86 Results Found Subscribe to search results
00000000000000000000000000000000000000000000000000000000000000000000000000000000000000IIE
Print
1. 
Cover image for Computers, ethics & social values
by 
Johnson, Deborah G., 1945-
Format: 
Books
Publication Date 
1995
Excerpt: 
Computers, ethics & social values / Johnson, Deborah G., 1945-
Available: Copies:
2. 
Cover image for Enterprise fortress : the ultimate handbook for enterprise security architecture
by 
Stevens, Alex, author.
Format: 
Books
Publication Date 
2025
Excerpt: 
Computer architecture.
Available: Copies:
3. 
Cover image for Principles of information security
by 
Whitman, Michael E., 1964- author.
Format: 
Books
Publication Date 
2018
Excerpt: 
Computer networks -- Security measures.
Available: Copies:
4. 
Cover image for Computer security : principles and practice
by 
Stallings, William, author.
Format: 
Books
Publication Date 
2018
Excerpt: 
Computer security : principles and practice / Stallings, William, author.
Available: Copies:
5. 
Cover image for Network security essentials : applications and standards
by 
Stallings, William author.
Format: 
Books
Publication Date 
2017
Excerpt: 
Computer networks -- Security measures.
Available: Copies:
6. 
Cover image for Cyber Security : A practitioner's guide
by 
Sutton, David (Information security practitioner), author.
Format: 
Books
Publication Date 
2017
Excerpt: 
Computer networks -- Security measures.
Available: Copies:
7. 
Cover image for Principles of information security
by 
Whitman, Michael E., 1964- author.
Format: 
Books
Publication Date 
2016
Excerpt: 
Computer networks -- Security measures.
Available: Copies:
8. 
Cover image for Hardware security : design, threats, and safeguards
by 
Mukhopadhyay, Debdeep.
Format: 
Books
Publication Date 
2015
Excerpt: 
Computers -- Circuits -- Design and construction.
Available: Copies:
9. 
Cover image for Security in computing
by 
Pfleeger, Charles P., 1948- author.
Format: 
Regular print
Publication Date 
2015
Excerpt: 
Computer security.
Available: Copies:
10. 
Cover image for The basics of IT audit Purposes, processes, and practical information.
by 
Gantz, Stephen D.
Format: 
Electronic Resources
Publication Date 
2014
Excerpt: 
Computer networks -- Security measures.
Available: Copies:
11. 
Cover image for Network security essentials : applications and standards
by 
Stallings, William, author.
Format: 
Books
Publication Date 
2014
Excerpt: 
Computer networks -- Security measures.
Available: Copies:
12. 
Cover image for Introduction to Computer Security: Pearson New International Edition
by 
Goodrich, M. T. (Michael T.)
Format: 
Books
Publication Date 
2014
Excerpt: 
Introduction to Computer Security: Pearson New International Edition / Goodrich, M. T. (Michael T.)
Available: Copies:
14. 
Cover image for Computer security literacy : staying safe in a digital world
by 
Jacobson, Douglas.
Format: 
Books
Publication Date 
2013
Excerpt: 
Computer security literacy : staying safe in a digital world / Jacobson, Douglas.
Available: Copies:
15. 
Cover image for Network security : a beginner's guide
by 
Maiwald, Eric.
Format: 
Books
Publication Date 
2013
Excerpt: 
Computer networks -- Security measures.
Available: Copies:
16. 
Cover image for Hacking exposed : mobile security secrets & solutions
by 
Bergman, Neil.
Format: 
Books
Publication Date 
2013
Excerpt: 
Computer networks -- Security measures.
Available: Copies:
17. 
Cover image for Principles of information security
by 
Whitman, Michael E., 1964-
Format: 
Books
Publication Date 
2012
Excerpt: 
Computer networks -- Security measures.
Available: Copies:
18. 
Cover image for A multidisciplinary introduction to information security
by 
Mjølsnes, Stig F.
Format: 
Books
Publication Date 
2012
Excerpt: 
COMPUTERS / Computer Engineering.
Available: Copies:
19. 
Cover image for Hacking web apps : detecting and preventing web application security problems
by 
Shema, Mike, author.
Format: 
Books
Publication Date 
2012
Excerpt: 
Computer networks -- Security measures.
Available: Copies:
20. 
Cover image for Low tech hacking : street smarts for security professionals
by 
Wiles, Jack.
Format: 
Books
Publication Date 
2012
Excerpt: 
Computer security.
Available: Copies:
21. 
Cover image for Role mining in business : taming role-based access control administration
by 
Colantonio, Alessandro.
Format: 
Books
Publication Date 
2012
Excerpt: 
Di Pietro, Roberto (Computer scientist)
Available: Copies:
22. 
Cover image for Security 2020 : reduce security risks this decade
by 
Howard, Doug.
Format: 
Books
Publication Date 
2011
Excerpt: 
Computer security -- Forecasting.
Available: Copies:
23. 
Cover image for Gray hat hacking : the ethical hacker's handbook
by 
Harper, Allen.
Format: 
Books
Publication Date 
2011
Excerpt: 
Computer security.
Available: Copies:
24. 
Cover image for Managing risk in information systems
by 
Gibson, Darril.
Format: 
Books
Publication Date 
2011
Excerpt: 
Computer security.
Available: Copies:
25. 
Cover image for Network security essentials : applications and standards
by 
Stallings, William.
Format: 
Books
Publication Date 
2011
Excerpt: 
Computer networks -- Security measures.
Available: Copies:
26. 
Cover image for The essential guide to home computer security
by 
Rowlingson, Robert.
Format: 
Books
Publication Date 
2011
Excerpt: 
The essential guide to home computer security / Rowlingson, Robert.
Available: Copies:
27. 
Cover image for Hacking exposed computer forensics : secrets & solutions
by 
Davis, Chris.
Format: 
Books
Publication Date 
2010
Excerpt: 
Hacking exposed computer forensics : secrets & solutions / Davis, Chris.
Available: Copies:
28. 
Cover image for IT audit, control, and security
by 
Moeller, Robert R.
Format: 
Books
Publication Date 
2010
Excerpt: 
Computer networks -- Security measures.
Available: Copies:
29. 
Cover image for Seven deadliest social network attacks
by 
Timm, Carl.
Format: 
Books
Publication Date 
2010
Excerpt: 
Malware (Computer software) -- Prevention.
Available: Copies:
30. 
Cover image for Secure and resilient software development
by 
Merkow, Mark S.
Format: 
Books
Publication Date 
2010
Excerpt: 
Computer software -- Development.
Available: Copies:
31. 
Cover image for Mobile device security : a comprehensive guide to securing your information in a moving world
by 
Fried, Stephen, 1962-
Format: 
Books
Publication Date 
2010
Excerpt: 
Computer security.
Available: Copies:
32. 
Cover image for Digital rights management for e-commerce systems
by 
Drossos, Lambros, 1961-
Format: 
Books
Publication Date 
2009
Excerpt: 
Computer security.
Available: Copies:
33. 
Cover image for Principles of information security
by 
Whitman, Michael E., 1964-
Format: 
Books
Publication Date 
2009
Excerpt: 
Computer networks -- Security measures.
Available: Copies:
34. 
Cover image for Management of information security
by 
Whitman, Michael E., 1964-
Format: 
Books
Publication Date 
2008
Excerpt: 
Computer networks -- Security measures.
Available: Copies:
35. 
Cover image for IT governance : a manager's guide to data security and ISO 27001/ISO 27002
by 
Calder, Alan, 1957-
Format: 
Books
Publication Date 
2008
Excerpt: 
Business enterprises -- Computer networks -- Security measures.
Available: Copies:
36. 
Cover image for Security and software for cybercafes
by 
Adomi, Esharenana E.
Format: 
Books
Publication Date 
2008
Excerpt: 
Computer security.
Available: Copies:
37. 
Cover image for Guide to computer forensics and investigations
by 
Nelson, Bill.
Format: 
Books
Publication Date 
2008
Excerpt: 
Guide to computer forensics and investigations / Nelson, Bill.
Available: Copies:
38. 
Cover image for Microsoft® Windows server 2008 security resource kit
by 
Johansson, Jesper M.
Format: 
Books
Publication Date 
2008
Excerpt: 
Computer networks -- Security measures.
Available: Copies:
39. 
Cover image for Network security hacks
by 
Lockhart, Andrew.
Format: 
Books
Publication Date 
2007
Excerpt: 
Computer networks -- Security measures.
Available: Copies:
40. 
Cover image for Security in computing
by 
Pfleeger, Charles P., 1948-
Format: 
Books
Publication Date 
2007
Excerpt: 
Computer security.
Available: Copies:
41. 
Cover image for Network security essentials : applications and standards
by 
Stallings, William.
Format: 
Books
Publication Date 
2007
Excerpt: 
Computer networks -- Security measures.
Available: Copies:
42. 
Cover image for Windows Vista security : securing Vista against malicious attacks
by 
Grimes, Roger A.
Format: 
Books
Publication Date 
2007
Excerpt: 
Microsoft Windows (Computer file)
Available: Copies:
43. 
Cover image for Risks, controls, and security : concepts and applications
by 
Raval, Vasant H. (Vasant Harishanker), 1940-
Format: 
Books
Publication Date 
2007
Excerpt: 
Computer networks -- Security measures.
Available: Copies:
44. 
Cover image for The unofficial guide to ethical hacking
by 
Fadia, Ankit, 1985-
Format: 
Books
Publication Date 
2006
Excerpt: 
Computer security.
Available: Copies:
45. 
Cover image for Privacy protection for e-services
by 
Yee, George.
Format: 
Books
Publication Date 
2006
Excerpt: 
Computer security.
Available: Copies:
46. 
Cover image for Professional ASP.NET 2.0 security, membership, and role management
by 
Schackow, Stefan, 1970-
Format: 
Books
Publication Date 
2006
Excerpt: 
Computer security.
Available: Copies:
47. 
Cover image for Computer security
by 
Gollmann, Dieter.
Format: 
Books
Publication Date 
2006
Excerpt: 
Computer security / Gollmann, Dieter.
Available: Copies:
48. 
Cover image for Cryptography and network security : principles and practice
by 
Stallings, William.
Format: 
Books
Publication Date 
2006
Excerpt: 
Computer networks -- Security measures.
Available: Copies:
49. 
Cover image for Look both ways : help protect your family on the Internet
by 
Criddle, Linda.
Format: 
Books
Publication Date 
2006
Excerpt: 
Computer crimes -- Prevention.
Available: Copies:
50. 
Cover image for Information technology security & risk management
by 
Slay, Jill.
Format: 
Books
Publication Date 
2006
Excerpt: 
Computer security.
Available: Copies:
51. 
Cover image for Software security : building security in
by 
McGraw, Gary, 1966-
Format: 
Books
Publication Date 
2006
Excerpt: 
Computer security.
Available: Copies:
52. 
Cover image for The executive guide to information security : threats, challenges, and solutions
by 
Egan, Mark.
Format: 
Books
Publication Date 
2005
Excerpt: 
Computer security.
Available: Copies:
53. 
Cover image for Implementing database security and auditing
by 
Ben-Natan, Ron.
Format: 
Books
Publication Date 
2005
Excerpt: 
Computer security.
Available: Copies:
54. 
Cover image for Computer forensics jumpstart
by 
Solomon, Michael (Michael G.), 1963-
Format: 
Books
Publication Date 
2005
Excerpt: 
Computer forensics jumpstart / Solomon, Michael (Michael G.), 1963-
Available: Copies:
55. 
Cover image for Information security illuminated
by 
Solomon, Michael (Michael G.), 1963-
Format: 
Books
Publication Date 
2005
Excerpt: 
Computer networks -- Security measures.
Available: Copies:
56. 
Cover image for Software forensics : collecting evidence from the scene of a digital crime
by 
Slade, Robert M.
Format: 
Books
Publication Date 
2004
Excerpt: 
Computer security.
Available: Copies:
57. 
Cover image for Security for mobility
by 
Mitchell, Chris, 1953-
Format: 
Books
Publication Date 
2004
Excerpt: 
Computer security.
Available: Copies:
58. 
Cover image for Digital fortress
by 
Brown, Dan, 1964-
Format: 
Books
Publication Date 
2004
Excerpt: 
Computer security -- Fiction.
Available: Copies:
59. 
Cover image for PC disaster and recovery
by 
Chase, Kate.
Format: 
Books
Publication Date 
2003
Excerpt: 
Data recovery (Computer science)
Available: Copies:
60. 
Cover image for Network security essentials : applications and standards
by 
Stallings, William.
Format: 
Books
Publication Date 
2003
Excerpt: 
Computer networks -- Security measures.
Available: Copies:
61. 
Cover image for Web services security
by 
O'Neill, Mark.
Format: 
Books
Publication Date 
2003
Excerpt: 
Computer security.
Available: Copies:
62. 
Cover image for Security in computing
by 
Pfleeger, Charles P., 1948-
Format: 
Books
Publication Date 
2003
Excerpt: 
Computer security.
Available: Copies:
63. 
Cover image for Internet security
by 
Holden, Greg.
Format: 
Books
Publication Date 
2003
Excerpt: 
Computer networks -- Security measures.
Available: Copies:
64. 
Cover image for Building open source network security tools : components and techniques
by 
Schiffman, Mike.
Format: 
Regular print
Publication Date 
2003
Excerpt: 
Computer networks -- Security measures.
Available: Copies:
65. 
Cover image for Practical UNIX and Internet security.
by 
Garfinkel, Simson.
Format: 
Books
Publication Date 
2003
Excerpt: 
Operating systems (Computers)
Available: Copies:
66. 
Cover image for Network security : a practical guide
by 
Poole, Owen.
Format: 
Books
Publication Date 
2003
Excerpt: 
Computer weekly professional series.
Available: Copies:
67. 
Cover image for Writing secure code
by 
Howard, Michael, 1965-
Format: 
Books
Publication Date 
2003
Excerpt: 
Data encryption (Computer science).
Available: Copies:
68. 
Cover image for SQL server security
by 
Andrews, Chip.
Format: 
Regular print
Publication Date 
2003
Excerpt: 
Computer networks -- Security measures.
Available: Copies:
69. 
Cover image for Planning for PKI : best practices guide for deploying public key infrastructure
by 
Housley, Russ, 1959-
Format: 
Books
Publication Date 
2001
Excerpt: 
Business enterprises -- Computer networks -- Security measures.
Available: Copies:
70. 
Cover image for Maximum security
Format: 
Books
Publication Date 
2001
Excerpt: 
Computer networks -- Security measures.
Available: Copies:
71. 
Cover image for Auditing and security : AS/400, NT, UNIX, networks, and disaster recovery plans
by 
Musaji, Yusufali F.
Format: 
Books
Publication Date 
2001
Excerpt: 
Computer security.
Available: Copies:
72. 
Cover image for Cryptography and e-commerce : a Wiley tech brief
by 
Graff, Jon.
Format: 
Books
Publication Date 
2001
Excerpt: 
Computer security.
Available: Copies:
73. 
Cover image for Security transformation : digital defense strategies to protect your company's reputation and market share
by 
McCarthy, Mary Pat.
Format: 
Books
Publication Date 
2001
Excerpt: 
Business enterprises -- Computer networks -- Security measures.
Available: Copies:
74. 
Cover image for Information security policies, procedures, and standards : guidelines for effective information security management
by 
Peltier, Thomas R.
Format: 
Books
Publication Date 
2001
Excerpt: 
Computer security.
Available: Copies:
75. 
Cover image for Security engineering : a guide to building dependable distributed systems
by 
Anderson, Ross, 1956-
Format: 
Books
Publication Date 
2001
Excerpt: 
Computer security.
Available: Copies:
77. 
Cover image for Electronic government and electronic signatures
by 
Relyea, Harold.
Format: 
Books
Publication Date 
2000
Excerpt: 
Computer security.
Available: Copies:
78. 
Cover image for Secure electronic commerce : building the infrastructure for digital signatures and encryption
by 
Ford, Warwick.
Format: 
Books
Publication Date 
2000
Excerpt: 
Computer security.
Available: Copies:
79. 
Cover image for Secrets and lies : digital security in a networked world
by 
Schneier, Bruce, 1963-
Format: 
Books
Publication Date 
2000
Excerpt: 
Computer networks -- Security measures.
Available: Copies:
80. 
Cover image for Computer security
by 
Gollmann, Dieter.
Format: 
Books
Publication Date 
1999
Excerpt: 
Computer security / Gollmann, Dieter.
Available: Copies:
81. 
Cover image for Net spies : who's watching you on the Web?
by 
Gauntlett, Andrew.
Format: 
Books
Publication Date 
1999
Excerpt: 
Computer security.
Available: Copies:
82. 
Cover image for Security technologies for the World Wide Web
by 
Oppliger, Rolf.
Format: 
Books
Publication Date 
1999
Excerpt: 
Artech House computer library
Available: Copies:
83. 
Cover image for Security in computing
by 
Pfleeger, Charles P., 1948-
Format: 
Books
Publication Date 
1997
Excerpt: 
Computer security.
Available: Copies:
84. 
Cover image for Computer security
by 
Carroll, John Millar.
Format: 
Books
Publication Date 
1996
Excerpt: 
Computer security / Carroll, John Millar.
Available: Copies:
85. 
Cover image for Practical UNIX and Internet security
by 
Garfinkel, Simson.
Format: 
Books
Publication Date 
1996
Excerpt: 
Computer security (Sebastopol, Calif.)
Available: Copies:
86. 
Cover image for Practical UNIX security : computer security
by 
Garfinkel, Simson.
Format: 
Books
Publication Date 
1991
Excerpt: 
Practical UNIX security : computer security / Garfinkel, Simson.
Available: Copies:
Limit Search Results
Access Level
Author
Format
Language
Subject
Item Available