234 Results
000000000000IIE
Cover image for Cyber security : economic strategies and public policy alternatives
by 
Gallaher, Michael P.
Format: 
Books
Publication Date 
2008
Excerpt: 
Business enterprises -- Computer networks -- Security measures.
Available: Copies:
Cover image for IT governance : a manager's guide to data security and ISO 27001/ISO 27002
by 
Calder, Alan, 1957-
Format: 
Books
Publication Date 
2008
Excerpt: 
Business enterprises -- Computer networks -- Security measures.
Available: Copies:
Cover image for FPGA-based implementation of signal processing systems
by 
Wood, Roger.
Format: 
Books
Publication Date 
2008
Excerpt: 
-visual and security applications. Senior level electrical and computer engineering graduates taking courses
Available: Copies:
Cover image for Discovering computers : fundamentals
by 
Shelly, Gary B.
Format: 
Books
Publication Date 
2008
Excerpt: 
Discovering computers : fundamentals / Shelly, Gary B.
Available: Copies:
Cover image for Discovering computers 2008 : introductory
by 
Shelly, Gary B.
Format: 
Books
Publication Date 
2008
Excerpt: 
Discovering computers 2008 : introductory / Shelly, Gary B.
Available: Copies:
Cover image for Malware forensics : investigating and analyzing malicious code
by 
Aquilina, James M.
Format: 
Books
Publication Date 
2008
Excerpt: 
Computer networks -- Security measures.
Available: Copies:
Cover image for Self-defending networks : the next generation of network security
by 
De Capite, Duane.
Format: 
Books
Publication Date 
2007 2006
Excerpt: 
Computer networks -- Security measures.
Available: Copies:
Cover image for Network security essentials : applications and standards
by 
Stallings, William.
Format: 
Books
Publication Date 
2007
Excerpt: 
Computer networks -- Security measures.
Available: Copies:
Cover image for Introduction to information systems : supporting and transforming business
by 
Rainer, R. Kelly, Jr., 1949-
Format: 
Books
Publication Date 
2007
Excerpt: 
technology? -- Ethics, privacy, and information security -- 3.1 Ethical issues -- 3.2 Threats to information
Available: Copies:
Cover image for SELinux by example : understanding security enhanced Linux
by 
Mayer, Frank, 1961-
Format: 
Books
Publication Date 
2007
Excerpt: 
Computer networks -- Security measures.
Available: Copies:
Cover image for Network security hacks
by 
Lockhart, Andrew.
Format: 
Books
Publication Date 
2007
Excerpt: 
Computer networks -- Security measures.
Available: Copies: