 2. Database security within the general security landscape and a defense
by
Stallings, William.
Format:
Books
Publication Date
2003
Excerpt:
2
by
Pfleeger, Charles P., 1948-
Format:
Books
Publication Date
2003
Excerpt:
Ch. 1. Is There a Security Problem in Computing? -- Ch. 2. Elementary Cryptography -- Ch. 3
by
Schiffman, Mike.
Table of contents http://www.loc.gov/catdir/toc/wiley031/2002011320.html
Publisher description http://www.loc.gov/catdir/description/wiley036/2002011320.html
Contributor biographical information http://www.loc.gov/catdir/bios/wiley043/2002011320.html
Publisher description http://www.loc.gov/catdir/description/wiley036/2002011320.html
Contributor biographical information http://www.loc.gov/catdir/bios/wiley043/2002011320.html
Format:
Regular print
Publication Date
2003
Excerpt:
2
by
O'Neill, Mark.
Format:
Books
Publication Date
2003
Excerpt:
2
by
Poole, Owen.
Format:
Books
Publication Date
2003
Excerpt:
2
by
Brenton, Chris.
Format:
Electronic Resources
Publication Date
2001
Excerpt:
http://www.contentreserve.com/TitleInfo.asp?ID={C0E06398-F64D-4C14-BAA2-D2ADC889DA37}&Format=50
by
Pfleeger, Charles P., 1948-
Format:
Books
Publication Date
1997
Excerpt:
1. Is There a Security Problem in Computing? -- 2. Basic Encryption and Decryption -- 3. Secure
by
Carroll, John Millar.
Format:
Books
Publication Date
1996
Excerpt:
Ch. 1. Essentials of Computer Security -- Ch. 2. Computer Crime and the Law -- Ch. 3. Organizing
by
Garfinkel, Simson.
Table of contents http://www.gbv.de/dms/bowker/toc/9781565921481.pdf
Contributor biographical information http://catdir.loc.gov/catdir/enhancements/fy0915/96161185-b.html
Publisher description http://catdir.loc.gov/catdir/enhancements/fy0915/96161185-d.html
Umschlagbild http://swbplus.bsz-bw.de/bsz048310409cov.htm
Contributor biographical information http://catdir.loc.gov/catdir/enhancements/fy0915/96161185-b.html
Publisher description http://catdir.loc.gov/catdir/enhancements/fy0915/96161185-d.html
Umschlagbild http://swbplus.bsz-bw.de/bsz048310409cov.htm
Format:
Books
Publication Date
1996
Excerpt:
I. Computer security basics -- 1. Introduction -- 2. Policies and guidelines -- II. User
Limit Search Results
Narrowed by: