20 Results Found Subscribe to search results
00000000000000000000IIE
Print
2. 
Cover image for Cyber Security : A practitioner's guide
by 
Sutton, David (Information security practitioner), author.
Format: 
Books
Publication Date 
2017
Excerpt: 
6
Available: Copies:
by 
Whitman, Michael E., 1964- author.
Format: 
Books
Publication Date 
2016
Excerpt: 
6
Available: Copies:
by 
Mukhopadhyay, Debdeep.
Format: 
Books
Publication Date 
2015
Excerpt: 
. Hardware intellectual property protection -- 5. Hardware trojans -- 6. Physically unclonable functions.
Available: Copies:
5. 
Cover image for Computer security literacy : staying safe in a digital world
by 
Jacobson, Douglas.
Format: 
Books
Publication Date 
2013
Excerpt: 
Sniffing -- 3.3.5.Attacker Guesses Password -- 3.3.6.Exposed Password File -- 3.3.7.Security Questions -- 3
Available: Copies:
6. 
Cover image for A multidisciplinary introduction to information security
by 
Mjølsnes, Stig F.
Format: 
Books
Publication Date 
2012
Excerpt: 
Contents note continued: 5.6.Technology / D.R. Hjelme / V. Makarov / L. Lydersen -- 5.6.1.Single
Available: Copies:
by 
Stallings, William.
Format: 
Books
Publication Date 
2011
Excerpt: 
6
Available: Copies:
by 
Whitman, Michael E., 1964-
Format: 
Books
Publication Date 
2009
Excerpt: 
professional issues in information security -- 4. Risk management -- 5. Planning for security -- 6. Security
Available: Copies:
9. 
Cover image for Microsoft® Windows server 2008 security resource kit
by 
Johansson, Jesper M.
Format: 
Books
Publication Date 
2008
Excerpt: 
6
Available: Copies:
by 
Calder, Alan, 1957-
Format: 
Books
Publication Date 
2008
Excerpt: 
-Oxley -- 3. ISO27001 -- 4. Organizing information security -- 5. Information security policy and scope -- 6
Available: Copies:
by 
Whitman, Michael E., 1964-
Format: 
Books
Publication Date 
2008
Excerpt: 
security program -- ch. 6. Security management models and practices -- ch. 7. Risk management -- ch. 8
Available: Copies:
by 
Pfleeger, Charles P., 1948-
Format: 
Books
Publication Date 
2007
Excerpt: 
operating systems -- Ch. 6. Database and data mining security -- Ch. 7. Security in networks -- Ch. 8
Available: Copies:
by 
Stallings, William.
Format: 
Books
Publication Date 
2007
Excerpt: 
6
Available: Copies:
by 
McGraw, Gary, 1966-
Format: 
Books
Publication Date 
2006
Excerpt: 
touchpoints -- 4. Code review with a tool -- 5. Architectural risk analysis -- 6. Software penetration testing
Available: Copies:
by 
Ben-Natan, Ron.
Format: 
Books
Publication Date 
2005
Excerpt: 
. Application security -- 6. Using granular access control -- 7. Using the database to do too much -- 8
Available: Copies:
by 
Pfleeger, Charles P., 1948-
Format: 
Books
Publication Date 
2003
Excerpt: 
Operating Systems -- Ch. 6. Database Security -- Ch. 7. Security in Networks -- Ch. 8. Administering
Available: Copies:
by 
Poole, Owen.
Format: 
Books
Publication Date 
2003
Excerpt: 
6
Available: Copies:
by 
Pfleeger, Charles P., 1948-
Format: 
Books
Publication Date 
1997
Excerpt: 
Encryption Systems -- 4. Using Encryption: Protocols and Practices -- 5. Program Security -- 6. Protection in
Available: Copies:
by 
Garfinkel, Simson.
Format: 
Books
Publication Date 
1996
Excerpt: 
responsibilities -- 3. Users and passwords -- 4. Users, groups, and the superuser -- 5. The UNIX filesystem -- 6
Available: Copies:
by 
Carroll, John Millar.
Format: 
Books
Publication Date 
1996
Excerpt: 
-- Ch. 6. Physical Access Control -- Ch. 7. Physical Security -- Ch. 8. Environmental Security -- Ch. 9
Available: Copies:
Limit Search Results
Access Level
Format
Language
Item Available