byÂ
Whitman, Michael E., 1964- author.
Format:Â
Books
Publication DateÂ
2018
Excerpt:Â
6
byÂ
Sutton, David (Information security practitioner), author.
Format:Â
Books
Publication DateÂ
2017
Excerpt:Â
6
byÂ
Whitman, Michael E., 1964- author.
Format:Â
Books
Publication DateÂ
2016
Excerpt:Â
6
byÂ
Mukhopadhyay, Debdeep.
Format:Â
Books
Publication DateÂ
2015
Excerpt:Â
. Hardware intellectual property protection -- 5. Hardware trojans -- 6. Physically unclonable functions.
byÂ
Jacobson, Douglas.
Format:Â
Books
Publication DateÂ
2013
Excerpt:Â
Sniffing -- 3.3.5.Attacker Guesses Password -- 3.3.6.Exposed Password File -- 3.3.7.Security Questions -- 3
byÂ
Mjølsnes, Stig F.
Format:Â
Books
Publication DateÂ
2012
Excerpt:Â
Contents note continued: 5.6.Technology / D.R. Hjelme / V. Makarov / L. Lydersen -- 5.6.1.Single
byÂ
Stallings, William.
Format:Â
Books
Publication DateÂ
2011
Excerpt:Â
6
byÂ
Whitman, Michael E., 1964-
Format:Â
Books
Publication DateÂ
2009
Excerpt:Â
professional issues in information security -- 4. Risk management -- 5. Planning for security -- 6. Security
byÂ
Johansson, Jesper M.
Format:Â
Books
Publication DateÂ
2008
Excerpt:Â
6
byÂ
Calder, Alan, 1957-
Format:Â
Books
Publication DateÂ
2008
Excerpt:Â
-Oxley -- 3. ISO27001 -- 4. Organizing information security -- 5. Information security policy and scope -- 6
byÂ
Whitman, Michael E., 1964-
Format:Â
Books
Publication DateÂ
2008
Excerpt:Â
security program -- ch. 6. Security management models and practices -- ch. 7. Risk management -- ch. 8
byÂ
Pfleeger, Charles P., 1948-
Table of contents only http://www.loc.gov/catdir/toc/ecip0619/2006026798.html
Format:Â
Books
Publication DateÂ
2007
Excerpt:Â
operating systems -- Ch. 6. Database and data mining security -- Ch. 7. Security in networks -- Ch. 8
byÂ
Stallings, William.
Table of contents only http://www.loc.gov/catdir/toc/fy0706/2006287096.html
Format:Â
Books
Publication DateÂ
2007
Excerpt:Â
6
byÂ
McGraw, Gary, 1966-
Table of contents only http://www.loc.gov/catdir/toc/ecip062/2005031598.html
Format:Â
Books
Publication DateÂ
2006
Excerpt:Â
touchpoints -- 4. Code review with a tool -- 5. Architectural risk analysis -- 6. Software penetration testing
byÂ
Ben-Natan, Ron.
Format:Â
Books
Publication DateÂ
2005
Excerpt:Â
. Application security -- 6. Using granular access control -- 7. Using the database to do too much -- 8
byÂ
Pfleeger, Charles P., 1948-
Format:Â
Books
Publication DateÂ
2003
Excerpt:Â
Operating Systems -- Ch. 6. Database Security -- Ch. 7. Security in Networks -- Ch. 8. Administering
byÂ
Poole, Owen.
Format:Â
Books
Publication DateÂ
2003
Excerpt:Â
6
byÂ
Pfleeger, Charles P., 1948-
Format:Â
Books
Publication DateÂ
1997
Excerpt:Â
Encryption Systems -- 4. Using Encryption: Protocols and Practices -- 5. Program Security -- 6. Protection in
byÂ
Garfinkel, Simson.
Table of contents http://www.gbv.de/dms/bowker/toc/9781565921481.pdf
Contributor biographical information http://catdir.loc.gov/catdir/enhancements/fy0915/96161185-b.html
Publisher description http://catdir.loc.gov/catdir/enhancements/fy0915/96161185-d.html
Umschlagbild http://swbplus.bsz-bw.de/bsz048310409cov.htm
Contributor biographical information http://catdir.loc.gov/catdir/enhancements/fy0915/96161185-b.html
Publisher description http://catdir.loc.gov/catdir/enhancements/fy0915/96161185-d.html
Umschlagbild http://swbplus.bsz-bw.de/bsz048310409cov.htm
Format:Â
Books
Publication DateÂ
1996
Excerpt:Â
responsibilities -- 3. Users and passwords -- 4. Users, groups, and the superuser -- 5. The UNIX filesystem -- 6
20.Â
byÂ
Carroll, John Millar.
Format:Â
Books
Publication DateÂ
1996
Excerpt:Â
-- Ch. 6. Physical Access Control -- Ch. 7. Physical Security -- Ch. 8. Environmental Security -- Ch. 9