by
Slay, Jill.
Format:
Books
Publication Date
2006
Excerpt:
Information technology security & risk management / Slay, Jill.
by
Stallings, William, author.
Format:
Books
Publication Date
2018
Excerpt:
Part One: Computer Security Technology and Principles -- Part Two: Software and System Security
by
Gantz, Stephen D.
Format:
Electronic Resources
Publication Date
2014
Excerpt:
Information technology -- Auditing.
by
Maiwald, Eric.
Format:
Books
Publication Date
2013
Excerpt:
technology ; Monitoring technology ; Encryption technology ; Glossary ; Index.
by
Jacobson, Douglas.
Format:
Books
Publication Date
2013
Excerpt:
providing practical and relevant education for the normal user of information technology? As it turns out
by
Bergman, Neil.
Format:
Books
Publication Date
2013
Excerpt:
, and remediating common technology and architecture weaknesses and maintaining tight security controls
by
Mjølsnes, Stig F.
Format:
Books
Publication Date
2012
Excerpt:
TECHNOLOGY & ENGINEERING / Electrical.
by
Whitman, Michael E., 1964-
Format:
Books
Publication Date
2012
Excerpt:
Information technology -- Security measures.
by
Howard, Doug.
Format:
Books
Publication Date
2011
Excerpt:
What has history shown us? -- Externeal influences on security -- Technology influences on security
by
Moeller, Robert R.
Format:
Books
Publication Date
2010
Excerpt:
Information technology -- Auditing.
by
Whitman, Michael E., 1964-
Format:
Books
Publication Date
2009
Excerpt:
technology : firewalls and VPNs -- 7. Security technology : intrusion detection, access control, and other
by
Whitman, Michael E., 1964-
Format:
Books
Publication Date
2008
Excerpt:
Thomson Course Technology,
by
Adomi, Esharenana E.
Format:
Books
Publication Date
2008
Excerpt:
security measures and software necessary for cybercafes, offering information technology professionals
by
Nelson, Bill.
Format:
Books
Publication Date
2008
Excerpt:
Thomson Course Technology,
by
Yee, George.
Table of contents http://www.loc.gov/catdir/toc/ecip063/2005032104.html
Format:
Books
Publication Date
2006
Excerpt:
, Challenges, Models, and Dimensions -- Privacy Protection Through Security -- Pseudonym Technology for E
by
Fadia, Ankit, 1985-
Format:
Books
Publication Date
2006
Excerpt:
Thomson Course Technology,
by
Egan, Mark.
Format:
Books
Publication Date
2005
Excerpt:
Information technology -- Management.
by
Pfleeger, Charles P., 1948-
Format:
Books
Publication Date
1997
Excerpt:
-mail privacy, including PEM, PGP, key management, and certificates; key escrow - both as a technology and in
by
Carroll, John Millar.
Format:
Books
Publication Date
1996
Excerpt:
presents the best concepts that high technology, classical security practice, and common sense have to