22 Results Found Subscribe to search results
0000000000000000000000IIE
Print
1. 
Cover image for Principles of information security
by 
Whitman, Michael E., 1964- author.
Format: 
Books
Publication Date 
2018
Excerpt: 
4
Available: Copies:
2. 
Cover image for Cyber Security : A practitioner's guide
by 
Sutton, David (Information security practitioner), author.
Format: 
Books
Publication Date 
2017
Excerpt: 
4
Available: Copies:
3. 
Cover image for Principles of information security
by 
Whitman, Michael E., 1964- author.
Format: 
Books
Publication Date 
2016
Excerpt: 
4
Available: Copies:
4. 
Cover image for Hardware security : design, threats, and safeguards
by 
Mukhopadhyay, Debdeep.
Format: 
Books
Publication Date 
2015
Excerpt: 
1. Background -- 2. Hardware design of cryptographic algorithms -- 3. Side channel analysis -- 4
Available: Copies:
5. 
Cover image for Security in computing
by 
Pfleeger, Charles P., 1948- author.
Format: 
Regular print
Publication Date 
2015
Excerpt: 
encrypt() function. One strength of SiC4 has been its sidebars. Readers enjoy the brief examples of real
Available: Copies:
6. 
Cover image for Computer security literacy : staying safe in a digital world
by 
Jacobson, Douglas.
Format: 
Books
Publication Date 
2013
Excerpt: 
-- 2.4.3.Internet Protocol Addresses -- 2.4.4.Public versus Private IP Addresses -- 2.4.5.Finding an IP
Available: Copies:
7. 
Cover image for A multidisciplinary introduction to information security
by 
Mjølsnes, Stig F.
Format: 
Books
Publication Date 
2012
Excerpt: 
.F. Mjølsnes -- 1.4.1.The Book Structure / S.F. Mjølsnes -- 1.4.2.Security Electronics / S.F. Mjølsnes -- 1.4.3
Available: Copies:
8. 
Cover image for Principles of information security
by 
Whitman, Michael E., 1964-
Format: 
Books
Publication Date 
2012
Excerpt: 
4
Available: Copies:
9. 
Cover image for Network security essentials : applications and standards
by 
Stallings, William.
Format: 
Books
Publication Date 
2011
Excerpt: 
4
Available: Copies:
10. 
Cover image for Principles of information security
by 
Whitman, Michael E., 1964-
Format: 
Books
Publication Date 
2009
Excerpt: 
professional issues in information security -- 4. Risk management -- 5. Planning for security -- 6. Security
Available: Copies:
11. 
Cover image for Management of information security
by 
Whitman, Michael E., 1964-
Format: 
Books
Publication Date 
2008
Excerpt: 
. 3. Planning for contingencies -- ch. 4. Information security policy -- ch. 5. Developing the
Available: Copies:
12. 
Cover image for IT governance : a manager's guide to data security and ISO 27001/ISO 27002
by 
Calder, Alan, 1957-
Format: 
Books
Publication Date 
2008
Excerpt: 
-Oxley -- 3. ISO27001 -- 4. Organizing information security -- 5. Information security policy and scope -- 6
Available: Copies:
13. 
Cover image for Security in computing
by 
Pfleeger, Charles P., 1948-
Format: 
Books
Publication Date 
2007
Excerpt: 
. Program security -- Ch. 4. Protection in general-purpose operating systems -- Ch. 5. Designing trusted
Available: Copies:
14. 
Cover image for Network security essentials : applications and standards
by 
Stallings, William.
Format: 
Books
Publication Date 
2007
Excerpt: 
4
Available: Copies:
15. 
Cover image for Software security : building security in
by 
McGraw, Gary, 1966-
Format: 
Books
Publication Date 
2006
Excerpt: 
touchpoints -- 4. Code review with a tool -- 5. Architectural risk analysis -- 6. Software penetration testing
Available: Copies:
by 
Ben-Natan, Ron.
Format: 
Books
Publication Date 
2005
Excerpt: 
-in-depth strategy -- 3. The database as a networked server -- 4. Authentication and password security -- 5
Available: Copies:
17. 
Cover image for Network security : a practical guide
by 
Poole, Owen.
Format: 
Books
Publication Date 
2003
Excerpt: 
4
Available: Copies:
18. 
Cover image for Security in computing
by 
Pfleeger, Charles P., 1948-
Format: 
Books
Publication Date 
2003
Excerpt: 
. Program Security -- Ch. 4. Protection in General-Purpose Operating Systems -- Ch. 5. Designing Trusted
Available: Copies:
19. 
Cover image for Active defense : a comprehensive guide to network security
by 
Brenton, Chris.
Format: 
Electronic Resources
Publication Date 
2001
Excerpt: 
http://www.contentreserve.com/TitleInfo.asp?ID={C0E06398-F64D-4C14-BAA2-D2ADC889DA37}&Format=50
Available: Copies:
20. 
Cover image for Security in computing
by 
Pfleeger, Charles P., 1948-
Format: 
Books
Publication Date 
1997
Excerpt: 
Encryption Systems -- 4. Using Encryption: Protocols and Practices -- 5. Program Security -- 6. Protection in
Available: Copies:
21. 
Cover image for Computer security
by 
Carroll, John Millar.
Format: 
Books
Publication Date 
1996
Excerpt: 
for EDP Security -- Ch. 4. Protection of Information -- Ch. 5. Screening and Management of Personnel
Available: Copies:
22. 
Cover image for Practical UNIX and Internet security
by 
Garfinkel, Simson.
Format: 
Books
Publication Date 
1996
Excerpt: 
responsibilities -- 3. Users and passwords -- 4. Users, groups, and the superuser -- 5. The UNIX filesystem -- 6
Available: Copies:
Limit Search Results
Access Level
Format
Language
Item Available