234 Results Found Subscribe to search results
000000000000IIE
Print
73. 
Cover image for Managing risk in information systems
by 
Gibson, Darril.
Format: 
Books
Publication Date 
2011
Excerpt: 
Computer security.
Available:
Copies:
75. 
Cover image for Ethics for the information age
by 
Quinn, Michael J. (Michael Jay)
Format: 
Books
Publication Date 
2011
Excerpt: 
Computers and civilization.
Available:
Copies:
76. 
Cover image for Cybercrime : investigating high-technology computer crime
by 
Moore, Robert, 1976-
Format: 
Books
Publication Date 
2011
Excerpt: 
Computer security -- Law and legislation -- United States.
Available:
Copies:
77. 
Cover image for iPhone and iOS forensics : investigation, analysis, and mobile security for Apple iPhone, iPad, and iOS devices
by 
Hoog, Andrew.
Format: 
Books
Publication Date 
2011
Excerpt: 
iPhone and iOS forensics : investigation, analysis, and mobile security for Apple iPhone, iPad, and
Available:
Copies:
78. 
Cover image for Android forensics : investigation, analysis, and mobile security for Google Android
by 
Hoog, Andrew.
Format: 
Books
Publication Date 
2011
Excerpt: 
Android forensics : investigation, analysis, and mobile security for Google Android / Hoog, Andrew.
Available:
Copies:
79. 
Cover image for Network security essentials : applications and standards
by 
Stallings, William.
Format: 
Books
Publication Date 
2011
Excerpt: 
Computer networks -- Security measures.
Available:
Copies:
80. 
Cover image for Discovering computers 2010 : living in a digital world : complete
by 
Shelly, Gary B.
Format: 
Books
Publication Date 
2010
Excerpt: 
Discovering computers 2010 : living in a digital world : complete / Shelly, Gary B.
Available:
Copies:
by 
Davis, Chris.
Format: 
Books
Publication Date 
2010
Excerpt: 
Computer security.
Available:
Copies:
82. 
Cover image for Seven deadliest social network attacks
by 
Timm, Carl.
Format: 
Books
Publication Date 
2010
Excerpt: 
Computer networks -- Security measures.
Available:
Copies:
83. 
Cover image for Seven deadliest web application attacks
by 
Shema, Mike.
Format: 
Books
Publication Date 
2010
Excerpt: 
Computer networks -- Security measures.
Available:
Copies:
84. 
Cover image for IT audit, control, and security
by 
Moeller, Robert R.
Format: 
Books
Publication Date 
2010
Excerpt: 
Computer networks -- Security measures.
Available:
Copies:
Limit Search Results
Access Level
Author
Format
Language
Subject
Item Available