157 Results Found Subscribe to search results
0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000IIE
Print
by 
Gollmann, Dieter.
Format: 
Books
Publication Date 
2006
Excerpt: 
Computer security / Gollmann, Dieter.
Available: Copies:
by 
Gollmann, Dieter.
Format: 
Books
Publication Date 
1999
Excerpt: 
Computer security / Gollmann, Dieter.
Available: Copies:
3. 
Cover image for Computer security
by 
Carroll, John Millar.
Format: 
Books
Publication Date 
1996
Excerpt: 
Computer security / Carroll, John Millar.
Available: Copies:
by 
Wang, Jie.
Format: 
Books
Publication Date 
2009
Excerpt: 
Computer network security : theory and practice / Wang, Jie.
Available: Copies:
by 
Rowlingson, Robert.
Format: 
Books
Publication Date 
2011
Excerpt: 
The essential guide to home computer security / Rowlingson, Robert.
Available: Copies:
by 
Obaidat, Mohammad S. (Mohammad Salameh), 1952-
Format: 
Books
Publication Date 
2007
Excerpt: 
Security of e-systems and computer networks / Obaidat, Mohammad S. (Mohammad Salameh), 1952-
Available: Copies:
by 
Goodrich, M. T. (Michael T.)
Format: 
Books
Publication Date 
2014
Excerpt: 
Introduction to Computer Security: Pearson New International Edition / Goodrich, M. T. (Michael T.)
Available: Copies:
8. 
Cover image for Computer security literacy : staying safe in a digital world
by 
Jacobson, Douglas.
Format: 
Books
Publication Date 
2013
Excerpt: 
Computer security literacy : staying safe in a digital world / Jacobson, Douglas.
Available: Copies:
9. 
Cover image for Principles of computer security : CompTIA security+ and beyond
by 
Conklin, Wm. Arthur (William Arthur)
Format: 
Electronic Resources
Publication Date 
2010
Excerpt: 
Principles of computer security : CompTIA security+ and beyond / Conklin, Wm. Arthur (William
Available: Copies:
10. 
Cover image for Network control and engineering for QoS, security and mobility, V : IFIP 19th World Computer Congress, TC-6, 5th IFIP International Conference on Network Control and Engineering for QoS, Security and Mobility, August 20-25, 2006, Santiago, Chile
by 
IFIP TC6/WG6.2, 6.6, 6.7, and 6.8 International Conference on Network Control and Engineering for QoS, Security, and Mobility (5th : 2006 : Santiago, Chile)
Format: 
Books
Publication Date 
2006
Excerpt: 
Network control and engineering for QoS, security and mobility, V : IFIP 19th World Computer
Available: Copies:
11. 
Cover image for Firewall design and analysis
by 
Liu, Alex X.
Format: 
Books
Publication Date 
2011
Excerpt: 
Computer networks -- Security measures.
Available: Copies:
by 
Xiao, Yang, 1966-
Format: 
Books
Publication Date 
2007
Excerpt: 
Distributed operating systems (Computers) -- Security measures.
Available: Copies:
13. 
Cover image for CompTIA® security+ : guide to network security fundamentals
Format: 
Books
Publication Date 
2025
Excerpt: 
Computer networks -- Security measures -- Examinations -- Study guides.
Available: Copies:
14. 
Cover image for Data communications & computer networks : a business user's approach.
by 
West, Jill (Author of CompTIA Network+ guide to networks), author.
Format: 
Books
Publication Date 
2023
Excerpt: 
Data communications & computer networks : a business user's approach. West, Jill (Author of CompTIA
Available: Copies:
15. 
Cover image for Principles of information security
by 
Whitman, Michael E., 1964- author.
Format: 
Books
Publication Date 
2022
Excerpt: 
Computer networks -- Security measures.
Available: Copies:
16. 
Cover image for Computer networking : a top-down approach
by 
Kurose, James F., author.
Format: 
Books
Publication Date 
2022
Excerpt: 
Computer networking : a top-down approach / Kurose, James F., author.
Available: Copies:
17. 
Cover image for CompTIA Security+ guide to network security fundamentals
by 
Ciampa, Mark D., author.
Format: 
Books
Publication Date 
2021
Excerpt: 
CompTIA Security+ guide to network security fundamentals / Ciampa, Mark D., author.
Available: Copies:
18. 
Cover image for Network security essentials : applications and standards
by 
Stallings, William author.
Format: 
Books
Publication Date 
2017
Excerpt: 
Computer networks -- Security measures.
Available: Copies:
19. 
Cover image for Data communications and computer networks : a business user's approach
by 
White, Curt M.
Format: 
Books
Publication Date 
2016
Excerpt: 
Data communications and computer networks : a business user's approach / White, Curt M.
Available: Copies:
20. 
Cover image for Hardware security : design, threats, and safeguards
by 
Mukhopadhyay, Debdeep.
Format: 
Books
Publication Date 
2015
Excerpt: 
Computer security.
Available: Copies:
by 
Baloch, Rafay.
Format: 
Books
Publication Date 
2015
Excerpt: 
Penetration testing (Computer security)
Available: Copies:
22. 
Cover image for Security and privacy
by 
Savirimuthu, Joseph, editor.
Format: 
Books
Publication Date 
2015
Excerpt: 
Computer security -- Law and legislation.
Available: Copies:
23. 
Cover image for Security awareness : applying practical security in your world
by 
Ciampa, Mark.
Format: 
Regular print
Publication Date 
2014 2013
Excerpt: 
Security awareness : applying practical security in your world / Ciampa, Mark.
Available: Copies:
24. 
Cover image for Network security essentials : applications and standards
by 
Stallings, William, author.
Format: 
Books
Publication Date 
2014
Excerpt: 
Computer networks -- Security measures.
Available: Copies:
25. 
Cover image for Emerging trends in ICT security
by 
Akhgar, Babak, editor of compilation.
Format: 
Books
Publication Date 
2014
Excerpt: 
Emerging trends in ICT security / Akhgar, Babak, editor of compilation.
Available: Copies:
26. 
Cover image for Professional Java for web applications : featuring WebSockets, Spring Framework, JPA Hibernate, and Spring Security
by 
Williams, Nicholas S. author.
Format: 
Books
Publication Date 
2014
Excerpt: 
Spring Security / Williams, Nicholas S. author.
Available: Copies:
27. 
Cover image for Hacking exposed : unified communications & VoIP security secrets & solutions
by 
Collier, Mark D., author.
Format: 
Books
Publication Date 
2014
Excerpt: 
Computer networks -- Security measures.
Available: Copies:
by 
Stewart, James Michael.
Format: 
Books
Publication Date 
2014
Excerpt: 
Computer networks -- Security measures.
Available: Copies:
30. 
Cover image for Managing cyber attacks in international law, business, and relations : in search of cyber peace
by 
Shackelford, Scott J. author.
Format: 
Books
Publication Date 
2014
Excerpt: 
Computer networks -- Security measures.
Available: Copies:
by 
Jacobs, Stuart.
Format: 
Books
Publication Date 
2014
Excerpt: 
Computer networks -- Security measures.
Available: Copies:
32. 
Cover image for Android security : attacks and defenses
by 
Misra, Anmol.
Format: 
Books
Publication Date 
2013
Excerpt: 
Operating systems (Computers) -- Security measures.
Available: Copies:
33. 
Cover image for Hacking exposed : mobile security secrets & solutions
by 
Bergman, Neil.
Format: 
Books
Publication Date 
2013
Excerpt: 
Computer networks -- Security measures.
Available: Copies:
34. 
Cover image for Cyber attacks : protecting national infrastructure
by 
Amoroso, Edward.
Format: 
Books
Publication Date 
2013
Excerpt: 
Computer networks -- Security measures.
Available: Copies:
by 
Ghernaouti-Hélie, Solange, 1958-....
Format: 
Books
Publication Date 
2013
Excerpt: 
Cyber power : Crime, conflict and security in cyberspace. Ghernaouti-Hélie, Solange, 1958-....
Available: Copies:
36. 
Cover image for Network security : a beginner's guide
by 
Maiwald, Eric.
Format: 
Books
Publication Date 
2013
Excerpt: 
Computer networks -- Security measures.
Available: Copies:
37. 
Cover image for Advanced DPA theory and practice : towards the security limits of secure embedded circuits
by 
Peeters, Eric, author.
Format: 
Books
Publication Date 
2013
Excerpt: 
Embedded computer systems -- Security measures.
Available: Copies:
by 
Shema, Mike, author.
Format: 
Books
Publication Date 
2012
Excerpt: 
Computer networks -- Security measures.
Available: Copies:
39. 
Cover image for Safety health and security in wastewater systems
by 
Water Environment Federation
Format: 
Books
Publication Date 
2012
Excerpt: 
Safety health and security in wastewater systems / Water Environment Federation
Available: Copies:
40. 
Cover image for A multidisciplinary introduction to information security
by 
Mjølsnes, Stig F.
Format: 
Books
Publication Date 
2012
Excerpt: 
Computer networks -- Security measures.
Available: Copies:
41. 
Cover image for Role mining in business : taming role-based access control administration
by 
Colantonio, Alessandro.
Format: 
Books
Publication Date 
2012
Excerpt: 
Computer security.
Available: Copies:
by 
Baldauf, Ken.
Format: 
Books
Publication Date 
2011
Excerpt: 
Succeeding with technology : computer system concepts for your life / Baldauf, Ken.
Available: Copies:
by 
Stallings, William.
Format: 
Books
Publication Date 
2011
Excerpt: 
Computer networks -- Security measures.
Available: Copies:
by 
Quinn, Michael J. (Michael Jay)
Format: 
Books
Publication Date 
2011
Excerpt: 
Computers and civilization.
Available: Copies:
45. 
Cover image for iPhone and iOS forensics : investigation, analysis, and mobile security for Apple iPhone, iPad, and iOS devices
by 
Hoog, Andrew.
Format: 
Books
Publication Date 
2011
Excerpt: 
iPhone and iOS forensics : investigation, analysis, and mobile security for Apple iPhone, iPad, and
Available: Copies:
46. 
Cover image for Android forensics : investigation, analysis, and mobile security for Google Android
by 
Hoog, Andrew.
Format: 
Books
Publication Date 
2011
Excerpt: 
Android forensics : investigation, analysis, and mobile security for Google Android / Hoog, Andrew.
Available: Copies:
by 
Gibson, Darril.
Format: 
Books
Publication Date 
2011
Excerpt: 
Computer security.
Available: Copies:
48. 
Cover image for Architecture of network systems
by 
Serpanos, Dimitrios Nikolaou.
Format: 
Books
Publication Date 
2011
Excerpt: 
Computer network architectures.
Available: Copies:
49. 
Cover image for Security risk management : building an information security risk management program from the ground up
by 
Wheeler, Evan.
Format: 
Books
Publication Date 
2011
Excerpt: 
Security risk management : building an information security risk management program from the ground
Available: Copies:
50. 
Cover image for Cybercrime and espionage : an analysis of subversive multivector threats
by 
Gragido, Will.
Format: 
Books
Publication Date 
2011
Excerpt: 
Computer crimes -- Prevention.
Available: Copies:
51. 
Cover image for Computer networks.
by 
Tanenbaum, Andrew S., 1944-
Format: 
Books
Publication Date 
2011
Excerpt: 
Computer networks. Tanenbaum, Andrew S., 1944-
Available: Copies:
by 
Harper, Allen.
Format: 
Books
Publication Date 
2011
Excerpt: 
Computer security.
Available: Copies:
by 
Adomi, Esharenana E.
Format: 
Books
Publication Date 
2011
Excerpt: 
Information technology -- Security measures -- Cross-cultural studies.
Available: Copies:
by 
Moore, Robert, 1976-
Format: 
Books
Publication Date 
2011
Excerpt: 
Computer security -- Law and legislation -- United States.
Available: Copies:
by 
Davis, Chris.
Format: 
Books
Publication Date 
2010
Excerpt: 
Computer security.
Available: Copies:
57. 
Cover image for Introduction to information systems
by 
O'Brien, James A., 1936-
Format: 
Books
Publication Date 
2010
Excerpt: 
. Computer software ; 5. Data resource management ; Telecommunications and networks -- Module III. Business
Available: Copies:
58. 
Cover image for Discovering computers 2010 : living in a digital world : complete
by 
Shelly, Gary B.
Format: 
Books
Publication Date 
2010
Excerpt: 
Discovering computers 2010 : living in a digital world : complete / Shelly, Gary B.
Available: Copies:
by 
Chappell, Laura.
Format: 
Books
Publication Date 
2010
Excerpt: 
Computer networks -- Security measures.
Available: Copies:
60. 
Cover image for Secure and resilient software development
by 
Merkow, Mark S.
Format: 
Books
Publication Date 
2010
Excerpt: 
Computer security.
Available: Copies:
by 
Fried, Stephen, 1962-
Format: 
Books
Publication Date 
2010
Excerpt: 
Computer security.
Available: Copies:
62. 
Cover image for Seven deadliest social network attacks
by 
Timm, Carl.
Format: 
Books
Publication Date 
2010
Excerpt: 
Computer networks -- Security measures.
Available: Copies:
by 
Shema, Mike.
Format: 
Books
Publication Date 
2010
Excerpt: 
Computer networks -- Security measures.
Available: Copies:
64. 
Cover image for Internet fraud casebook : the World Wide Web of deceit
by 
Wells, Joseph T.
Format: 
Books
Publication Date 
2010
Excerpt: 
Computer security -- Case studies.
Available: Copies:
by 
Moeller, Robert R.
Format: 
Books
Publication Date 
2010
Excerpt: 
Computer networks -- Security measures.
Available: Copies:
66. 
Cover image for Digital rights management for e-commerce systems
by 
Drossos, Lambros, 1961-
Format: 
Books
Publication Date 
2009
Excerpt: 
Computer security.
Available: Copies:
67. 
Cover image for Database systems : design, implementation, and management
by 
Rob, Peter.
Format: 
Books
Publication Date 
2009
Excerpt: 
Computer Security.
Available: Copies:
by 
Solari, C. (Carlos)
Format: 
Books
Publication Date 
2009
Excerpt: 
Computer networks -- Security measures -- Standards.
Available: Copies:
69. 
Cover image for Principles of information security
by 
Whitman, Michael E., 1964-
Format: 
Books
Publication Date 
2009
Excerpt: 
Computer networks -- Security measures.
Available: Copies:
by 
Jacobson, Douglas.
Format: 
Books
Publication Date 
2009
Excerpt: 
Computer networks -- Security measures.
Available: Copies:
71. 
Cover image for Administrative assistant's and secretary's handbook
by 
Stroman, James.
Format: 
Books
Publication Date 
2008
Excerpt: 
-- Troubleshooting computer problems -- Office ergonomics -- Glossary of computer terms -- The business letter
Available: Copies:
by 
Nelson, Bill.
Format: 
Books
Publication Date 
2008
Excerpt: 
Computer security.
Available: Copies:
73. 
Cover image for Windows server 2008 : networking and Network Access Protection (NAP)
by 
Davies, Joseph, 1962-
Format: 
Books
Publication Date 
2008
Excerpt: 
Computer networks -- Security measures.
Available: Copies:
by 
Gallaher, Michael P.
Format: 
Books
Publication Date 
2008
Excerpt: 
Business enterprises -- Computer networks -- Security measures.
Available: Copies:
75. 
Cover image for Security and software for cybercafes
by 
Adomi, Esharenana E.
Format: 
Books
Publication Date 
2008
Excerpt: 
Computer security.
Available: Copies:
by 
Quigley, Marian.
Format: 
Books
Publication Date 
2008 2007
Excerpt: 
Computer security -- Encyclopedias.
Available: Copies:
77. 
Cover image for IT governance : a manager's guide to data security and ISO 27001/ISO 27002
by 
Calder, Alan, 1957-
Format: 
Books
Publication Date 
2008
Excerpt: 
Business enterprises -- Computer networks -- Security measures.
Available: Copies:
78. 
Cover image for FPGA-based implementation of signal processing systems
by 
Wood, Roger.
Format: 
Books
Publication Date 
2008
Excerpt: 
-visual and security applications. Senior level electrical and computer engineering graduates taking courses
Available: Copies:
79. 
Cover image for Malware forensics : investigating and analyzing malicious code
by 
Aquilina, James M.
Format: 
Books
Publication Date 
2008
Excerpt: 
Computer networks -- Security measures.
Available: Copies:
by 
Mayer, Frank, 1961-
Format: 
Books
Publication Date 
2007
Excerpt: 
Computer networks -- Security measures.
Available: Copies:
81. 
Cover image for Security in computing
by 
Pfleeger, Charles P., 1948-
Format: 
Books
Publication Date 
2007
Excerpt: 
Computer security.
Available: Copies:
by 
Stallings, William.
Format: 
Books
Publication Date 
2007
Excerpt: 
Computer networks -- Security measures.
Available: Copies:
by 
Grimes, Roger A.
Format: 
Books
Publication Date 
2007
Excerpt: 
Computer security.
Available: Copies:
by 
Gookin, Dan.
Format: 
Books
Publication Date 
2007
Excerpt: 
Personal computers.
Available: Copies:
85. 
Cover image for Introduction to information systems : supporting and transforming business
by 
Rainer, R. Kelly, Jr., 1949-
Format: 
Books
Publication Date 
2007
Excerpt: 
technology? -- Ethics, privacy, and information security -- 3.1 Ethical issues -- 3.2 Threats to information
Available: Copies:
by 
De Capite, Duane.
Format: 
Books
Publication Date 
2007 2006
Excerpt: 
Computer networks -- Security measures.
Available: Copies:
by 
Carmouche, James Henry.
Format: 
Books
Publication Date 
2007
Excerpt: 
Computer networks -- Security measures.
Available: Copies:
88. 
Cover image for Digital citizenship in schools
by 
Ribble, Mike.
Format: 
Books
Publication Date 
2007
Excerpt: 
Computer literacy -- Study and teaching -- United States.
Available: Copies:
by 
Raval, Vasant H. (Vasant Harishanker), 1940-
Format: 
Books
Publication Date 
2007
Excerpt: 
Computer networks -- Security measures.
Available: Copies:
90. 
Cover image for Cyber crime investigations  : bridging the gaps between security professionals, law enforcement, and prosecutors
by 
Reyes, Anthony.
Format: 
Electronic Resources
Publication Date 
2007
Excerpt: 
Cyber crime investigations : bridging the gaps between security professionals, law enforcement
Available: Copies:
91. 
Cover image for Computer forensics : evidence collection and management
by 
Newman, Robert C.
Format: 
Books
Publication Date 
2007
Excerpt: 
Computer forensics : evidence collection and management / Newman, Robert C.
Available: Copies:
92. 
Cover image for CompTIA security+ study guide
by 
Pastore, Michael A.
Format: 
Books
Publication Date 
2006
Excerpt: 
Computer networks -- Security measures -- Examinations -- Study guides.
Available: Copies:
93. 
Cover image for Cryptography and network security : principles and practice
by 
Stallings, William.
Format: 
Books
Publication Date 
2006
Excerpt: 
Computer networks -- Security measures.
Available: Copies:
by 
Yee, George.
Format: 
Books
Publication Date 
2006
Excerpt: 
Computer security.
Available: Copies:
by 
Slade, Robert.
Format: 
Books
Publication Date 
2006
Excerpt: 
Computer security -- Dictionaries.
Available: Copies:
96. 
Cover image for Information technology security & risk management
by 
Slay, Jill.
Format: 
Books
Publication Date 
2006
Excerpt: 
Computer security.
Available: Copies:
97. 
Cover image for Technology in action
by 
Evans, Alan.
Format: 
Books
Publication Date 
2006
Excerpt: 
Why computers matter to you: becoming computer fluent -- Looking at computers: understanding the
Available: Copies:
98. 
Cover image for Professional ASP.NET 2.0 security, membership, and role management
by 
Schackow, Stefan, 1970-
Format: 
Books
Publication Date 
2006
Excerpt: 
Computer security.
Available: Copies:
by 
Balkin, J. M.
Format: 
Books
Publication Date 
2006
Excerpt: 
Computer security -- United States -- Evaluation.
Available: Copies:
by 
Whitaker, Andrew.
Format: 
Books
Publication Date 
2006
Excerpt: 
Computer networks -- Security measures.
Available: Copies:
101. 
Cover image for Information security and privacy : 11th Australasian conference, ACISP 2006, Melbourne, Australia, July 3-5, 2006 : proceedings
by 
ACISP 2006 (2006 : Melbourne, Vic.)
Format: 
Books
Publication Date 
2006
Excerpt: 
Computer security -- Congresses.
Available: Copies:
103. 
Cover image for Coding and cryptography : international workshop, WCC 2005, Bergen, Norway, March 14-18, 2005 : revised selected papers
by 
International Workshop on Coding and Cryptography (2005 : Bergen, Norway)
Format: 
Books
Publication Date 
2006
Excerpt: 
Computer security -- Congresses.
Available: Copies:
104. 
Cover image for Emerging trends in information and communication security : international conference, ETRICS 2006, Freiburg, Germany, June 6-9, 2006 ; proceedings
by 
ETRICS 2006 (2006 : Freiburg im Breisgau, Germany)
Format: 
Electronic Resources
Publication Date 
2006
Excerpt: 
Computer security -- Congresses.
Available: Copies:
105. 
Cover image for Look both ways : help protect your family on the Internet
by 
Criddle, Linda.
Format: 
Books
Publication Date 
2006
Excerpt: 
Computer security.
Available: Copies:
by 
Henmi, Anne.
Format: 
Books
Publication Date 
2006
Excerpt: 
Computer networks -- Security measures.
Available: Copies:
by 
Gollmann, Dieter.
Format: 
Books
Publication Date 
2006
Excerpt: 
Computer security -- Quality control -- Congresses.
Available: Copies:
by 
Quinn, Michael J. (Michael Jay)
Format: 
Books
Publication Date 
2006
Excerpt: 
-- Computer and network security -- Computer reliability -- Work and wealth -- Professional ethics -- Appendix
Available: Copies:
109. 
Cover image for Secure your network for free : using Nmap, Wireshark, Snort, Nessus, and MRGT
by 
Seagren, Eric.
Format: 
Electronic Resources
Publication Date 
2006
Excerpt: 
Computer networks -- Security measures -- Software.
Available: Copies:
by 
McGraw, Gary, 1966-
Format: 
Books
Publication Date 
2006
Excerpt: 
Software security : building security in / McGraw, Gary, 1966-
Available: Copies:
111. 
Cover image for The executive guide to information security : threats, challenges, and solutions
by 
Egan, Mark.
Format: 
Books
Publication Date 
2005
Excerpt: 
Computer security.
Available: Copies:
by 
Ben-Natan, Ron.
Format: 
Books
Publication Date 
2005
Excerpt: 
Computer security.
Available: Copies:
by 
Vacca, John R.
Format: 
Books
Publication Date 
2005
Excerpt: 
Firewalls (Computer security)
Available: Copies:
114. 
Cover image for Defending the digital frontier : practical security for management
by 
Babiak, Jan.
Format: 
Books
Publication Date 
2005
Excerpt: 
Computer networks -- Security measures.
Available: Copies:
115. 
Cover image for International e-Conference on Computer Science 2005
by 
International e-Conference on Computer Science (2005)
Format: 
Books
Publication Date 
2005
Excerpt: 
International e-Conference on Computer Science 2005 / International e-Conference on Computer
Available: Copies:
116. 
Cover image for Computer forensics jumpstart
by 
Solomon, Michael (Michael G.), 1963-
Format: 
Books
Publication Date 
2005
Excerpt: 
Computer networks -- Security measures.
Available: Copies:
117. 
Cover image for Information security illuminated
by 
Solomon, Michael (Michael G.), 1963-
Format: 
Books
Publication Date 
2005
Excerpt: 
Computer networks -- Security measures.
Available: Copies:
118. 
Cover image for Security for mobility
by 
Mitchell, Chris, 1953-
Format: 
Books
Publication Date 
2004
Excerpt: 
Computer security.
Available: Copies:
by 
Holden, Greg.
Format: 
Books
Publication Date 
2004
Excerpt: 
Computer networks -- Security measures.
Available: Copies:
by 
Kurose, James F.
Format: 
Books
Publication Date 
2003
Excerpt: 
Computer networking : a top-down approach featuring the Internet / Kurose, James F.
Available: Copies:
by 
O'Neill, Mark.
Format: 
Books
Publication Date 
2003
Excerpt: 
Computer security.
Available: Copies:
124. 
Cover image for Information security management handbook
by 
Tipton, Harold F.
Format: 
Books
Publication Date 
2003
Excerpt: 
Computer security -- Management -- Handbooks, manuals, etc.
Available: Copies:
125. 
Cover image for Security in computing
by 
Pfleeger, Charles P., 1948-
Format: 
Books
Publication Date 
2003
Excerpt: 
Computer security.
Available: Copies:
126. 
by 
Flickenger, Rob.
Format: 
Books
Publication Date 
2003
Excerpt: 
Computer networks -- Security measures.
Available: Copies:
by 
Schiffman, Mike.
Format: 
Regular print
Publication Date 
2003
Excerpt: 
Computer networks -- Security measures.
Available: Copies:
by 
Poole, Owen.
Format: 
Books
Publication Date 
2003
Excerpt: 
Computer security.
Available: Copies:
129. 
Cover image for Computer networking : a top-down approach featuring the Internet
by 
Kurose, James F.
Format: 
Books
Publication Date 
2003
Excerpt: 
Computer networking : a top-down approach featuring the Internet / Kurose, James F.
Available: Copies:
130. 
Cover image for Practical UNIX and Internet security.
by 
Garfinkel, Simson.
Format: 
Books
Publication Date 
2003
Excerpt: 
Computer security.
Available: Copies:
131. 
Cover image for Internet security
by 
Holden, Greg.
Format: 
Books
Publication Date 
2003
Excerpt: 
Computer networks -- Security measures.
Available: Copies:
132. 
Cover image for Writing secure code
by 
Howard, Michael, 1965-
Format: 
Books
Publication Date 
2003
Excerpt: 
Computer security.
Available: Copies:
by 
Young, Susan (Susan Elizabeth), 1968-
Format: 
Books
Publication Date 
2003
Excerpt: 
Computer networks -- Security measures.
Available: Copies:
by 
Silberschatz, Abraham.
Format: 
Books
Publication Date 
2002
Excerpt: 
Operating systems (Computers)
Available: Copies:
by 
Byrnes, F. Christian.
Format: 
Books
Publication Date 
2002
Excerpt: 
Business -- Computer networks -- Security measures.
Available: Copies:
136. 
Cover image for Web security, privacy, and commerce
by 
Garfinkel, Simson.
Format: 
Books
Publication Date 
2002
Excerpt: 
Computer networks -- Security measures.
Available: Copies:
by 
Braithwaite, Timothy, 1942-
Format: 
Books
Publication Date 
2002
Excerpt: 
Business enterprises -- Computer networks -- Security measures.
Available: Copies:
138. 
Cover image for Planning for PKI : best practices guide for deploying public key infrastructure
by 
Housley, Russ, 1959-
Format: 
Books
Publication Date 
2001
Excerpt: 
Business enterprises -- Computer networks -- Security measures.
Available: Copies:
139. 
Cover image for An information security handbook
by 
Hunter, John M. D., 1940-
Format: 
Books
Publication Date 
2001
Excerpt: 
Computer security -- Handbooks, manuals, etc.
Available: Copies:
Format: 
Books
Publication Date 
2001
Excerpt: 
Computer networks -- Security measures.
Available: Copies:
by 
Musaji, Yusufali F.
Format: 
Books
Publication Date 
2001
Excerpt: 
Computer security.
Available: Copies:
142. 
Cover image for Cryptography and e-commerce : a Wiley tech brief
by 
Graff, Jon.
Format: 
Books
Publication Date 
2001
Excerpt: 
Computer security.
Available: Copies:
by 
Essinger, James.
Format: 
Books
Publication Date 
2001
Excerpt: 
Business enterprises -- Computer networks -- Security measures.
Available: Copies:
by 
McCarthy, Mary Pat.
Format: 
Books
Publication Date 
2001
Excerpt: 
Business enterprises -- Computer networks -- Security measures.
Available: Copies:
145. 
Cover image for Information security policies, procedures, and standards : guidelines for effective information security management
by 
Peltier, Thomas R.
Format: 
Books
Publication Date 
2001
Excerpt: 
Computer security.
Available: Copies:
by 
Anderson, Ross, 1956-
Format: 
Books
Publication Date 
2001
Excerpt: 
Computer security.
Available: Copies:
147. 
Cover image for Accounting information systems
by 
Bodnar, George H.
Format: 
Books
Publication Date 
2001
Excerpt: 
Systems Security -- Vulnerabilities and Threats -- The Information Systems Security System -- Disaster
Available: Copies:
148. 
Cover image for Understanding operating systems
by 
Flynn, Ida M., 1942-
Format: 
Books
Publication Date 
2001
Excerpt: 
Operating systems (Computers)
Available: Copies:
by 
Spinello, Richard A.
Format: 
Books
Publication Date 
2001
Excerpt: 
Computer networks -- Moral and ethical aspects.
Available: Copies:
150. 
Cover image for Data and computer communications
by 
Stallings, William.
Format: 
Books
Publication Date 
2000
Excerpt: 
Data and computer communications / Stallings, William.
Available: Copies:
by 
Relyea, Harold.
Format: 
Books
Publication Date 
2000
Excerpt: 
Computer security.
Available: Copies:
by 
Oppliger, Rolf.
Format: 
Books
Publication Date 
1999
Excerpt: 
Computer security.
Available: Copies:
by 
Silberschatz, Abraham.
Format: 
Books
Publication Date 
1999
Excerpt: 
Operating systems (Computers)
Available: Copies:
155. 
Cover image for Security in computing
by 
Pfleeger, Charles P., 1948-
Format: 
Books
Publication Date 
1997
Excerpt: 
Computer security.
Available: Copies:
156. 
Cover image for Dictionary of computing.
by 
Illingworth, Valerie.
Format: 
Books
Publication Date 
1996
Excerpt: 
Computers -- Dictionaries.
Available: Copies:
157. 
Cover image for Computers, ethics & social values
by 
Johnson, Deborah G., 1945-
Format: 
Books
Publication Date 
1995
Excerpt: 
Computer security.
Available: Copies:
Limit Search Results
Access Level
Author
Format
Item Category 1
Language
Subject
Item Available