633 Results Found Subscribe to search results
000000000000IIE
Print
1. 
Cover image for Terror on the Internet : the new arena, the new challenges
by 
Weimann, Gabriel, 1950-
Format: 
Books
Publication Date 
2006
Excerpt: 
Hate groups -- Computer network resources.
Available: Copies:
2. 
Cover image for Penetration testing and network defense
by 
Whitaker, Andrew.
Format: 
Books
Publication Date 
2006
Excerpt: 
Computer networks -- Security measures.
Available: Copies:
by 
Tutsch, Dietmar.
Format: 
Books
Publication Date 
2006
Excerpt: 
Computer networks -- Evaluation.
Available: Copies:
4. 
Cover image for Network control and engineering for QoS, security and mobility, V : IFIP 19th World Computer Congress, TC-6, 5th IFIP International Conference on Network Control and Engineering for QoS, Security and Mobility, August 20-25, 2006, Santiago, Chile
by 
IFIP TC6/WG6.2, 6.6, 6.7, and 6.8 International Conference on Network Control and Engineering for QoS, Security, and Mobility (5th : 2006 : Santiago, Chile)
Format: 
Books
Publication Date 
2006
Excerpt: 
Network control and engineering for QoS, security and mobility, V : IFIP 19th World Computer
Available: Copies:
5. 
Cover image for SMS 2003 recipes : a problem-solution approach
by 
Ramsey, Greg.
Format: 
Books
Publication Date 
2006
Excerpt: 
Computer networks -- Management.
Available: Copies:
7. 
Cover image for Digital history : a guide to gathering, preserving, and presenting the past on the Web
by 
Cohen, Daniel J (Daniel Jared), 1968-
Format: 
Books
Publication Date 
2006
Excerpt: 
History -- Computer network resources.
Available: Copies:
by 
Sarkar, Nurul.
Format: 
Books
Publication Date 
2006
Excerpt: 
Computer networks -- Study and teaching.
Available: Copies:
by 
Da Ros, Silvano.
Format: 
Books
Publication Date 
2006
Excerpt: 
Computer networks.
Available: Copies:
12. 
Cover image for Secure your network for free : using Nmap, Wireshark, Snort, Nessus, and MRGT
by 
Seagren, Eric.
Format: 
Electronic Resources
Publication Date 
2006
Excerpt: 
Computer networks -- Security measures -- Software.
Available: Copies:
Limit Search Results
Access Level
Author
Format
Language
Subject
Item Available