234 Results Found Subscribe to search results
000000000000IIE
Print
1. 
Cover image for Quality of protection : security measurements and metrics
by 
Gollmann, Dieter.
Format: 
Books
Publication Date 
2006
Excerpt: 
Computer security -- Quality control -- Congresses.
Available:
Copies:
2. 
Cover image for Ethics for the information age
by 
Quinn, Michael J. (Michael Jay)
Format: 
Books
Publication Date 
2006
Excerpt: 
-- Computer and network security -- Computer reliability -- Work and wealth -- Professional ethics -- Appendix
Available:
Copies:
3. 
Cover image for Secure your network for free : using Nmap, Wireshark, Snort, Nessus, and MRGT
by 
Seagren, Eric.
Format: 
Electronic Resources
Publication Date 
2006
Excerpt: 
Computer networks -- Security measures -- Software.
Available:
Copies:
4. 
Cover image for The unofficial guide to ethical hacking
by 
Fadia, Ankit, 1985-
Format: 
Books
Publication Date 
2006
Excerpt: 
Computer security.
Available:
Copies:
5. 
Cover image for Small business management : an entrepreneur's guidebook
by 
Megginson, Leon C.
Format: 
Books
Publication Date 
2006
Excerpt: 
Budgeting and Controlling Operations and Taxes --- Chapter 15 Using Computer Technology in Small Businesses
Available:
Copies:
6. 
Cover image for Software security : building security in
by 
McGraw, Gary, 1966-
Format: 
Books
Publication Date 
2006
Excerpt: 
Software security : building security in / McGraw, Gary, 1966-
Available:
Copies:
7. 
Cover image for The Tao of network security monitoring : beyond intrusion detection
by 
Bejtlich, Richard.
Format: 
Books
Publication Date 
2005
Excerpt: 
Computer networks -- Security measures.
Available:
Copies:
8. 
Cover image for MCSE guide to designing security for a microsoft Windows server 2003 network
by 
Khnaser, Elias N.
Format: 
Electronic Resources
Publication Date 
2005
Excerpt: 
MCSE guide to designing security for a microsoft Windows server 2003 network / Khnaser, Elias N.
Available:
Copies:
9. 
Cover image for Firewalls : jumpstart for network and systems administrators
by 
Vacca, John R.
Format: 
Books
Publication Date 
2005
Excerpt: 
Firewalls (Computer security)
Available:
Copies:
10. 
Cover image for The executive guide to information security : threats, challenges, and solutions
by 
Egan, Mark.
Format: 
Books
Publication Date 
2005
Excerpt: 
Computer security.
Available:
Copies:
11. 
Cover image for Implementing database security and auditing
by 
Ben-Natan, Ron.
Format: 
Books
Publication Date 
2005
Excerpt: 
Computer security.
Available:
Copies:
12. 
Cover image for Defending the digital frontier : practical security for management
by 
Babiak, Jan.
Format: 
Books
Publication Date 
2005
Excerpt: 
Computer networks -- Security measures.
Available:
Copies:
Limit Search Results
Access Level
Author
Format
Language
Subject
Item Available