234 Results
000000000000IIE
Cover image for Role mining in business : taming role-based access control administration
by 
Colantonio, Alessandro.
Format: 
Books
Publication Date 
2012
Excerpt: 
Computer security.
Available: Copies:
Cover image for Cybersecurity : the essential body of knowledge
by 
Shoemaker, Dan.
Format: 
Books
Publication Date 
2012
Excerpt: 
Computer security -- Textbooks.
Available: Copies:
Cover image for MacBook all-in-one for dummies
by 
Chambers, Mark L.
Format: 
Books
Publication Date 
2012
Excerpt: 
MacBook (Computer)
Available: Copies:
Cover image for Security+ guide to network security fundamentals
by 
Ciampa, Mark D.
Format: 
Books
Publication Date 
2012
Excerpt: 
Computer networks -- Security measures -- Examinations -- Study guides.
Available: Copies:
Cover image for Security fundamentals : exam 98-367
by 
Gambrel, Bryan.
Format: 
Books
Publication Date 
2012
Excerpt: 
Computer security -- Examinations -- Study guides.
Available: Copies:
Cover image for Security risk management : building an information security risk management program from the ground up
by 
Wheeler, Evan.
Format: 
Books
Publication Date 
2011
Excerpt: 
Security risk management : building an information security risk management program from the ground
Available: Copies:
Cover image for Frameworks for ICT policy : government, social and legal issues
by 
Adomi, Esharenana E.
Format: 
Books
Publication Date 
2011
Excerpt: 
Information technology -- Security measures -- Cross-cultural studies.
Available: Copies:
Cover image for Ethics for the information age
by 
Quinn, Michael J. (Michael Jay)
Format: 
Books
Publication Date 
2011
Excerpt: 
Computers and civilization.
Available: Copies:
Cover image for Gray hat hacking : the ethical hacker's handbook
by 
Harper, Allen.
Format: 
Books
Publication Date 
2011
Excerpt: 
Computer security.
Available: Copies:
Cover image for Network security essentials : applications and standards
by 
Stallings, William.
Format: 
Books
Publication Date 
2011
Excerpt: 
Computer networks -- Security measures.
Available: Copies:
Cover image for Cybercrime and espionage : an analysis of subversive multivector threats
by 
Gragido, Will.
Format: 
Books
Publication Date 
2011
Excerpt: 
Computer crimes -- Prevention.
Available: Copies:
Cover image for Computer networks.
by 
Tanenbaum, Andrew S., 1944-
Format: 
Books
Publication Date 
2011
Excerpt: 
Computer networks. Tanenbaum, Andrew S., 1944-
Available: Copies: