Your search returned 234 results.

Sort
Results
121.
Contemporary security and strategy by
Edition: 2nd ed
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Houndmills, Basingstoke, Hampshire ; New York, N.Y: Palgrave Macmillan, 2008
Availability: Items available for loan: ACL (1)Call number: 327.116 SNY.

122.
Core security patterns : best practices and strategies for J2EE, Web services, and identity management by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Upper Saddle River, N.J: Prentice Hall PTR, 2006
Availability: Items available for loan: ACL (1)Call number: 005.8 STE.

123.
Corporate computer and network security by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Upper Saddle River, NJ: Pearson Prentice Hall, 9999
Availability: Items available for loan: ACL (1)Call number: 005.8 PAN.

124.
Counterterrorism strategies for corporations : the Ackerman principles by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Amherst, N.Y: Prometheus Books, 2008
Availability: Items available for loan: ACL (1)Call number: 658.477 ACK.

125.
Counterterrorism by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Cambridge ; Malden, MA: Polity, 2009
Availability: Items available for loan: ACL (1)Call number: 363.32517 CRE.

126.
Countering the proliferation and use of weapons of mass destruction by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New York: McGraw Hill, 1998
Availability: Items available for loan: ACL (1)Call number: 327.174 HAY.

127.
Counter hack reloaded : a step-by-step guide to computer attacks and effective defenses by
Edition: 2nd ed
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Upper Saddle River, N.J: Prentice Hall Professional Technical Reference, 2006
Availability: Items available for loan: ACL (1)Call number: 005.8 SKO.

128.
Crime and security : managing the risk to safe shopping by
Edition: 1st ed
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Basingstoke, Hampshire: Palgrave Macmillan, 1995
Availability: Items available for loan: ACL (1)Call number: 364.4 BEC.

129.
Creating the secure managed desktop : using group policy, SoftGrid, Microsoft deployment toolkit, and other management tools by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Indianapolis, IN: Wiley Pub, 2008
Availability: Items available for loan: ACL (1)Call number: 005.8 MOS.

130.
Critique of security by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Montreal: McGill-Queen's University Press, 2008
Availability: Items available for loan: ACL (1)Call number: 355/.03 NEO.

131.
Critical security studies and world politics by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Boulder, Colo: Lynne Rienner Publishers, 2005
Availability: Items available for loan: ACL (1)Call number: 355.033 BOO.

132.
Critical reflections on security and change by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: London ; Portland, OR: F. Cass, 2000
Availability: Items available for loan: ACL (1)Call number: 327.116 CRO.

133.
Critical methods in terrorism studies by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New York: Routledge, 2016
Availability: Items available for loan: ACL (1)Call number: 363.325 DIX.

134.
Critical infrastructures : state of the art in research and application by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Dordrecht ; Boston: Kluwer Academic Publishers, 2003
Availability: Items available for loan: ACL (1)Call number: 363 THI.

135.
Cryptanalysis of RSA and its variants by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Boca Raton, FL: CRC Press, 2010
Availability: Items available for loan: ACL (1)Call number: 005.8 HIN.

136.
Cryptanalysis of number theoretic ciphers by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Boca Raton, FL: CRC Press/Chapman & Hall, 2003
Availability: Items available for loan: ACL (1)Call number: 005.8 WAG.

137.
Cryptography, information theory, and error-correction : a handbook for the 21st century by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Hoboken, N.J: Wiley-Interscience, 2005
Availability: Items available for loan: ACL (1)Call number: QA76.9.A25 B79 2005 005.8.

138.
Cryptography decrypted by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Boston: Addison Wesley, 2001
Availability: Items available for loan: ACL (1)Call number: 005.82 MEL.

139.
Cryptography and public key infrastructure on the Internet by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Hoboken, N.J: Wiley, 2003
Availability: Items available for loan: ACL (1)Call number: 005.82 SCH.

140.
Curing the patch management headache by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Boca Raton, FL: Auerbach Publications, 2005
Availability: Items available for loan: ACL (1)Call number: 005.8 NIC.

Pages

Powered by Koha