234 Results Found Subscribe to search results
000000000000IIE
Print
49. 
Cover image for Guide to computer forensics and investigations
by 
Nelson, Bill.
Format: 
Books
Publication Date 
2008
Excerpt: 
Computer security.
Available: Copies:
50. 
Cover image for IT governance : a manager's guide to data security and ISO 27001/ISO 27002
by 
Calder, Alan, 1957-
Format: 
Books
Publication Date 
2008
Excerpt: 
Business enterprises -- Computer networks -- Security measures.
Available: Copies:
51. 
Cover image for Windows server 2008 : networking and Network Access Protection (NAP)
by 
Davies, Joseph, 1962-
Format: 
Books
Publication Date 
2008
Excerpt: 
Computer networks -- Security measures.
Available: Copies:
52. 
Cover image for Encyclopedia of information ethics and security
by 
Quigley, Marian.
Format: 
Books
Publication Date 
2008 2007
Excerpt: 
Computer security -- Encyclopedias.
Available: Copies:
53. 
Cover image for Cyber security : economic strategies and public policy alternatives
by 
Gallaher, Michael P.
Format: 
Books
Publication Date 
2008
Excerpt: 
Business enterprises -- Computer networks -- Security measures.
Available: Copies:
54. 
Cover image for FPGA-based implementation of signal processing systems
by 
Wood, Roger.
Format: 
Books
Publication Date 
2008
Excerpt: 
-visual and security applications. Senior level electrical and computer engineering graduates taking courses
Available: Copies:
55. 
Cover image for Malware forensics : investigating and analyzing malicious code
by 
Aquilina, James M.
Format: 
Books
Publication Date 
2008
Excerpt: 
Computer networks -- Security measures.
Available: Copies:
56. 
Cover image for Discovering computers : fundamentals
by 
Shelly, Gary B.
Format: 
Books
Publication Date 
2007
Excerpt: 
Discovering computers : fundamentals / Shelly, Gary B.
Available: Copies:
57. 
Cover image for Introduction to information systems : supporting and transforming business
by 
Rainer, R. Kelly, Jr., 1949-
Format: 
Books
Publication Date 
2007
Excerpt: 
technology? -- Ethics, privacy, and information security -- 3.1 Ethical issues -- 3.2 Threats to information
Available: Copies:
58. 
Cover image for SELinux by example : understanding security enhanced Linux
by 
Mayer, Frank, 1961-
Format: 
Books
Publication Date 
2007
Excerpt: 
Computer networks -- Security measures.
Available: Copies:
59. 
Cover image for Network security hacks
by 
Lockhart, Andrew.
Format: 
Books
Publication Date 
2007
Excerpt: 
Computer networks -- Security measures.
Available: Copies:
60. 
Cover image for Self-defending networks : the next generation of network security
by 
De Capite, Duane.
Format: 
Books
Publication Date 
2007 2006
Excerpt: 
Computer networks -- Security measures.
Available: Copies:
Limit Search Results
Access Level
Author
Format
Language
Subject
Item Available