32 Results Found Subscribe to search results
00000000000000000000000000000000IIE
Print
1. 
Cover image for Professional ASP.NET 2.0 security, membership, and role management
by 
Schackow, Stefan, 1970-
Format: 
Books
Publication Date 
2006
Excerpt: 
Professional ASP.NET 2.0 security, membership, and role management / Schackow, Stefan, 1970-
Available: Copies:
2. 
Cover image for Principles of information security
by 
Whitman, Michael E., 1964- author.
Format: 
Books
Publication Date 
2018
Excerpt: 
2
Available: Copies:
3. 
Cover image for Cyber Security : A practitioner's guide
by 
Sutton, David (Information security practitioner), author.
Format: 
Books
Publication Date 
2017
Excerpt: 
2
Available: Copies:
4. 
Cover image for Principles of information security
by 
Whitman, Michael E., 1964- author.
Format: 
Books
Publication Date 
2016
Excerpt: 
2
Available: Copies:
5. 
Cover image for Hardware security : design, threats, and safeguards
by 
Mukhopadhyay, Debdeep.
Format: 
Books
Publication Date 
2015
Excerpt: 
1. Background -- 2. Hardware design of cryptographic algorithms -- 3. Side channel analysis -- 4
Available: Copies:
6. 
Cover image for Security in computing
by 
Pfleeger, Charles P., 1948- author.
Format: 
Regular print
Publication Date 
2015
Excerpt: 
2
Available: Copies:
7. 
Cover image for Network security essentials : applications and standards
by 
Stallings, William, author.
Format: 
Books
Publication Date 
2014
Excerpt: 
2
Available: Copies:
8. 
Cover image for Introduction to Computer Security: Pearson New International Edition
by 
Goodrich, M. T. (Michael T.)
Format: 
Books
Publication Date 
2014
Excerpt: 
2
Available: Copies:
9. 
Cover image for Computer security literacy : staying safe in a digital world
by 
Jacobson, Douglas.
Format: 
Books
Publication Date 
2013
Excerpt: 
.Introduction -- 2.2.Computers -- 2.2.1.Hardware -- 2.2.2.Operating Systems -- 2.2.3.Applications -- 2.2.4.Users
Available: Copies:
10. 
Cover image for Principles of information security
by 
Whitman, Michael E., 1964-
Format: 
Books
Publication Date 
2012
Excerpt: 
2
Available: Copies:
11. 
Cover image for A multidisciplinary introduction to information security
by 
Mjølsnes, Stig F.
Format: 
Books
Publication Date 
2012
Excerpt: 
.G. Kjeldsberg / E.J. Aas -- 2.2.1.RSA as Hardwired Electronics / P.G. Kjeldsberg / E.J. Aas -- 2.2.2.AES as
Available: Copies:
12. 
Cover image for Hacking web apps : detecting and preventing web application security problems
by 
Shema, Mike, author.
Format: 
Books
Publication Date 
2012
Excerpt: 
2
Available: Copies:
13. 
Cover image for Network security essentials : applications and standards
by 
Stallings, William.
Format: 
Books
Publication Date 
2011
Excerpt: 
2
Available: Copies:
14. 
Cover image for Seven deadliest social network attacks
by 
Timm, Carl.
Format: 
Books
Publication Date 
2010
Excerpt: 
Web 2.0 -- Security measures.
Available: Copies:
15. 
Cover image for Principles of information security
by 
Whitman, Michael E., 1964-
Format: 
Books
Publication Date 
2009
Excerpt: 
1. Introduction to information security -- 2. The need for security -- 3. Legal, ethical, and
Available: Copies:
16. 
Cover image for Management of information security
by 
Whitman, Michael E., 1964-
Format: 
Books
Publication Date 
2008
Excerpt: 
ch. 1. Introduction to the management of information security -- ch. 2. Planning for security -- ch
Available: Copies:
17. 
Cover image for IT governance : a manager's guide to data security and ISO 27001/ISO 27002
by 
Calder, Alan, 1957-
Format: 
Books
Publication Date 
2008
Excerpt: 
1. Why is information security necessary? -- 2. The Combined Code, the Turnbull Report and Sarbanes
Available: Copies:
18. 
Cover image for Microsoft® Windows server 2008 security resource kit
by 
Johansson, Jesper M.
Format: 
Books
Publication Date 
2008
Excerpt: 
2
Available: Copies:
19. 
Cover image for Network security hacks
by 
Lockhart, Andrew.
Format: 
Books
Publication Date 
2007
Excerpt: 
2
Available: Copies:
20. 
Cover image for Security in computing
by 
Pfleeger, Charles P., 1948-
Format: 
Books
Publication Date 
2007
Excerpt: 
Ch. 1. Is there a security problem in computing? -- Ch. 2. Elementary cryptography -- Ch. 3
Available: Copies:
21. 
Cover image for Software security : building security in
by 
McGraw, Gary, 1966-
Format: 
Books
Publication Date 
2006
Excerpt: 
1. Defining a discipline -- 2. A risk management framework -- 3. Introduction to software security
Available: Copies:
22. 
Cover image for Implementing database security and auditing
by 
Ben-Natan, Ron.
Format: 
Books
Publication Date 
2005
Excerpt: 
1. Getting started -- 2. Database security within the general security landscape and a defense
Available: Copies:
23. 
Cover image for Digital fortress
by 
Brown, Dan, 1964-
Format: 
Books
Publication Date 
2004
Excerpt: 
2
Available: Copies:
24. 
Cover image for Network security essentials : applications and standards
by 
Stallings, William.
Format: 
Books
Publication Date 
2003
Excerpt: 
2
Available: Copies:
25. 
Cover image for Security in computing
by 
Pfleeger, Charles P., 1948-
Format: 
Books
Publication Date 
2003
Excerpt: 
Ch. 1. Is There a Security Problem in Computing? -- Ch. 2. Elementary Cryptography -- Ch. 3
Available: Copies:
26. 
Cover image for Building open source network security tools : components and techniques
by 
Schiffman, Mike.
Format: 
Regular print
Publication Date 
2003
Excerpt: 
2
Available: Copies:
27. 
Cover image for Web services security
by 
O'Neill, Mark.
Format: 
Books
Publication Date 
2003
Excerpt: 
2
Available: Copies:
28. 
Cover image for Network security : a practical guide
by 
Poole, Owen.
Format: 
Books
Publication Date 
2003
Excerpt: 
2
Available: Copies:
29. 
Cover image for Active defense : a comprehensive guide to network security
by 
Brenton, Chris.
Format: 
Electronic Resources
Publication Date 
2001
Excerpt: 
http://www.contentreserve.com/TitleInfo.asp?ID={C0E06398-F64D-4C14-BAA2-D2ADC889DA37}&Format=50
Available: Copies:
30. 
Cover image for Security in computing
by 
Pfleeger, Charles P., 1948-
Format: 
Books
Publication Date 
1997
Excerpt: 
1. Is There a Security Problem in Computing? -- 2. Basic Encryption and Decryption -- 3. Secure
Available: Copies:
31. 
Cover image for Computer security
by 
Carroll, John Millar.
Format: 
Books
Publication Date 
1996
Excerpt: 
Ch. 1. Essentials of Computer Security -- Ch. 2. Computer Crime and the Law -- Ch. 3. Organizing
Available: Copies:
32. 
Cover image for Practical UNIX and Internet security
by 
Garfinkel, Simson.
Format: 
Books
Publication Date 
1996
Excerpt: 
I. Computer security basics -- 1. Introduction -- 2. Policies and guidelines -- II. User
Available: Copies:
Limit Search Results
Access Level
Format
Language
Subject
Item Available