19 Results Found Subscribe to search results
0000000000000000000IIE
Print
1. 
Cover image for Information technology security & risk management
by 
Slay, Jill.
Format: 
Books
Publication Date 
2006
Excerpt: 
Information technology security & risk management / Slay, Jill.
Available: Copies:
2. 
Cover image for Computer security : principles and practice
by 
Stallings, William, author.
Format: 
Books
Publication Date 
2018
Excerpt: 
Part One: Computer Security Technology and Principles -- Part Two: Software and System Security
Available: Copies:
3. 
Cover image for The basics of IT audit Purposes, processes, and practical information.
by 
Gantz, Stephen D.
Format: 
Electronic Resources
Publication Date 
2014
Excerpt: 
Information technology -- Auditing.
Available: Copies:
4. 
Cover image for Network security : a beginner's guide
by 
Maiwald, Eric.
Format: 
Books
Publication Date 
2013
Excerpt: 
technology ; Monitoring technology ; Encryption technology ; Glossary ; Index.
Available: Copies:
5. 
Cover image for Computer security literacy : staying safe in a digital world
by 
Jacobson, Douglas.
Format: 
Books
Publication Date 
2013
Excerpt: 
providing practical and relevant education for the normal user of information technology? As it turns out
Available: Copies:
6. 
Cover image for Hacking exposed : mobile security secrets & solutions
by 
Bergman, Neil.
Format: 
Books
Publication Date 
2013
Excerpt: 
, and remediating common technology and architecture weaknesses and maintaining tight security controls
Available: Copies:
7. 
Cover image for A multidisciplinary introduction to information security
by 
Mjølsnes, Stig F.
Format: 
Books
Publication Date 
2012
Excerpt: 
TECHNOLOGY & ENGINEERING / Electrical.
Available: Copies:
8. 
Cover image for Principles of information security
by 
Whitman, Michael E., 1964-
Format: 
Books
Publication Date 
2012
Excerpt: 
Information technology -- Security measures.
Available: Copies:
9. 
Cover image for Security 2020 : reduce security risks this decade
by 
Howard, Doug.
Format: 
Books
Publication Date 
2011
Excerpt: 
What has history shown us? -- Externeal influences on security -- Technology influences on security
Available: Copies:
10. 
Cover image for IT audit, control, and security
by 
Moeller, Robert R.
Format: 
Books
Publication Date 
2010
Excerpt: 
Information technology -- Auditing.
Available: Copies:
11. 
Cover image for Principles of information security
by 
Whitman, Michael E., 1964-
Format: 
Books
Publication Date 
2009
Excerpt: 
technology : firewalls and VPNs -- 7. Security technology : intrusion detection, access control, and other
Available: Copies:
12. 
Cover image for Management of information security
by 
Whitman, Michael E., 1964-
Format: 
Books
Publication Date 
2008
Excerpt: 
Thomson Course Technology,
Available: Copies:
13. 
Cover image for Security and software for cybercafes
by 
Adomi, Esharenana E.
Format: 
Books
Publication Date 
2008
Excerpt: 
security measures and software necessary for cybercafes, offering information technology professionals
Available: Copies:
14. 
Cover image for Guide to computer forensics and investigations
by 
Nelson, Bill.
Format: 
Books
Publication Date 
2008
Excerpt: 
Thomson Course Technology,
Available: Copies:
15. 
Cover image for Privacy protection for e-services
by 
Yee, George.
Format: 
Books
Publication Date 
2006
Excerpt: 
, Challenges, Models, and Dimensions -- Privacy Protection Through Security -- Pseudonym Technology for E
Available: Copies:
16. 
Cover image for The unofficial guide to ethical hacking
by 
Fadia, Ankit, 1985-
Format: 
Books
Publication Date 
2006
Excerpt: 
Thomson Course Technology,
Available: Copies:
17. 
Cover image for The executive guide to information security : threats, challenges, and solutions
by 
Egan, Mark.
Format: 
Books
Publication Date 
2005
Excerpt: 
Information technology -- Management.
Available: Copies:
18. 
Cover image for Security in computing
by 
Pfleeger, Charles P., 1948-
Format: 
Books
Publication Date 
1997
Excerpt: 
-mail privacy, including PEM, PGP, key management, and certificates; key escrow - both as a technology and in
Available: Copies:
19. 
Cover image for Computer security
by 
Carroll, John Millar.
Format: 
Books
Publication Date 
1996
Excerpt: 
presents the best concepts that high technology, classical security practice, and common sense have to
Available: Copies:
Limit Search Results
Access Level
Format
Language
Item Available