Search Results for Computer security.SirsiDynix Enterprisehttps://libraryconnect.iie.ac.za/client/en_US/iie/iie/qu$003dComputer$002bsecurity.$0026ps$003d300?2025-04-30T09:22:00ZComputer securityent://SD_ILS/0/SD_ILS:359682025-04-30T09:22:00Z2025-04-30T09:22:00Zby Gollmann, Dieter.<br/>Table of contents <a href="http://www.loc.gov/catdir/toc/ecip0519/2005026866.html">http://www.loc.gov/catdir/toc/ecip0519/2005026866.html</a><br/>Format: Books<br/>Publication Date 2006<br/>Computer securityent://SD_ILS/0/SD_ILS:252262025-04-30T09:22:00Z2025-04-30T09:22:00Zby Gollmann, Dieter.<br/>Table of Contents <a href="http://www.loc.gov/catdir/toc/onix05/98042538.html">http://www.loc.gov/catdir/toc/onix05/98042538.html</a><br/>Format: Books<br/>Publication Date 1999<br/>Computer securityent://SD_ILS/0/SD_ILS:252292025-04-30T09:22:00Z2025-04-30T09:22:00Zby Carroll, John Millar.<br/>Format: Books<br/>Publication Date 1996<br/>Practical computer securityent://SD_ILS/0/SD_ILS:69852025-04-30T09:22:00Z2025-04-30T09:22:00Zby Spafford, G & Garfinkel, S<br/>Format: Books<br/>Publication Date 1991<br/>Practical UNIX security : computer securityent://SD_ILS/0/SD_ILS:155902025-04-30T09:22:00Z2025-04-30T09:22:00Zby Garfinkel, Simson.<br/>Contributor biographical information <a href="http://catdir.loc.gov/catdir/enhancements/fy0912/92195509-b.html">http://catdir.loc.gov/catdir/enhancements/fy0912/92195509-b.html</a>
Publisher description <a href="http://catdir.loc.gov/catdir/enhancements/fy0715/92195509-d.html">http://catdir.loc.gov/catdir/enhancements/fy0715/92195509-d.html</a><br/>Format: Books<br/>Publication Date 1991<br/>Computer security : principles and practiceent://SD_ILS/0/SD_ILS:565142025-04-30T09:22:00Z2025-04-30T09:22:00Zby Stallings, William, author.<br/>Format: Books<br/>Publication Date 2018<br/>Computer network security : theory and practiceent://SD_ILS/0/SD_ILS:444832025-04-30T09:22:00Z2025-04-30T09:22:00Zby Wang, Jie.<br/>Format: Books<br/>Publication Date 2009<br/>The essential guide to home computer securityent://SD_ILS/0/SD_ILS:539122025-04-30T09:22:00Z2025-04-30T09:22:00Zby Rowlingson, Robert.<br/>Format: Books<br/>Publication Date 2011<br/>Security of e-systems and computer networksent://SD_ILS/0/SD_ILS:434782025-04-30T09:22:00Z2025-04-30T09:22:00Zby Obaidat, Mohammad S. (Mohammad Salameh), 1952-<br/>Contributor biographical information <a href="http://www.loc.gov/catdir/enhancements/fy0803/2007279861-b.html">http://www.loc.gov/catdir/enhancements/fy0803/2007279861-b.html</a>
Publisher description <a href="http://www.loc.gov/catdir/enhancements/fy0803/2007279861-d.html">http://www.loc.gov/catdir/enhancements/fy0803/2007279861-d.html</a>
Table of contents only <a href="http://www.loc.gov/catdir/enhancements/fy0803/2007279861-t.html">http://www.loc.gov/catdir/enhancements/fy0803/2007279861-t.html</a><br/>Format: Books<br/>Publication Date 2007<br/>Introduction to Computer Security: Pearson New International Editionent://SD_ILS/0/SD_ILS:538712025-04-30T09:22:00Z2025-04-30T09:22:00Zby Goodrich, M. T. (Michael T.)<br/>Format: Books<br/>Publication Date 2014<br/>Computer security literacy : staying safe in a digital worldent://SD_ILS/0/SD_ILS:502232025-04-30T09:22:00Z2025-04-30T09:22:00Zby Jacobson, Douglas.<br/>Format: Books<br/>Publication Date 2013<br/>Principles of computer security : CompTIA security+ and beyondent://SD_ILS/0/SD_ILS:414982025-04-30T09:22:00Z2025-04-30T09:22:00Zby Conklin, Wm. Arthur (William Arthur)<br/>Format: Electronic Resources<br/>Publication Date 2010<br/>Network control and engineering for QoS, security and mobility, V : IFIP 19th World Computer Congress, TC-6, 5th IFIP International Conference on Network Control and Engineering for QoS, Security and Mobility, August 20-25, 2006, Santiago, Chileent://SD_ILS/0/SD_ILS:338162025-04-30T09:22:00Z2025-04-30T09:22:00Zby IFIP TC6/WG6.2, 6.6, 6.7, and 6.8 International Conference on Network Control and Engineering for QoS, Security, and Mobility (5th : 2006 : Santiago, Chile)<br/>Format: Books<br/>Publication Date 2006<br/>Computer security : 20 things every employee should knowent://SD_ILS/0/SD_ILS:284432025-04-30T09:22:00Z2025-04-30T09:22:00Zby Rothke, Ben.<br/>Format: Books<br/>Publication Date 2004 2003<br/>Firewall design and analysisent://SD_ILS/0/SD_ILS:537502025-04-30T09:22:00Z2025-04-30T09:22:00Zby Liu, Alex X.<br/>Format: Books<br/>Publication Date 2011<br/>Security in distributed and networking systemsent://SD_ILS/0/SD_ILS:430252025-04-30T09:22:00Z2025-04-30T09:22:00Zby Xiao, Yang, 1966-<br/>Format: Books<br/>Publication Date 2007<br/>Practical UNIX and Internet securityent://SD_ILS/0/SD_ILS:143192025-04-30T09:22:00Z2025-04-30T09:22:00Zby Garfinkel, Simson.<br/>Table of contents <a href="http://www.gbv.de/dms/bowker/toc/9781565921481.pdf">http://www.gbv.de/dms/bowker/toc/9781565921481.pdf</a>
Contributor biographical information <a href="http://catdir.loc.gov/catdir/enhancements/fy0915/96161185-b.html">http://catdir.loc.gov/catdir/enhancements/fy0915/96161185-b.html</a>
Publisher description <a href="http://catdir.loc.gov/catdir/enhancements/fy0915/96161185-d.html">http://catdir.loc.gov/catdir/enhancements/fy0915/96161185-d.html</a>
Umschlagbild <a href="http://swbplus.bsz-bw.de/bsz048310409cov.htm">http://swbplus.bsz-bw.de/bsz048310409cov.htm</a><br/>Format: Books<br/>Publication Date 1996<br/>CompTIA® security+ : guide to network security fundamentalsent://SD_ILS/0/SD_ILS:592422025-04-30T09:22:00Z2025-04-30T09:22:00ZFormat: Books<br/>Publication Date 2025<br/>Management information systems : harnessing technologies for business & societyent://SD_ILS/0/SD_ILS:593262025-04-30T09:22:00Z2025-04-30T09:22:00Zby Issa, Tomayess, author.<br/>Format: Books<br/>Publication Date 2024<br/>Data communications & computer networks : a business user's approach.ent://SD_ILS/0/SD_ILS:571072025-04-30T09:22:00Z2025-04-30T09:22:00Zby West, Jill (Author of CompTIA Network+ guide to networks), author.<br/>Format: Books<br/>Publication Date 2023<br/>Principles of information securityent://SD_ILS/0/SD_ILS:571062025-04-30T09:22:00Z2025-04-30T09:22:00Zby Whitman, Michael E., 1964- author.<br/>Format: Books<br/>Publication Date 2022<br/>Computer networking : a top-down approachent://SD_ILS/0/SD_ILS:592642025-04-30T09:22:00Z2025-04-30T09:22:00Zby Kurose, James F., author.<br/>Format: Books<br/>Publication Date 2022<br/>CompTIA Security+ guide to network security fundamentalsent://SD_ILS/0/SD_ILS:565242025-04-30T09:22:00Z2025-04-30T09:22:00Zby Ciampa, Mark D., author.<br/>Format: Books<br/>Publication Date 2021<br/>Construction drawings and details for interiorsent://SD_ILS/0/SD_ILS:572082025-04-30T09:22:00Z2025-04-30T09:22:00Zby Kilmer, Rosemary, author.<br/>Format: Books<br/>Publication Date 2021<br/>Operating systems : internals and design principlesent://SD_ILS/0/SD_ILS:565152025-04-30T09:22:00Z2025-04-30T09:22:00Zby Stallings, William, author.<br/>Format: Books<br/>Publication Date 2018<br/>Principles of information securityent://SD_ILS/0/SD_ILS:218702025-04-30T09:22:00Z2025-04-30T09:22:00Zby Whitman, Michael E., 1964- author.<br/>EBSCO <a href="https://ezproxy.iielearn.ac.za/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=nlebk&AN=2281864&site=ehost-live">https://ezproxy.iielearn.ac.za/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=nlebk&AN=2281864&site=ehost-live</a><br/>Format: Books<br/>Publication Date 2018<br/>CompTIA security+ guide to network security fundamentalsent://SD_ILS/0/SD_ILS:219952025-04-30T09:22:00Z2025-04-30T09:22:00Zby Ciampa, Mark D., author.<br/>EBSCO <a href="https://ezproxy.iielearn.ac.za/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=nlebk&AN=2281867&site=ehost-live">https://ezproxy.iielearn.ac.za/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=nlebk&AN=2281867&site=ehost-live</a><br/>Format: Books<br/>Publication Date 2018<br/>Network security essentials : applications and standardsent://SD_ILS/0/SD_ILS:550102025-04-30T09:22:00Z2025-04-30T09:22:00Zby Stallings, William author.<br/>Format: Books<br/>Publication Date 2017<br/>Cyber Security : A practitioner's guideent://SD_ILS/0/SD_ILS:557782025-04-30T09:22:00Z2025-04-30T09:22:00Zby Sutton, David (Information security practitioner), author.<br/><a href="https://ezproxy.iielearn.ac.za/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=e000xww&AN=1501522&site=ehost-live">https://ezproxy.iielearn.ac.za/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=e000xww&AN=1501522&site=ehost-live</a><br/>Format: Books<br/>Publication Date 2017<br/>Principles of information securityent://SD_ILS/0/SD_ILS:3202025-04-30T09:22:00Z2025-04-30T09:22:00Zby Whitman, Michael E., 1964- author.<br/>Format: Books<br/>Publication Date 2016<br/>Data communications and computer networks : a business user's approachent://SD_ILS/0/SD_ILS:108142025-04-30T09:22:00Z2025-04-30T09:22:00Zby White, Curt M.<br/>Format: Books<br/>Publication Date 2016<br/>CompTIA security+ guide to network security fundamentalsent://SD_ILS/0/SD_ILS:3472025-04-30T09:22:00Z2025-04-30T09:22:00Zby Ciampa, Mark D., author.<br/>Format: Books<br/>Publication Date 2015<br/>Security and privacyent://SD_ILS/0/SD_ILS:537662025-04-30T09:22:00Z2025-04-30T09:22:00Zby Savirimuthu, Joseph, editor.<br/>Format: Books<br/>Publication Date 2015<br/>Ethical hacking and penetration testing guideent://SD_ILS/0/SD_ILS:533322025-04-30T09:22:00Z2025-04-30T09:22:00Zby Baloch, Rafay.<br/>Cover image <a href="http://images.tandf.co.uk/common/jackets/websmall/978148223/9781482231618.jpg">http://images.tandf.co.uk/common/jackets/websmall/978148223/9781482231618.jpg</a><br/>Format: Books<br/>Publication Date 2015<br/>Hardware security : design, threats, and safeguardsent://SD_ILS/0/SD_ILS:542862025-04-30T09:22:00Z2025-04-30T09:22:00Zby Mukhopadhyay, Debdeep.<br/>Format: Books<br/>Publication Date 2015<br/>Teachers discovering computers : integrating technology in a changing worldent://SD_ILS/0/SD_ILS:97932025-04-30T09:22:00Z2025-04-30T09:22:00Zby Gunter, Glenda A., author.<br/>Format: Books<br/>Publication Date 2015<br/>Security in computingent://SD_ILS/0/SD_ILS:557882025-04-30T09:22:00Z2025-04-30T09:22:00Zby Pfleeger, Charles P., 1948- author.<br/><a href="http://catalogue.londonmet.ac.uk/record=b1680851~S1">E-book</a><br/>Format: Regular print<br/>Publication Date 2015<br/>Security awareness : applying practical security in your worldent://SD_ILS/0/SD_ILS:502252025-04-30T09:22:00Z2025-04-30T09:22:00Zby Ciampa, Mark.<br/>Format: Regular print<br/>Publication Date 2014 2013<br/>Professional Java for web applications : featuring WebSockets, Spring Framework, JPA Hibernate, and Spring Securityent://SD_ILS/0/SD_ILS:511822025-04-30T09:22:00Z2025-04-30T09:22:00Zby Williams, Nicholas S. author.<br/>Format: Books<br/>Publication Date 2014<br/>The basics of IT audit Purposes, processes, and practical information.ent://SD_ILS/0/SD_ILS:517552025-04-30T09:22:00Z2025-04-30T09:22:00Zby Gantz, Stephen D.<br/><a href="http://esc-web.lib.cbs.dk/login?url=http://www.sciencedirect.com/science/book/9780124171596">Campus and remote access</a>
<a href="http://proquest.safaribooksonline.com/?fpi=9780124171596">Available by subscription from Safari Books Online</a>
Volltext <a href="http://proquest.tech.safaribooksonline.de/9780124171596">http://proquest.tech.safaribooksonline.de/9780124171596</a><br/>Format: Electronic Resources<br/>Publication Date 2014<br/>Network security, firewalls, and VPNsent://SD_ILS/0/SD_ILS:521932025-04-30T09:22:00Z2025-04-30T09:22:00Zby Stewart, James Michael.<br/>Format: Books<br/>Publication Date 2014<br/>Security management of next generation telecommunications networks and servicesent://SD_ILS/0/SD_ILS:538172025-04-30T09:22:00Z2025-04-30T09:22:00Zby Jacobs, Stuart.<br/>Format: Books<br/>Publication Date 2014<br/>Network security essentials : applications and standardsent://SD_ILS/0/SD_ILS:504962025-04-30T09:22:00Z2025-04-30T09:22:00Zby Stallings, William, author.<br/>Format: Books<br/>Publication Date 2014<br/>Emerging trends in ICT securityent://SD_ILS/0/SD_ILS:508782025-04-30T09:22:00Z2025-04-30T09:22:00Zby Akhgar, Babak, editor of compilation.<br/>Format: Books<br/>Publication Date 2014<br/>Hacking exposed : unified communications &amp; VoIP security secrets &amp; solutionsent://SD_ILS/0/SD_ILS:514532025-04-30T09:22:00Z2025-04-30T09:22:00Zby Collier, Mark D., author.<br/>Format: Books<br/>Publication Date 2014<br/>Managing cyber attacks in international law, business, and relations : in search of cyber peaceent://SD_ILS/0/SD_ILS:536382025-04-30T09:22:00Z2025-04-30T09:22:00Zby Shackelford, Scott J. author.<br/>Table of contents <a href="http://catdir.loc.gov/catdir/enhancements/fy1215/2012035324-t.html">http://catdir.loc.gov/catdir/enhancements/fy1215/2012035324-t.html</a>
Contributor biographical information <a href="http://catdir.loc.gov/catdir/enhancements/fy1215/2012035324-b.html">http://catdir.loc.gov/catdir/enhancements/fy1215/2012035324-b.html</a>
Publisher description <a href="http://catdir.loc.gov/catdir/enhancements/fy1215/2012035324-d.html">http://catdir.loc.gov/catdir/enhancements/fy1215/2012035324-d.html</a><br/>Format: Books<br/>Publication Date 2014<br/>The basics of information security : understanding the fundamentals of InfoSec in theory and practiceent://SD_ILS/0/SD_ILS:565002025-04-30T09:22:00Z2025-04-30T09:22:00Zby Andress, Jason.<br/>EBSCO <a href="https://ezproxy.iielearn.ac.za/login?url=https://search.ebscohost.com/login.aspx?direct=true&db=nlebk&AN=786214&site=ehost-live&scope=site">https://ezproxy.iielearn.ac.za/login?url=https://search.ebscohost.com/login.aspx?direct=true&db=nlebk&AN=786214&site=ehost-live&scope=site</a><br/>Format: Books<br/>Publication Date 2014<br/>Android security : attacks and defensesent://SD_ILS/0/SD_ILS:502242025-04-30T09:22:00Z2025-04-30T09:22:00Zby Misra, Anmol.<br/>Format: Books<br/>Publication Date 2013<br/>Hacking exposed : mobile security secrets &amp; solutionsent://SD_ILS/0/SD_ILS:505112025-04-30T09:22:00Z2025-04-30T09:22:00Zby Bergman, Neil.<br/>Format: Books<br/>Publication Date 2013<br/>Advanced DPA theory and practice : towards the security limits of secure embedded circuitsent://SD_ILS/0/SD_ILS:537912025-04-30T09:22:00Z2025-04-30T09:22:00Zby Peeters, Eric, author.<br/>Table of contents <a href="http://catdir.loc.gov/catdir/enhancements/fy1501/2013933300-t.html">http://catdir.loc.gov/catdir/enhancements/fy1501/2013933300-t.html</a>
Contributor biographical information <a href="http://catdir.loc.gov/catdir/enhancements/fy1501/2013933300-b.html">http://catdir.loc.gov/catdir/enhancements/fy1501/2013933300-b.html</a>
Publisher description <a href="http://catdir.loc.gov/catdir/enhancements/fy1501/2013933300-d.html">http://catdir.loc.gov/catdir/enhancements/fy1501/2013933300-d.html</a><br/>Format: Books<br/>Publication Date 2013<br/>Cyber attacks : protecting national infrastructureent://SD_ILS/0/SD_ILS:498612025-04-30T09:22:00Z2025-04-30T09:22:00Zby Amoroso, Edward.<br/>Format: Books<br/>Publication Date 2013<br/>Cyber power : Crime, conflict and security in cyberspace.ent://SD_ILS/0/SD_ILS:500412025-04-30T09:22:00Z2025-04-30T09:22:00Zby Ghernaouti-Hélie, Solange, 1958-....<br/>Format: Books<br/>Publication Date 2013<br/>Network security : a beginner's guideent://SD_ILS/0/SD_ILS:515562025-04-30T09:22:00Z2025-04-30T09:22:00Zby Maiwald, Eric.<br/>Format: Books<br/>Publication Date 2013<br/>Understanding computers : today and tomorrow : introductoryent://SD_ILS/0/SD_ILS:223552025-04-30T09:22:00Z2025-04-30T09:22:00Zby Morley, Deborah.<br/>Format: Books<br/>Publication Date 2013<br/>Security fundamentals : exam 98-367ent://SD_ILS/0/SD_ILS:225022025-04-30T09:22:00Z2025-04-30T09:22:00Zby Gambrel, Bryan.<br/>Format: Books<br/>Publication Date 2012<br/>Hacking web apps : detecting and preventing web application security problemsent://SD_ILS/0/SD_ILS:507112025-04-30T09:22:00Z2025-04-30T09:22:00Zby Shema, Mike, author.<br/>Format: Books<br/>Publication Date 2012<br/>Safety health and security in wastewater systemsent://SD_ILS/0/SD_ILS:507352025-04-30T09:22:00Z2025-04-30T09:22:00Zby Water Environment Federation<br/>Format: Books<br/>Publication Date 2012<br/>A multidisciplinary introduction to information securityent://SD_ILS/0/SD_ILS:505542025-04-30T09:22:00Z2025-04-30T09:22:00Zby Mjølsnes, Stig F.<br/>Format: Books<br/>Publication Date 2012<br/>Role mining in business : taming role-based access control administrationent://SD_ILS/0/SD_ILS:546472025-04-30T09:22:00Z2025-04-30T09:22:00Zby Colantonio, Alessandro.<br/>Format: Books<br/>Publication Date 2012<br/>MacBook all-in-one for dummiesent://SD_ILS/0/SD_ILS:13552025-04-30T09:22:00Z2025-04-30T09:22:00Zby Chambers, Mark L.<br/>Format: Books<br/>Publication Date 2012<br/>Security+ guide to network security fundamentalsent://SD_ILS/0/SD_ILS:19692025-04-30T09:22:00Z2025-04-30T09:22:00Zby Ciampa, Mark D.<br/>Contributor biographical information <a href="http://catdir.loc.gov/catdir/enhancements/fy1303/2011931202-b.html">http://catdir.loc.gov/catdir/enhancements/fy1303/2011931202-b.html</a>
Publisher description <a href="http://catdir.loc.gov/catdir/enhancements/fy1303/2011931202-d.html">http://catdir.loc.gov/catdir/enhancements/fy1303/2011931202-d.html</a>
Table of contents only <a href="http://catdir.loc.gov/catdir/enhancements/fy1303/2011931202-t.html">http://catdir.loc.gov/catdir/enhancements/fy1303/2011931202-t.html</a><br/>Format: Books<br/>Publication Date 2012<br/>Principles of information securityent://SD_ILS/0/SD_ILS:164132025-04-30T09:22:00Z2025-04-30T09:22:00Zby Whitman, Michael E., 1964-<br/>Format: Books<br/>Publication Date 2012<br/>Low tech hacking : street smarts for security professionalsent://SD_ILS/0/SD_ILS:177872025-04-30T09:22:00Z2025-04-30T09:22:00Zby Wiles, Jack.<br/>Format: Books<br/>Publication Date 2012<br/>Cybersecurity : the essential body of knowledgeent://SD_ILS/0/SD_ILS:558492025-04-30T09:22:00Z2025-04-30T09:22:00Zby Shoemaker, Dan.<br/>Format: Books<br/>Publication Date 2012<br/>Architecture of network systemsent://SD_ILS/0/SD_ILS:322025-04-30T09:22:00Z2025-04-30T09:22:00Zby Serpanos, Dimitrios Nikolaou.<br/>EBSCOhost <a href="http://search.ebscohost.com.ezproxy.iielearn.ac.za/login.aspx?direct=true&db=nlebk&AN=353481&site=ehost-live">http://search.ebscohost.com.ezproxy.iielearn.ac.za/login.aspx?direct=true&db=nlebk&AN=353481&site=ehost-live</a><br/>Format: Books<br/>Publication Date 2011<br/>Security risk management : building an information security risk management program from the ground upent://SD_ILS/0/SD_ILS:3502025-04-30T09:22:00Z2025-04-30T09:22:00Zby Wheeler, Evan.<br/>EBSCO <a href="https://ezproxy.iielearn.ac.za/login?url=https://search.ebscohost.com/login.aspx?direct=true&db=e000xww&AN=365553&site=ehost-live&scope=site">https://ezproxy.iielearn.ac.za/login?url=https://search.ebscohost.com/login.aspx?direct=true&db=e000xww&AN=365553&site=ehost-live&scope=site</a><br/>Format: Books<br/>Publication Date 2011<br/>Frameworks for ICT policy : government, social and legal issuesent://SD_ILS/0/SD_ILS:423932025-04-30T09:22:00Z2025-04-30T09:22:00Zby Adomi, Esharenana E.<br/>Format: Books<br/>Publication Date 2011<br/>Network security essentials : applications and standardsent://SD_ILS/0/SD_ILS:436892025-04-30T09:22:00Z2025-04-30T09:22:00Zby Stallings, William.<br/>Format: Books<br/>Publication Date 2011<br/>Cybercrime and espionage : an analysis of subversive multivector threatsent://SD_ILS/0/SD_ILS:454982025-04-30T09:22:00Z2025-04-30T09:22:00Zby Gragido, Will.<br/>Format: Books<br/>Publication Date 2011<br/>Computer networks.ent://SD_ILS/0/SD_ILS:456252025-04-30T09:22:00Z2025-04-30T09:22:00Zby Tanenbaum, Andrew S., 1944-<br/>Format: Books<br/>Publication Date 2011<br/>Cybercrime : investigating high-technology computer crimeent://SD_ILS/0/SD_ILS:462192025-04-30T09:22:00Z2025-04-30T09:22:00Zby Moore, Robert, 1976-<br/>Format: Books<br/>Publication Date 2011<br/>Android forensics : investigation, analysis, and mobile security for Google Androident://SD_ILS/0/SD_ILS:507122025-04-30T09:22:00Z2025-04-30T09:22:00Zby Hoog, Andrew.<br/>Format: Books<br/>Publication Date 2011<br/>Managing risk in information systemsent://SD_ILS/0/SD_ILS:521922025-04-30T09:22:00Z2025-04-30T09:22:00Zby Gibson, Darril.<br/>Format: Books<br/>Publication Date 2011<br/>Ethics for the information ageent://SD_ILS/0/SD_ILS:439332025-04-30T09:22:00Z2025-04-30T09:22:00Zby Quinn, Michael J. (Michael Jay)<br/>Format: Books<br/>Publication Date 2011<br/>iPhone and iOS forensics : investigation, analysis, and mobile security for Apple iPhone, iPad, and iOS devicesent://SD_ILS/0/SD_ILS:507092025-04-30T09:22:00Z2025-04-30T09:22:00Zby Hoog, Andrew.<br/>Format: Books<br/>Publication Date 2011<br/>Gray hat hacking : the ethical hacker's handbookent://SD_ILS/0/SD_ILS:515442025-04-30T09:22:00Z2025-04-30T09:22:00Zby Harper, Allen.<br/>Format: Books<br/>Publication Date 2011<br/>Handbook of security and networksent://SD_ILS/0/SD_ILS:537482025-04-30T09:22:00Z2025-04-30T09:22:00Zby Xiao, Yang, 1966-<br/>Table of contents <a href="http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&doc_number=018713193&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&doc_number=018713193&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</a>
Table of contents <a href="http://bvbr.bib-bvb.de:8991/F?func=serviceetdoc_library=BVB01etdoc_number=018713193etline_number=0001etfunc_code=DB_RECORDSetservice_type=MEDIA">http://bvbr.bib-bvb.de:8991/F?func=serviceetdoc_library=BVB01etdoc_number=018713193etline_number=0001etfunc_code=DB_RECORDSetservice_type=MEDIA</a><br/>Format: Books<br/>Publication Date 2011<br/>Succeeding with technology : computer system concepts for your lifeent://SD_ILS/0/SD_ILS:223612025-04-30T09:22:00Z2025-04-30T09:22:00Zby Baldauf, Ken.<br/>Format: Books<br/>Publication Date 2011<br/>Security 2020 : reduce security risks this decadeent://SD_ILS/0/SD_ILS:225002025-04-30T09:22:00Z2025-04-30T09:22:00Zby Howard, Doug.<br/>Format: Books<br/>Publication Date 2011<br/>Discovering computers 2010 : living in a digital world : completeent://SD_ILS/0/SD_ILS:193352025-04-30T09:22:00Z2025-04-30T09:22:00Zby Shelly, Gary B.<br/>Format: Books<br/>Publication Date 2010<br/>Wireshark network analysis : the official Wireshark certified network analyst study guideent://SD_ILS/0/SD_ILS:407762025-04-30T09:22:00Z2025-04-30T09:22:00Zby Chappell, Laura.<br/>Format: Books<br/>Publication Date 2010<br/>Internet fraud casebook : the World Wide Web of deceitent://SD_ILS/0/SD_ILS:418392025-04-30T09:22:00Z2025-04-30T09:22:00Zby Wells, Joseph T.<br/>Publisher description <a href="http://www.loc.gov/catdir/enhancements/fy1007/2010013506-d.html">http://www.loc.gov/catdir/enhancements/fy1007/2010013506-d.html</a>
Table of contents only <a href="http://www.loc.gov/catdir/enhancements/fy1007/2010013506-t.html">http://www.loc.gov/catdir/enhancements/fy1007/2010013506-t.html</a><br/>Format: Books<br/>Publication Date 2010<br/>Secure and resilient software developmentent://SD_ILS/0/SD_ILS:430862025-04-30T09:22:00Z2025-04-30T09:22:00Zby Merkow, Mark S.<br/>Format: Books<br/>Publication Date 2010<br/>Mobile device security : a comprehensive guide to securing your information in a moving worldent://SD_ILS/0/SD_ILS:432802025-04-30T09:22:00Z2025-04-30T09:22:00Zby Fried, Stephen, 1962-<br/>Format: Books<br/>Publication Date 2010<br/>IT audit, control, and securityent://SD_ILS/0/SD_ILS:448802025-04-30T09:22:00Z2025-04-30T09:22:00Zby Moeller, Robert R.<br/>Format: Books<br/>Publication Date 2010<br/>Seven deadliest social network attacksent://SD_ILS/0/SD_ILS:463622025-04-30T09:22:00Z2025-04-30T09:22:00Zby Timm, Carl.<br/>Format: Books<br/>Publication Date 2010<br/>Seven deadliest web application attacksent://SD_ILS/0/SD_ILS:463642025-04-30T09:22:00Z2025-04-30T09:22:00Zby Shema, Mike.<br/>Format: Books<br/>Publication Date 2010<br/>Hacking exposed computer forensics : secrets &amp; solutionsent://SD_ILS/0/SD_ILS:414972025-04-30T09:22:00Z2025-04-30T09:22:00Zby Davis, Chris.<br/>Format: Books<br/>Publication Date 2010<br/>Introduction to information systemsent://SD_ILS/0/SD_ILS:438652025-04-30T09:22:00Z2025-04-30T09:22:00Zby O'Brien, James A., 1936-<br/>Format: Books<br/>Publication Date 2010<br/>Networkingent://SD_ILS/0/SD_ILS:11152025-04-30T09:22:00Z2025-04-30T09:22:00Zby Beasley, Jeffrey S., 1955-<br/>Table of contents <a href="http://catdir.loc.gov/catdir/toc/ecip0824/2008032371.html">http://catdir.loc.gov/catdir/toc/ecip0824/2008032371.html</a><br/>Format: Electronic Resources<br/>Publication Date 2009<br/>CompTIA security+ certificationent://SD_ILS/0/SD_ILS:154812025-04-30T09:22:00Z2025-04-30T09:22:00Zby Samuelle, T. J.<br/>ebrary <a href="http://site.ebrary.com/id/10274005">http://site.ebrary.com/id/10274005</a><br/>Format: Electronic Resources<br/>Publication Date 2009<br/>Digital rights management for e-commerce systemsent://SD_ILS/0/SD_ILS:351432025-04-30T09:22:00Z2025-04-30T09:22:00Zby Drossos, Lambros, 1961-<br/>Format: Books<br/>Publication Date 2009<br/>Database systems : design, implementation, and managementent://SD_ILS/0/SD_ILS:358072025-04-30T09:22:00Z2025-04-30T09:22:00Zby Rob, Peter.<br/>Format: Books<br/>Publication Date 2009<br/>Security in wireless ad hoc and sensor networksent://SD_ILS/0/SD_ILS:384602025-04-30T09:22:00Z2025-04-30T09:22:00Zby Cayirci, E. (Erdal)<br/>Format: Books<br/>Publication Date 2009<br/>Security in a Web 2.0+ world : a standards based approachent://SD_ILS/0/SD_ILS:384792025-04-30T09:22:00Z2025-04-30T09:22:00Zby Solari, C. (Carlos)<br/>Format: Books<br/>Publication Date 2009<br/>Introduction to network securityent://SD_ILS/0/SD_ILS:464512025-04-30T09:22:00Z2025-04-30T09:22:00Zby Jacobson, Douglas.<br/>Format: Books<br/>Publication Date 2009<br/>Principles of information securityent://SD_ILS/0/SD_ILS:432472025-04-30T09:22:00Z2025-04-30T09:22:00Zby Whitman, Michael E., 1964-<br/>Format: Books<br/>Publication Date 2009<br/>Security+ guide to network security fundamentalsent://SD_ILS/0/SD_ILS:15222025-04-30T09:22:00Z2025-04-30T09:22:00Zby Ciampa, Mark D.<br/>Format: Electronic Resources<br/>Publication Date 2009<br/>Capturing the criminal image : from mug shot to surveillance societyent://SD_ILS/0/SD_ILS:91842025-04-30T09:22:00Z2025-04-30T09:22:00Zby Finn, Jonathan M. (Jonathan Mathew), 1972- author.<br/>Ebook Library <a href="http://public.eblib.com/choice/publicfullrecord.aspx?p=496591">http://public.eblib.com/choice/publicfullrecord.aspx?p=496591</a>
ebrary <a href="http://site.ebrary.com/id/10372228">http://site.ebrary.com/id/10372228</a>
EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=315458">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=315458</a>
JSTOR <a href="http://www.jstor.org/stable/10.5749/j.ctttv09q">http://www.jstor.org/stable/10.5749/j.ctttv09q</a>
MyiLibrary <a href="http://www.myilibrary.com?id=525770">http://www.myilibrary.com?id=525770</a><br/>Format: Electronic Resources<br/>Publication Date 2009<br/>CompTIA A+ complete study guideent://SD_ILS/0/SD_ILS:226032025-04-30T09:22:00Z2025-04-30T09:22:00Zby Docter, Quentin.<br/>Cover image <a href="http://catalogimages.wiley.com/images/db/jimages/9780470486498.jpg">http://catalogimages.wiley.com/images/db/jimages/9780470486498.jpg</a><br/>Format: Electronic Resources<br/>Publication Date 2009<br/>Discovering computers : fundamentalsent://SD_ILS/0/SD_ILS:21502025-04-30T09:22:00Z2025-04-30T09:22:00Zby Shelly, Gary B.<br/>Format: Books<br/>Publication Date 2008<br/>Computer networking : a top-down approachent://SD_ILS/0/SD_ILS:22382025-04-30T09:22:00Z2025-04-30T09:22:00Zby Kurose, James F.<br/>Table of contents <a href="http://www.gbv.de/dms/ilmenau/toc/52436754X.PDF">Kostenfrei</a>
Table of contents <a href="http://catdir.loc.gov/catdir/toc/ecip078/2007002094.html">http://catdir.loc.gov/catdir/toc/ecip078/2007002094.html</a>
Table of contents <a href="http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&doc_number=015583995&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&doc_number=015583995&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</a>
Table of contents <a href="http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=015583995&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=015583995&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</a><br/>Format: Books<br/>Publication Date 2008<br/>Discovering computers 2008 : introductoryent://SD_ILS/0/SD_ILS:90032025-04-30T09:22:00Z2025-04-30T09:22:00Zby Shelly, Gary B.<br/>Format: Books<br/>Publication Date 2008<br/>Management of information securityent://SD_ILS/0/SD_ILS:343582025-04-30T09:22:00Z2025-04-30T09:22:00Zby Whitman, Michael E., 1964-<br/>Format: Books<br/>Publication Date 2008<br/>Security and software for cybercafesent://SD_ILS/0/SD_ILS:347722025-04-30T09:22:00Z2025-04-30T09:22:00Zby Adomi, Esharenana E.<br/>Format: Books<br/>Publication Date 2008<br/>Windows server 2008 : networking and Network Access Protection (NAP)ent://SD_ILS/0/SD_ILS:354702025-04-30T09:22:00Z2025-04-30T09:22:00Zby Davies, Joseph, 1962-<br/>Format: Books<br/>Publication Date 2008<br/>Encyclopedia of information ethics and securityent://SD_ILS/0/SD_ILS:357012025-04-30T09:22:00Z2025-04-30T09:22:00Zby Quigley, Marian.<br/>Table of contents only <a href="http://www.loc.gov/catdir/toc/ecip0711/2007007277.html">http://www.loc.gov/catdir/toc/ecip0711/2007007277.html</a><br/>Format: Books<br/>Publication Date 2008 2007<br/>IT governance : a manager's guide to data security and ISO 27001/ISO 27002ent://SD_ILS/0/SD_ILS:370402025-04-30T09:22:00Z2025-04-30T09:22:00Zby Calder, Alan, 1957-<br/>Format: Books<br/>Publication Date 2008<br/>Guide to computer forensics and investigationsent://SD_ILS/0/SD_ILS:353672025-04-30T09:22:00Z2025-04-30T09:22:00Zby Nelson, Bill.<br/>Format: Books<br/>Publication Date 2008<br/>Cyber security : economic strategies and public policy alternativesent://SD_ILS/0/SD_ILS:362122025-04-30T09:22:00Z2025-04-30T09:22:00Zby Gallaher, Michael P.<br/>Format: Books<br/>Publication Date 2008<br/>FPGA-based implementation of signal processing systemsent://SD_ILS/0/SD_ILS:384302025-04-30T09:22:00Z2025-04-30T09:22:00Zby Wood, Roger.<br/>Format: Books<br/>Publication Date 2008<br/>Malware forensics : investigating and analyzing malicious codeent://SD_ILS/0/SD_ILS:462172025-04-30T09:22:00Z2025-04-30T09:22:00Zby Aquilina, James M.<br/>Format: Books<br/>Publication Date 2008<br/>Microsoft® Windows server 2008 security resource kitent://SD_ILS/0/SD_ILS:66792025-04-30T09:22:00Z2025-04-30T09:22:00Zby Johansson, Jesper M.<br/>Format: Books<br/>Publication Date 2008<br/>Administrative assistant's and secretary's handbookent://SD_ILS/0/SD_ILS:98622025-04-30T09:22:00Z2025-04-30T09:22:00Zby Stroman, James.<br/>Table of contents <a href="http://catdir.loc.gov/catdir/toc/ecip0718/2007020971.html">http://catdir.loc.gov/catdir/toc/ecip0718/2007020971.html</a><br/>Format: Books<br/>Publication Date 2008<br/>Self-defending networks : the next generation of network securityent://SD_ILS/0/SD_ILS:338412025-04-30T09:22:00Z2025-04-30T09:22:00Zby De Capite, Duane.<br/>Format: Books<br/>Publication Date 2007 2006<br/>Security in computingent://SD_ILS/0/SD_ILS:343292025-04-30T09:22:00Z2025-04-30T09:22:00Zby Pfleeger, Charles P., 1948-<br/>Table of contents only <a href="http://www.loc.gov/catdir/toc/ecip0619/2006026798.html">http://www.loc.gov/catdir/toc/ecip0619/2006026798.html</a><br/>Format: Books<br/>Publication Date 2007<br/>Network security essentials : applications and standardsent://SD_ILS/0/SD_ILS:343322025-04-30T09:22:00Z2025-04-30T09:22:00Zby Stallings, William.<br/>Table of contents only <a href="http://www.loc.gov/catdir/toc/fy0706/2006287096.html">http://www.loc.gov/catdir/toc/fy0706/2006287096.html</a><br/>Format: Books<br/>Publication Date 2007<br/>Introduction to information systems : supporting and transforming businessent://SD_ILS/0/SD_ILS:310972025-04-30T09:22:00Z2025-04-30T09:22:00Zby Rainer, R. Kelly, Jr., 1949-<br/>Table of contents <a href="http://www.loc.gov/catdir/toc/ecip0518/2005022367.html">http://www.loc.gov/catdir/toc/ecip0518/2005022367.html</a>
Publisher description <a href="http://www.loc.gov/catdir/enhancements/fy0645/2005022367-d.html">http://www.loc.gov/catdir/enhancements/fy0645/2005022367-d.html</a><br/>Format: Books<br/>Publication Date 2007<br/>SELinux by example : understanding security enhanced Linuxent://SD_ILS/0/SD_ILS:332412025-04-30T09:22:00Z2025-04-30T09:22:00Zby Mayer, Frank, 1961-<br/>Table of contents <a href="http://www.loc.gov/catdir/toc/ecip0612/2006012657.html">http://www.loc.gov/catdir/toc/ecip0612/2006012657.html</a><br/>Format: Books<br/>Publication Date 2007<br/>Network security hacksent://SD_ILS/0/SD_ILS:337612025-04-30T09:22:00Z2025-04-30T09:22:00Zby Lockhart, Andrew.<br/>Format: Books<br/>Publication Date 2007<br/>Windows Vista security : securing Vista against malicious attacksent://SD_ILS/0/SD_ILS:362852025-04-30T09:22:00Z2025-04-30T09:22:00Zby Grimes, Roger A.<br/>Table of contents only <a href="http://www.loc.gov/catdir/toc/ecip0718/2007020135.html">http://www.loc.gov/catdir/toc/ecip0718/2007020135.html</a><br/>Format: Books<br/>Publication Date 2007<br/>IPsec virtual private network fundamentalsent://SD_ILS/0/SD_ILS:364982025-04-30T09:22:00Z2025-04-30T09:22:00Zby Carmouche, James Henry.<br/>Format: Books<br/>Publication Date 2007<br/>PCs for dummiesent://SD_ILS/0/SD_ILS:364482025-04-30T09:22:00Z2025-04-30T09:22:00Zby Gookin, Dan.<br/>Format: Books<br/>Publication Date 2007<br/>Risks, controls, and security : concepts and applicationsent://SD_ILS/0/SD_ILS:399472025-04-30T09:22:00Z2025-04-30T09:22:00Zby Raval, Vasant H. (Vasant Harishanker), 1940-<br/>Publisher description <a href="http://www.loc.gov/catdir/enhancements/fy0714/2007273982-d.html">http://www.loc.gov/catdir/enhancements/fy0714/2007273982-d.html</a>
Contributor biographical information <a href="http://www.loc.gov/catdir/enhancements/fy0740/2007273982-b.html">http://www.loc.gov/catdir/enhancements/fy0740/2007273982-b.html</a>
Table of contents only <a href="http://www.loc.gov/catdir/enhancements/fy0740/2007273982-t.html">http://www.loc.gov/catdir/enhancements/fy0740/2007273982-t.html</a><br/>Format: Books<br/>Publication Date 2007<br/>Cyber crime investigations : bridging the gaps between security professionals, law enforcement, and prosecutorsent://SD_ILS/0/SD_ILS:427182025-04-30T09:22:00Z2025-04-30T09:22:00Zby Reyes, Anthony.<br/>Format: Electronic Resources<br/>Publication Date 2007<br/>Computer forensics : evidence collection and managementent://SD_ILS/0/SD_ILS:446032025-04-30T09:22:00Z2025-04-30T09:22:00Zby Newman, Robert C.<br/>Format: Books<br/>Publication Date 2007<br/>Digital citizenship in schoolsent://SD_ILS/0/SD_ILS:451172025-04-30T09:22:00Z2025-04-30T09:22:00Zby Ribble, Mike.<br/>Format: Books<br/>Publication Date 2007<br/>Discovering computers : fundamentalsent://SD_ILS/0/SD_ILS:17632025-04-30T09:22:00Z2025-04-30T09:22:00Zby Shelly, Gary B.<br/>Table of contents <a href="http://catdir.loc.gov/catdir/enhancements/fy1104/2006299619-t.html">http://catdir.loc.gov/catdir/enhancements/fy1104/2006299619-t.html</a>
Contributor biographical information <a href="http://catdir.loc.gov/catdir/enhancements/fy1104/2006299619-b.html">http://catdir.loc.gov/catdir/enhancements/fy1104/2006299619-b.html</a>
Publisher description <a href="http://catdir.loc.gov/catdir/enhancements/fy1104/2006299619-d.html">http://catdir.loc.gov/catdir/enhancements/fy1104/2006299619-d.html</a><br/>Format: Books<br/>Publication Date 2007<br/>The unofficial guide to ethical hackingent://SD_ILS/0/SD_ILS:90172025-04-30T09:22:00Z2025-04-30T09:22:00Zby Fadia, Ankit, 1985-<br/>Format: Books<br/>Publication Date 2006<br/>CompTIA security+ study guideent://SD_ILS/0/SD_ILS:159992025-04-30T09:22:00Z2025-04-30T09:22:00Zby Pastore, Michael A.<br/>Table of contents <a href="http://catdir.loc.gov/catdir/enhancements/fy0619/2004104231-t.html">http://catdir.loc.gov/catdir/enhancements/fy0619/2004104231-t.html</a>
Contributor biographical information <a href="http://catdir.loc.gov/catdir/enhancements/fy0619/2004104231-b.html">http://catdir.loc.gov/catdir/enhancements/fy0619/2004104231-b.html</a>
Publisher description <a href="http://catdir.loc.gov/catdir/enhancements/fy0659/2006285691-d.html">http://catdir.loc.gov/catdir/enhancements/fy0659/2006285691-d.html</a>
Publisher description <a href="http://catdir.loc.gov/catdir/enhancements/fy0619/2004104231-d.html">http://catdir.loc.gov/catdir/enhancements/fy0619/2004104231-d.html</a><br/>Format: Books<br/>Publication Date 2006<br/>Privacy protection for e-servicesent://SD_ILS/0/SD_ILS:319872025-04-30T09:22:00Z2025-04-30T09:22:00Zby Yee, George.<br/>Table of contents <a href="http://www.loc.gov/catdir/toc/ecip063/2005032104.html">http://www.loc.gov/catdir/toc/ecip063/2005032104.html</a><br/>Format: Books<br/>Publication Date 2006<br/>Information security and privacy : 11th Australasian conference, ACISP 2006, Melbourne, Australia, July 3-5, 2006 : proceedingsent://SD_ILS/0/SD_ILS:338252025-04-30T09:22:00Z2025-04-30T09:22:00Zby ACISP 2006 (2006 : Melbourne, Vic.)<br/><a href="http://www.springerlink.com/openurl.asp?genre=issue&issn=0302-9743&volume=4058">Restricted to SpringerLink subscribers</a><br/>Format: Books<br/>Publication Date 2006<br/>Privacy enhancing technologies : 5th international workshop, PET 2005, Cavtat, Croatia, May 30-June 1, 2005 : revised selected papersent://SD_ILS/0/SD_ILS:338272025-04-30T09:22:00Z2025-04-30T09:22:00Zby PET 2005 (2005 : Cavtat, Croatia)<br/><a href="http://www.springerlink.com/openurl.asp?genre=issue&issn=0302-9743&volume=3856">Restricted to SpringerLink subscribers</a>
Table of contents only <a href="http://www.loc.gov/catdir/toc/fy0702/2006926828.html">http://www.loc.gov/catdir/toc/fy0702/2006926828.html</a>
Publisher description <a href="http://www.loc.gov/catdir/enhancements/fy0661/2006926828-d.html">http://www.loc.gov/catdir/enhancements/fy0661/2006926828-d.html</a><br/>Format: Books<br/>Publication Date 2006<br/>Coding and cryptography : international workshop, WCC 2005, Bergen, Norway, March 14-18, 2005 : revised selected papersent://SD_ILS/0/SD_ILS:338312025-04-30T09:22:00Z2025-04-30T09:22:00Zby International Workshop on Coding and Cryptography (2005 : Bergen, Norway)<br/>Table of contents only <a href="http://www.loc.gov/catdir/toc/fy0706/2006927431.html">http://www.loc.gov/catdir/toc/fy0706/2006927431.html</a><br/>Format: Books<br/>Publication Date 2006<br/>Emerging trends in information and communication security : international conference, ETRICS 2006, Freiburg, Germany, June 6-9, 2006 ; proceedingsent://SD_ILS/0/SD_ILS:338332025-04-30T09:22:00Z2025-04-30T09:22:00Zby ETRICS 2006 (2006 : Freiburg im Breisgau, Germany)<br/>Format: Electronic Resources<br/>Publication Date 2006<br/>Look both ways : help protect your family on the Internetent://SD_ILS/0/SD_ILS:338402025-04-30T09:22:00Z2025-04-30T09:22:00Zby Criddle, Linda.<br/>Format: Books<br/>Publication Date 2006<br/>Firewall policies and VPN configurationsent://SD_ILS/0/SD_ILS:338632025-04-30T09:22:00Z2025-04-30T09:22:00Zby Henmi, Anne.<br/>Format: Books<br/>Publication Date 2006<br/>Quality of protection : security measurements and metricsent://SD_ILS/0/SD_ILS:338772025-04-30T09:22:00Z2025-04-30T09:22:00Zby Gollmann, Dieter.<br/>Format: Books<br/>Publication Date 2006<br/>Information technology security &amp; risk managementent://SD_ILS/0/SD_ILS:357182025-04-30T09:22:00Z2025-04-30T09:22:00Zby Slay, Jill.<br/>Format: Books<br/>Publication Date 2006<br/>Cryptography and network security : principles and practiceent://SD_ILS/0/SD_ILS:315452025-04-30T09:22:00Z2025-04-30T09:22:00Zby Stallings, William.<br/>Table of contents only <a href="http://www.loc.gov/catdir/toc/fy0608/2006276085.html">http://www.loc.gov/catdir/toc/fy0608/2006276085.html</a><br/>Format: Books<br/>Publication Date 2006<br/>Technology in actionent://SD_ILS/0/SD_ILS:318052025-04-30T09:22:00Z2025-04-30T09:22:00Zby Evans, Alan.<br/>Format: Books<br/>Publication Date 2006<br/>Professional ASP.NET 2.0 security, membership, and role managementent://SD_ILS/0/SD_ILS:332352025-04-30T09:22:00Z2025-04-30T09:22:00Zby Schackow, Stefan, 1970-<br/>Table of contents <a href="http://www.loc.gov/catdir/toc/ecip063/2005032278.html">http://www.loc.gov/catdir/toc/ecip063/2005032278.html</a><br/>Format: Books<br/>Publication Date 2006<br/>Cybercrime : digital cops in a networked environmentent://SD_ILS/0/SD_ILS:334872025-04-30T09:22:00Z2025-04-30T09:22:00Zby Balkin, J. M.<br/>Table of contents only <a href="http://www.loc.gov/catdir/toc/ecip071/2006030943.html">http://www.loc.gov/catdir/toc/ecip071/2006030943.html</a><br/>Format: Books<br/>Publication Date 2006<br/>Dictionary of information securityent://SD_ILS/0/SD_ILS:337502025-04-30T09:22:00Z2025-04-30T09:22:00Zby Slade, Robert.<br/>Format: Books<br/>Publication Date 2006<br/>Penetration testing and network defenseent://SD_ILS/0/SD_ILS:337622025-04-30T09:22:00Z2025-04-30T09:22:00Zby Whitaker, Andrew.<br/>Table of contents <a href="http://www.loc.gov/catdir/toc/fy0607/2004108262.html">http://www.loc.gov/catdir/toc/fy0607/2004108262.html</a><br/>Format: Books<br/>Publication Date 2006<br/>Ethics for the information ageent://SD_ILS/0/SD_ILS:353472025-04-30T09:22:00Z2025-04-30T09:22:00Zby Quinn, Michael J. (Michael Jay)<br/><a href="http://www.loc.gov/catdir/toc/ecip0517/2005023442.html">Table of contents</a><br/>Format: Books<br/>Publication Date 2006<br/>Secure your network for free : using Nmap, Wireshark, Snort, Nessus, and MRGTent://SD_ILS/0/SD_ILS:401662025-04-30T09:22:00Z2025-04-30T09:22:00Zby Seagren, Eric.<br/>Format: Electronic Resources<br/>Publication Date 2006<br/>Software security : building security inent://SD_ILS/0/SD_ILS:549712025-04-30T09:22:00Z2025-04-30T09:22:00Zby McGraw, Gary, 1966-<br/>Table of contents only <a href="http://www.loc.gov/catdir/toc/ecip062/2005031598.html">http://www.loc.gov/catdir/toc/ecip062/2005031598.html</a><br/>Format: Books<br/>Publication Date 2006<br/>70-299 MCSE guide to implementing and administering security in a Microsoft Windows Server 2003 networkent://SD_ILS/0/SD_ILS:171012025-04-30T09:22:00Z2025-04-30T09:22:00Zby Barrett, Diane.<br/>Format: Books<br/>Publication Date 2006<br/>Small business management : an entrepreneur's guidebookent://SD_ILS/0/SD_ILS:197352025-04-30T09:22:00Z2025-04-30T09:22:00Zby Megginson, Leon C.<br/>Table of contents <a href="http://catdir.loc.gov/catdir/enhancements/fy0619/2004063777-t.html">http://catdir.loc.gov/catdir/enhancements/fy0619/2004063777-t.html</a>
Table of contents <a href="http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&doc_number=014177431&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&doc_number=014177431&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</a>
Publisher description <a href="http://catdir.loc.gov/catdir/enhancements/fy0619/2004063777-d.html">http://catdir.loc.gov/catdir/enhancements/fy0619/2004063777-d.html</a><br/>Format: Books<br/>Publication Date 2006<br/>Linux network securityent://SD_ILS/0/SD_ILS:5742025-04-30T09:22:00Z2025-04-30T09:22:00Zby Smith, Peter G., 1977-<br/>Table of contents <a href="http://catdir.loc.gov/catdir/toc/ecip056/2005000312.html">http://catdir.loc.gov/catdir/toc/ecip056/2005000312.html</a><br/>Format: Electronic Resources<br/>Publication Date 2005<br/>Implementing database security and auditingent://SD_ILS/0/SD_ILS:293472025-04-30T09:22:00Z2025-04-30T09:22:00Zby Ben-Natan, Ron.<br/>Format: Books<br/>Publication Date 2005<br/>Firewalls : jumpstart for network and systems administratorsent://SD_ILS/0/SD_ILS:284842025-04-30T09:22:00Z2025-04-30T09:22:00Zby Vacca, John R.<br/>Table of contents <a href="http://www.loc.gov/catdir/toc/els051/2004063211.html">http://www.loc.gov/catdir/toc/els051/2004063211.html</a>
Publisher description <a href="http://www.loc.gov/catdir/description/els051/2004063211.html">http://www.loc.gov/catdir/description/els051/2004063211.html</a><br/>Format: Books<br/>Publication Date 2005<br/>The executive guide to information security : threats, challenges, and solutionsent://SD_ILS/0/SD_ILS:290222025-04-30T09:22:00Z2025-04-30T09:22:00Zby Egan, Mark.<br/>Format: Books<br/>Publication Date 2005<br/>Defending the digital frontier : practical security for managementent://SD_ILS/0/SD_ILS:294202025-04-30T09:22:00Z2025-04-30T09:22:00Zby Babiak, Jan.<br/>Format: Books<br/>Publication Date 2005<br/>International e-Conference on Computer Science 2005ent://SD_ILS/0/SD_ILS:310882025-04-30T09:22:00Z2025-04-30T09:22:00Zby International e-Conference on Computer Science (2005)<br/>Format: Books<br/>Publication Date 2005<br/>Computer forensics jumpstartent://SD_ILS/0/SD_ILS:364522025-04-30T09:22:00Z2025-04-30T09:22:00Zby Solomon, Michael (Michael G.), 1963-<br/>Contributor biographical information <a href="http://www.loc.gov/catdir/enhancements/fy0620/2004113397-b.html">http://www.loc.gov/catdir/enhancements/fy0620/2004113397-b.html</a>
Publisher description <a href="http://www.loc.gov/catdir/enhancements/fy0620/2004113397-d.html">http://www.loc.gov/catdir/enhancements/fy0620/2004113397-d.html</a>
Table of contents only <a href="http://www.loc.gov/catdir/enhancements/fy0620/2004113397-t.html">http://www.loc.gov/catdir/enhancements/fy0620/2004113397-t.html</a><br/>Format: Books<br/>Publication Date 2005<br/>Information security illuminatedent://SD_ILS/0/SD_ILS:434142025-04-30T09:22:00Z2025-04-30T09:22:00Zby Solomon, Michael (Michael G.), 1963-<br/>Format: Books<br/>Publication Date 2005<br/>The Tao of network security monitoring : beyond intrusion detectionent://SD_ILS/0/SD_ILS:100142025-04-30T09:22:00Z2025-04-30T09:22:00Zby Bejtlich, Richard.<br/>Safari Books Online <a href="http://proquest.safaribooksonline.com/0321246772">http://proquest.safaribooksonline.com/0321246772</a>
Table of contents <a href="http://catdir.loc.gov/catdir/toc/ecip0416/2004007857.html">http://catdir.loc.gov/catdir/toc/ecip0416/2004007857.html</a><br/>Format: Books<br/>Publication Date 2005<br/>Designing security for a Microsoft Windows Server 2003 Network (70-298)ent://SD_ILS/0/SD_ILS:100812025-04-30T09:22:00Z2025-04-30T09:22:00Zby Northrup, Tony, 1974-<br/>Format: Electronic Resources<br/>Publication Date 2005<br/>Microsoft official academic course : implementing and administering security in a Microsoft Windows Server 2003 network (70-299)ent://SD_ILS/0/SD_ILS:101762025-04-30T09:22:00Z2025-04-30T09:22:00Zby Zacker, Craig.<br/>Format: Books<br/>Publication Date 2005<br/>Security+ guide to network security fundamentalsent://SD_ILS/0/SD_ILS:121982025-04-30T09:22:00Z2025-04-30T09:22:00Zby Ciampa, Mark D.<br/>Format: Books<br/>Publication Date 2005<br/>MCSE guide to designing security for a microsoft Windows server 2003 networkent://SD_ILS/0/SD_ILS:171032025-04-30T09:22:00Z2025-04-30T09:22:00Zby Khnaser, Elias N.<br/>Format: Electronic Resources<br/>Publication Date 2005<br/>MCSA/MCSE self-paced training kit (exam 70-299) : implementing and administering security in a Microsoft Windows Server 2003 networkent://SD_ILS/0/SD_ILS:117242025-04-30T09:22:00Z2025-04-30T09:22:00Zby Northrup, Anthony.<br/>Safari Books Online <a href="http://proquest.safaribooksonline.com/073562061X">http://proquest.safaribooksonline.com/073562061X</a><br/>Format: Electronic Resources<br/>Publication Date 2004<br/>MCSE self-paced training kit (exam 70-298) : designing security for a Microsoft Windows Server 2003 networkent://SD_ILS/0/SD_ILS:117252025-04-30T09:22:00Z2025-04-30T09:22:00Zby Bragg, Roberta.<br/>Safari Books Online <a href="http://proquest.safaribooksonline.com/0735619697">http://proquest.safaribooksonline.com/0735619697</a><br/>Format: Electronic Resources<br/>Publication Date 2004<br/>Digital fortressent://SD_ILS/0/SD_ILS:117632025-04-30T09:22:00Z2025-04-30T09:22:00Zby Brown, Dan, 1964-<br/>Format: Books<br/>Publication Date 2004<br/>Security+ : study guideent://SD_ILS/0/SD_ILS:182332025-04-30T09:22:00Z2025-04-30T09:22:00Zby Pastore, Michael A.<br/>Table of contents <a href="http://catdir.loc.gov/catdir/enhancements/fy0619/2004104231-t.html">http://catdir.loc.gov/catdir/enhancements/fy0619/2004104231-t.html</a>
Contributor biographical information <a href="http://catdir.loc.gov/catdir/enhancements/fy0619/2004104231-b.html">http://catdir.loc.gov/catdir/enhancements/fy0619/2004104231-b.html</a>
Publisher description <a href="http://catdir.loc.gov/catdir/enhancements/fy0619/2004104231-d.html">http://catdir.loc.gov/catdir/enhancements/fy0619/2004104231-d.html</a><br/>Format: Books<br/>Publication Date 2004<br/>Software forensics : collecting evidence from the scene of a digital crimeent://SD_ILS/0/SD_ILS:285102025-04-30T09:22:00Z2025-04-30T09:22:00Zby Slade, Robert M.<br/>Publisher description <a href="http://www.loc.gov/catdir/description/mh041/2003070176.html">http://www.loc.gov/catdir/description/mh041/2003070176.html</a>
Contributor biographical information <a href="http://www.loc.gov/catdir/bios/mh042/2003070176.html">http://www.loc.gov/catdir/bios/mh042/2003070176.html</a>
Table of contents <a href="http://www.loc.gov/catdir/toc/mh041/2003070176.html">http://www.loc.gov/catdir/toc/mh041/2003070176.html</a><br/>Format: Books<br/>Publication Date 2004<br/>Security for mobilityent://SD_ILS/0/SD_ILS:282022025-04-30T09:22:00Z2025-04-30T09:22:00Zby Mitchell, Chris, 1953-<br/>Format: Books<br/>Publication Date 2004<br/>The disaster recovery handbook : a step-by-step plan to ensure business continuity and protect vital operations, facilities, and assetsent://SD_ILS/0/SD_ILS:291662025-04-30T09:22:00Z2025-04-30T09:22:00Zby Wallace, Michael, 1960-<br/>Table of contents <a href="http://www.loc.gov/catdir/toc/ecip0415/2004003905.html">http://www.loc.gov/catdir/toc/ecip0415/2004003905.html</a><br/>Format: Books<br/>Publication Date 2004<br/>Guide to firewalls and network security : with intrusion detection and VPNsent://SD_ILS/0/SD_ILS:384322025-04-30T09:22:00Z2025-04-30T09:22:00Zby Holden, Greg.<br/>Format: Books<br/>Publication Date 2004<br/>Administrative assistant's & secretary's handbookent://SD_ILS/0/SD_ILS:98672025-04-30T09:22:00Z2025-04-30T09:22:00Zby Stroman, James.<br/>Ebook Library <a href="http://public.eblib.com/choice/publicfullrecord.aspx?p=242987">http://public.eblib.com/choice/publicfullrecord.aspx?p=242987</a>
ebrary <a href="http://site.ebrary.com/id/10044975">http://site.ebrary.com/id/10044975</a>
EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=100160">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=100160</a>
Safari Books Online <a href="http://proquest.safaribooksonline.com/0814407846">http://proquest.safaribooksonline.com/0814407846</a>
Safari Books Online <a href="http://proquest.safaribooksonline.com/640">http://proquest.safaribooksonline.com/640</a> <a href="http://proquest.safaribooksonline.com/?uicode=simonfraser&xmlid=0814407846">http://proquest.safaribooksonline.com/?uicode=simonfraser&xmlid=0814407846</a><br/>Format: Electronic Resources<br/>Publication Date 2004<br/>Management of information technologyent://SD_ILS/0/SD_ILS:158832025-04-30T09:22:00Z2025-04-30T09:22:00Zby Frenzel, Carroll W.<br/>Format: Books<br/>Publication Date 2004<br/>MCSE self-paced training kit (exam 70-298) : designing security for a Microsoft Windows Server 2003 networkent://SD_ILS/0/SD_ILS:170982025-04-30T09:22:00Z2025-04-30T09:22:00Zby Bragg, Roberta.<br/>Table of contents <a href="http://catdir.loc.gov/catdir/enhancements/fy1009/2003065183-t.html">http://catdir.loc.gov/catdir/enhancements/fy1009/2003065183-t.html</a>
Contributor biographical information <a href="http://catdir.loc.gov/catdir/enhancements/fy1004/2003065183-b.html">http://catdir.loc.gov/catdir/enhancements/fy1004/2003065183-b.html</a>
Publisher description <a href="http://catdir.loc.gov/catdir/enhancements/fy1004/2003065183-d.html">http://catdir.loc.gov/catdir/enhancements/fy1004/2003065183-d.html</a><br/>Format: Books<br/>Publication Date 2004<br/>Network security foundationsent://SD_ILS/0/SD_ILS:224992025-04-30T09:22:00Z2025-04-30T09:22:00Zby Strebe, Matthew.<br/>04 <a href="http://www.gbv.de/dms/hebis-darmstadt/toc/125038879.pdf">lizenzfrei</a>
Table of contents <a href="http://catdir.loc.gov/catdir/enhancements/fy0619/2004109315-t.html">http://catdir.loc.gov/catdir/enhancements/fy0619/2004109315-t.html</a>
Table of contents <a href="http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&doc_number=018737839&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&doc_number=018737839&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</a>
Contributor biographical information <a href="http://catdir.loc.gov/catdir/enhancements/fy0619/2004109315-b.html">http://catdir.loc.gov/catdir/enhancements/fy0619/2004109315-b.html</a>
Publisher description <a href="http://catdir.loc.gov/catdir/enhancements/fy0619/2004109315-d.html">http://catdir.loc.gov/catdir/enhancements/fy0619/2004109315-d.html</a><br/>Format: Books<br/>Publication Date 2004<br/>Computers in your future 2003ent://SD_ILS/0/SD_ILS:118692025-04-30T09:22:00Z2025-04-30T09:22:00Zby Pfaffenberger, Bryan, 1949-<br/>Format: Books<br/>Publication Date 2003<br/>SQL server securityent://SD_ILS/0/SD_ILS:160122025-04-30T09:22:00Z2025-04-30T09:22:00Zby Andrews, Chip.<br/>Table of contents <a href="http://catdir.loc.gov/catdir/toc/mh051/2004351704.html">http://catdir.loc.gov/catdir/toc/mh051/2004351704.html</a>
Contributor biographical information <a href="http://catdir.loc.gov/catdir/bios/mh051/2004351704.html">http://catdir.loc.gov/catdir/bios/mh051/2004351704.html</a>
Publisher description <a href="http://catdir.loc.gov/catdir/description/mh051/2004351704.html">http://catdir.loc.gov/catdir/description/mh051/2004351704.html</a><br/>Format: Regular print<br/>Publication Date 2003<br/>Computer networking : a top-down approach featuring the Internetent://SD_ILS/0/SD_ILS:257772025-04-30T09:22:00Z2025-04-30T09:22:00Zby Kurose, James F.<br/>Format: Books<br/>Publication Date 2003<br/>Web services securityent://SD_ILS/0/SD_ILS:260832025-04-30T09:22:00Z2025-04-30T09:22:00Zby O'Neill, Mark.<br/>Format: Books<br/>Publication Date 2003<br/>Wireless hacksent://SD_ILS/0/SD_ILS:289222025-04-30T09:22:00Z2025-04-30T09:22:00Zby Flickenger, Rob.<br/>Format: Books<br/>Publication Date 2003<br/>Building open source network security tools : components and techniquesent://SD_ILS/0/SD_ILS:296732025-04-30T09:22:00Z2025-04-30T09:22:00Zby Schiffman, Mike.<br/>Table of contents <a href="http://www.loc.gov/catdir/toc/wiley031/2002011320.html">http://www.loc.gov/catdir/toc/wiley031/2002011320.html</a>
Publisher description <a href="http://www.loc.gov/catdir/description/wiley036/2002011320.html">http://www.loc.gov/catdir/description/wiley036/2002011320.html</a>
Contributor biographical information <a href="http://www.loc.gov/catdir/bios/wiley043/2002011320.html">http://www.loc.gov/catdir/bios/wiley043/2002011320.html</a><br/>Format: Regular print<br/>Publication Date 2003<br/>Network security : a practical guideent://SD_ILS/0/SD_ILS:343272025-04-30T09:22:00Z2025-04-30T09:22:00Zby Poole, Owen.<br/>Format: Books<br/>Publication Date 2003<br/>Information security management handbookent://SD_ILS/0/SD_ILS:277962025-04-30T09:22:00Z2025-04-30T09:22:00Zby Tipton, Harold F.<br/>Format: Books<br/>Publication Date 2003<br/>Security in computingent://SD_ILS/0/SD_ILS:279812025-04-30T09:22:00Z2025-04-30T09:22:00Zby Pfleeger, Charles P., 1948-<br/>Format: Books<br/>Publication Date 2003<br/>Computer networking : a top-down approach featuring the Internetent://SD_ILS/0/SD_ILS:280402025-04-30T09:22:00Z2025-04-30T09:22:00Zby Kurose, James F.<br/>Format: Books<br/>Publication Date 2003<br/>Practical UNIX and Internet security.ent://SD_ILS/0/SD_ILS:315442025-04-30T09:22:00Z2025-04-30T09:22:00Zby Garfinkel, Simson.<br/>Format: Books<br/>Publication Date 2003<br/>Internet securityent://SD_ILS/0/SD_ILS:363712025-04-30T09:22:00Z2025-04-30T09:22:00Zby Holden, Greg.<br/>Format: Books<br/>Publication Date 2003<br/>Writing secure codeent://SD_ILS/0/SD_ILS:402502025-04-30T09:22:00Z2025-04-30T09:22:00Zby Howard, Michael, 1965-<br/>Format: Books<br/>Publication Date 2003<br/>PC disaster and recoveryent://SD_ILS/0/SD_ILS:103102025-04-30T09:22:00Z2025-04-30T09:22:00Zby Chase, Kate.<br/>Table of contents <a href="http://catdir.loc.gov/catdir/enhancements/fy0613/2002113567-t.html">http://catdir.loc.gov/catdir/enhancements/fy0613/2002113567-t.html</a>
Contributor biographical information <a href="http://catdir.loc.gov/catdir/enhancements/fy0613/2002113567-b.html">http://catdir.loc.gov/catdir/enhancements/fy0613/2002113567-b.html</a>
Publisher description <a href="http://catdir.loc.gov/catdir/enhancements/fy0613/2002113567-d.html">http://catdir.loc.gov/catdir/enhancements/fy0613/2002113567-d.html</a><br/>Format: Books<br/>Publication Date 2003<br/>Network security essentials : applications and standardsent://SD_ILS/0/SD_ILS:200802025-04-30T09:22:00Z2025-04-30T09:22:00Zby Stallings, William.<br/>Format: Books<br/>Publication Date 2003<br/>Mike Meyers' security + certification passportent://SD_ILS/0/SD_ILS:576452025-04-30T09:22:00Z2025-04-30T09:22:00Zby Kay, Trevor.<br/>Format: Books<br/>Publication Date 2003<br/>The hacker's handbook : the strategy behind breaking into and defending Networksent://SD_ILS/0/SD_ILS:584702025-04-30T09:22:00Z2025-04-30T09:22:00Zby Young, Susan (Susan Elizabeth), 1968-<br/>Format: Books<br/>Publication Date 2003<br/>Management information systems : managing information technology in the e-business enterpriseent://SD_ILS/0/SD_ILS:105912025-04-30T09:22:00Z2025-04-30T09:22:00Zby O'Brien, James A., 1936-<br/>Format: Books<br/>Publication Date 2002<br/>Networking complete.ent://SD_ILS/0/SD_ILS:182322025-04-30T09:22:00Z2025-04-30T09:22:00ZTable of contents <a href="http://catdir.loc.gov/catdir/enhancements/fy0613/2002108071-t.html">http://catdir.loc.gov/catdir/enhancements/fy0613/2002108071-t.html</a>
Publisher description <a href="http://catdir.loc.gov/catdir/enhancements/fy0613/2002108071-d.html">http://catdir.loc.gov/catdir/enhancements/fy0613/2002108071-d.html</a><br/>Format: Books<br/>Publication Date 2002<br/>Operating system conceptsent://SD_ILS/0/SD_ILS:224902025-04-30T09:22:00Z2025-04-30T09:22:00Zby Silberschatz, Abraham.<br/>Table of contents <a href="http://catdir.loc.gov/catdir/toc/wiley021/2001276306.html">http://catdir.loc.gov/catdir/toc/wiley021/2001276306.html</a>
Publisher description <a href="http://catdir.loc.gov/catdir/description/wiley035/2001276306.html">http://catdir.loc.gov/catdir/description/wiley035/2001276306.html</a>
The Alumni and Friends Memorial Book Fund Home Page <a href="http://hdl.library.upenn.edu/1017.12/366295">http://hdl.library.upenn.edu/1017.12/366295</a><br/>Format: Books<br/>Publication Date 2002<br/>Securing business information : strategies to protect the enterprise and its networkent://SD_ILS/0/SD_ILS:255432025-04-30T09:22:00Z2025-04-30T09:22:00Zby Byrnes, F. Christian.<br/>Format: Books<br/>Publication Date 2002<br/>Web security, privacy, and commerceent://SD_ILS/0/SD_ILS:346272025-04-30T09:22:00Z2025-04-30T09:22:00Zby Garfinkel, Simson.<br/>Format: Books<br/>Publication Date 2002<br/>Securing e-business systems : a guide for managers and executivesent://SD_ILS/0/SD_ILS:461222025-04-30T09:22:00Z2025-04-30T09:22:00Zby Braithwaite, Timothy, 1942-<br/>Format: Books<br/>Publication Date 2002<br/>Internet security made easy : a plain-English guide to protecting yourself and your company onlineent://SD_ILS/0/SD_ILS:122032025-04-30T09:22:00Z2025-04-30T09:22:00Zby Schweitzer, Douglas.<br/>Format: Books<br/>Publication Date 2002<br/>Computing essentials, 2002-2003ent://SD_ILS/0/SD_ILS:203442025-04-30T09:22:00Z2025-04-30T09:22:00Zby O'Leary, Timothy J., 1947-<br/>Format: Books<br/>Publication Date 2002<br/>E-business & e-commerce : how to programent://SD_ILS/0/SD_ILS:127282025-04-30T09:22:00Z2025-04-30T09:22:00Zby Deitel, Harvey M., 1945-<br/>Format: Books<br/>Publication Date 2001<br/>Operating systems : internals and design principlesent://SD_ILS/0/SD_ILS:139302025-04-30T09:22:00Z2025-04-30T09:22:00Zby Stallings, William.<br/>Format: Books<br/>Publication Date 2001<br/>The essential guide to computingent://SD_ILS/0/SD_ILS:139602025-04-30T09:22:00Z2025-04-30T09:22:00Zby Walters, E. Garrison.<br/>Format: Books<br/>Publication Date 2001<br/>Planning for PKI : best practices guide for deploying public key infrastructureent://SD_ILS/0/SD_ILS:238892025-04-30T09:22:00Z2025-04-30T09:22:00Zby Housley, Russ, 1959-<br/>Format: Books<br/>Publication Date 2001<br/>An information security handbookent://SD_ILS/0/SD_ILS:240242025-04-30T09:22:00Z2025-04-30T09:22:00Zby Hunter, John M. D., 1940-<br/>Format: Books<br/>Publication Date 2001<br/>Maximum securityent://SD_ILS/0/SD_ILS:241512025-04-30T09:22:00Z2025-04-30T09:22:00ZFormat: Books<br/>Publication Date 2001<br/>Auditing and security : AS/400, NT, UNIX, networks, and disaster recovery plansent://SD_ILS/0/SD_ILS:241642025-04-30T09:22:00Z2025-04-30T09:22:00Zby Musaji, Yusufali F.<br/>Format: Books<br/>Publication Date 2001<br/>Cryptography and e-commerce : a Wiley tech briefent://SD_ILS/0/SD_ILS:242862025-04-30T09:22:00Z2025-04-30T09:22:00Zby Graff, Jon.<br/>Format: Books<br/>Publication Date 2001<br/>Internet trust and security : the way aheadent://SD_ILS/0/SD_ILS:244782025-04-30T09:22:00Z2025-04-30T09:22:00Zby Essinger, James.<br/>Format: Books<br/>Publication Date 2001<br/>Security transformation : digital defense strategies to protect your company's reputation and market shareent://SD_ILS/0/SD_ILS:245552025-04-30T09:22:00Z2025-04-30T09:22:00Zby McCarthy, Mary Pat.<br/>Format: Books<br/>Publication Date 2001<br/>Information security policies, procedures, and standards : guidelines for effective information security managementent://SD_ILS/0/SD_ILS:249352025-04-30T09:22:00Z2025-04-30T09:22:00Zby Peltier, Thomas R.<br/>Format: Books<br/>Publication Date 2001<br/>Security engineering : a guide to building dependable distributed systemsent://SD_ILS/0/SD_ILS:315432025-04-30T09:22:00Z2025-04-30T09:22:00Zby Anderson, Ross, 1956-<br/>Format: Books<br/>Publication Date 2001<br/>Accounting information systemsent://SD_ILS/0/SD_ILS:99102025-04-30T09:22:00Z2025-04-30T09:22:00Zby Bodnar, George H.<br/>Format: Books<br/>Publication Date 2001<br/>Active defense : a comprehensive guide to network securityent://SD_ILS/0/SD_ILS:98572025-04-30T09:22:00Z2025-04-30T09:22:00Zby Brenton, Chris.<br/><a href="http://www.contentreserve.com/TitleInfo.asp?ID={C0E06398-F64D-4C14-BAA2-D2ADC889DA37}&Format=50">Click for information</a>
Books24x7 <a href="http://www.books24x7.com/marc.asp?isbn=0782129161">http://www.books24x7.com/marc.asp?isbn=0782129161</a>
Books24x7 <a href="http://www.books24x7.com/marc.asp?bookid=2782">http://www.books24x7.com/marc.asp?bookid=2782</a>
ebrary <a href="http://site.ebrary.com/id/10304303">http://site.ebrary.com/id/10304303</a>
EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=92925">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=92925</a><br/>Format: Electronic Resources<br/>Publication Date 2001<br/>MCSE training kit : designing Microsoft Windows 2000 network securityent://SD_ILS/0/SD_ILS:131062025-04-30T09:22:00Z2025-04-30T09:22:00Zby Microsoft Corporation.<br/>Contributor biographical information <a href="http://catdir.loc.gov/catdir/enhancements/fy1210/00053301-b.html">http://catdir.loc.gov/catdir/enhancements/fy1210/00053301-b.html</a>
Publisher description <a href="http://catdir.loc.gov/catdir/enhancements/fy1004/00053301-d.html">http://catdir.loc.gov/catdir/enhancements/fy1004/00053301-d.html</a><br/>Format: Books<br/>Publication Date 2001<br/>Understanding operating systemsent://SD_ILS/0/SD_ILS:133642025-04-30T09:22:00Z2025-04-30T09:22:00Zby Flynn, Ida M., 1942-<br/>Table of contents <a href="http://catdir.loc.gov/catdir/enhancements/fy1514/00058564-t.html">http://catdir.loc.gov/catdir/enhancements/fy1514/00058564-t.html</a>
Contributor biographical information <a href="http://catdir.loc.gov/catdir/enhancements/fy1514/00058564-b.html">http://catdir.loc.gov/catdir/enhancements/fy1514/00058564-b.html</a>
Publisher description <a href="http://catdir.loc.gov/catdir/enhancements/fy1514/00058564-d.html">http://catdir.loc.gov/catdir/enhancements/fy1514/00058564-d.html</a><br/>Format: Books<br/>Publication Date 2001<br/>Internet marketingent://SD_ILS/0/SD_ILS:135692025-04-30T09:22:00Z2025-04-30T09:22:00Zby Hofacker, Charles F.<br/><a href="http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=009264113&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA">Inhaltsverzeichnis</a>
Table of contents <a href="http://catdir.loc.gov/catdir/toc/onix06/00036498.html">http://catdir.loc.gov/catdir/toc/onix06/00036498.html</a>
Table of contents <a href="http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&doc_number=009264113&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&doc_number=009264113&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</a>
Publisher description <a href="http://catdir.loc.gov/catdir/description/wiley035/00036498.html">http://catdir.loc.gov/catdir/description/wiley035/00036498.html</a>
Cover <a href="http://swbplus.bsz-bw.de/bsz08739104xcov.htm">http://swbplus.bsz-bw.de/bsz08739104xcov.htm</a><br/>Format: Books<br/>Publication Date 2001<br/>Readings in cyberethicsent://SD_ILS/0/SD_ILS:169392025-04-30T09:22:00Z2025-04-30T09:22:00Zby Spinello, Richard A.<br/>Format: Books<br/>Publication Date 2001<br/>Electronic government and electronic signaturesent://SD_ILS/0/SD_ILS:243842025-04-30T09:22:00Z2025-04-30T09:22:00Zby Relyea, Harold.<br/>Format: Books<br/>Publication Date 2000<br/>Secure electronic commerce : building the infrastructure for digital signatures and encryptionent://SD_ILS/0/SD_ILS:263242025-04-30T09:22:00Z2025-04-30T09:22:00Zby Ford, Warwick.<br/>Format: Books<br/>Publication Date 2000<br/>Secrets and lies : digital security in a networked worldent://SD_ILS/0/SD_ILS:141712025-04-30T09:22:00Z2025-04-30T09:22:00Zby Schneier, Bruce, 1963-<br/>Table of contents <a href="http://www.gbv.de/dms/ilmenau/toc/314774726.PDF">Kostenfrei</a>
Table of contents <a href="http://catdir.loc.gov/catdir/toc/onix04/00042252.html">http://catdir.loc.gov/catdir/toc/onix04/00042252.html</a>
Contributor biographical information <a href="http://catdir.loc.gov/catdir/enhancements/fy0705/00042252-b.html">http://catdir.loc.gov/catdir/enhancements/fy0705/00042252-b.html</a>
Publisher description <a href="http://catdir.loc.gov/catdir/description/wiley0310/00042252.html">http://catdir.loc.gov/catdir/description/wiley0310/00042252.html</a><br/>Format: Books<br/>Publication Date 2000<br/>Data and computer communicationsent://SD_ILS/0/SD_ILS:142212025-04-30T09:22:00Z2025-04-30T09:22:00Zby Stallings, William.<br/>Table of contents <a href="http://www3.ub.tu-berlin.de/ihv/000740460.pdf">http://www3.ub.tu-berlin.de/ihv/000740460.pdf</a><br/>Format: Books<br/>Publication Date 2000<br/>Operating system conceptsent://SD_ILS/0/SD_ILS:234582025-04-30T09:22:00Z2025-04-30T09:22:00Zby Silberschatz, Abraham.<br/>Format: Books<br/>Publication Date 1999<br/>Net spies : who's watching you on the Web?ent://SD_ILS/0/SD_ILS:137842025-04-30T09:22:00Z2025-04-30T09:22:00Zby Gauntlett, Andrew.<br/>Format: Books<br/>Publication Date 1999<br/>Management information systems : managing information technology in the internetworked enterpriseent://SD_ILS/0/SD_ILS:148392025-04-30T09:22:00Z2025-04-30T09:22:00Zby O'Brien, James A., 1936-<br/>Format: Books<br/>Publication Date 1999<br/>Security technologies for the World Wide Webent://SD_ILS/0/SD_ILS:232632025-04-30T09:22:00Z2025-04-30T09:22:00Zby Oppliger, Rolf.<br/>Format: Books<br/>Publication Date 1999<br/>Operating system conceptsent://SD_ILS/0/SD_ILS:234182025-04-30T09:22:00Z2025-04-30T09:22:00Zby Silberschatz, Abraham.<br/>Format: Books<br/>Publication Date 1998<br/>Operating systems : internals and design principlesent://SD_ILS/0/SD_ILS:104162025-04-30T09:22:00Z2025-04-30T09:22:00Zby Stallings, William.<br/>Format: Books<br/>Publication Date 1998<br/>Management information systems : the manager's viewent://SD_ILS/0/SD_ILS:197762025-04-30T09:22:00Z2025-04-30T09:22:00Zby Schultheis, Robert A.<br/>Table of contents <a href="http://catdir.loc.gov/catdir/toc/mh022/97025011.html">http://catdir.loc.gov/catdir/toc/mh022/97025011.html</a>
Publisher description <a href="http://catdir.loc.gov/catdir/description/mh023/97025011.html">http://catdir.loc.gov/catdir/description/mh023/97025011.html</a><br/>Format: Books<br/>Publication Date 1998<br/>Security in computingent://SD_ILS/0/SD_ILS:252272025-04-30T09:22:00Z2025-04-30T09:22:00Zby Pfleeger, Charles P., 1948-<br/>Format: Books<br/>Publication Date 1997<br/>Introduction to information systemsent://SD_ILS/0/SD_ILS:207592025-04-30T09:22:00Z2025-04-30T09:22:00Zby O'Brien, James A., 1936-<br/>Table of contents <a href="http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&doc_number=007578393&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&doc_number=007578393&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</a><br/>Format: Books<br/>Publication Date 1997<br/>Dictionary of computing.ent://SD_ILS/0/SD_ILS:230762025-04-30T09:22:00Z2025-04-30T09:22:00Zby Illingworth, Valerie.<br/>Format: Books<br/>Publication Date 1996<br/>Computers, ethics &amp; social valuesent://SD_ILS/0/SD_ILS:263112025-04-30T09:22:00Z2025-04-30T09:22:00Zby Johnson, Deborah G., 1945-<br/>Format: Books<br/>Publication Date 1995<br/>Introduction to information systemsent://SD_ILS/0/SD_ILS:148762025-04-30T09:22:00Z2025-04-30T09:22:00Zby O'Brien, James A., 1936-<br/>Format: Books<br/>Publication Date 1994 1993<br/>