234 Results Found Subscribe to search results
000000000000IIE
Print
1. 
Cover image for Internet fraud casebook : the World Wide Web of deceit
by 
Wells, Joseph T.
Format: 
Books
Publication Date 
2010
Excerpt: 
Computer security -- Case studies.
Available: Copies:
2. 
Cover image for Secure and resilient software development
by 
Merkow, Mark S.
Format: 
Books
Publication Date 
2010
Excerpt: 
Computer security.
Available: Copies:
3. 
Cover image for Introduction to information systems
by 
O'Brien, James A., 1936-
Format: 
Books
Publication Date 
2010
Excerpt: 
. Computer software ; 5. Data resource management ; Telecommunications and networks -- Module III. Business
Available: Copies:
4. 
Cover image for IT audit, control, and security
by 
Moeller, Robert R.
Format: 
Books
Publication Date 
2010
Excerpt: 
Computer networks -- Security measures.
Available: Copies:
5. 
Cover image for Seven deadliest social network attacks
by 
Timm, Carl.
Format: 
Books
Publication Date 
2010
Excerpt: 
Computer networks -- Security measures.
Available: Copies:
6. 
Cover image for Seven deadliest web application attacks
by 
Shema, Mike.
Format: 
Books
Publication Date 
2010
Excerpt: 
Computer networks -- Security measures.
Available: Copies:
7. 
Cover image for Capturing the criminal image : from mug shot to surveillance society
by 
Finn, Jonathan M. (Jonathan Mathew), 1972- author.
Format: 
Electronic Resources
Publication Date 
2009
Excerpt: 
analysis, digital imagery, and computer databases--similarly provide new ways for representing the criminal
Available: Copies:
8. 
Cover image for CompTIA A+ complete study guide
by 
Docter, Quentin.
Format: 
Electronic Resources
Publication Date 
2009
Excerpt: 
Computer technicians -- Certification -- Study guides.
Available: Copies:
9. 
Cover image for Digital rights management for e-commerce systems
by 
Drossos, Lambros, 1961-
Format: 
Books
Publication Date 
2009
Excerpt: 
Computer security.
Available: Copies:
10. 
Cover image for Database systems : design, implementation, and management
by 
Rob, Peter.
Format: 
Books
Publication Date 
2009
Excerpt: 
Computer Security.
Available: Copies:
11. 
Cover image for Security in wireless ad hoc and sensor networks
by 
Cayirci, E. (Erdal)
Format: 
Books
Publication Date 
2009
Excerpt: 
Ad hoc networks (Computer networks) -- Security measures.
Available: Copies:
12. 
Cover image for Security in a Web 2.0+ world : a standards based approach
by 
Solari, C. (Carlos)
Format: 
Books
Publication Date 
2009
Excerpt: 
Computer networks -- Security measures -- Standards.
Available: Copies:
Limit Search Results
Access Level
Author
Format
Language
Subject
Item Available