Your search returned 234 results.

Sort
Results
141.
Cyber-security and global information assurance : threat analysis and response solutions by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Hershey, PA: Information Science Reference, 2009
Availability: Items available for loan: ACL (1)Call number: 005.8 KNA.

142.
Cyber-development, cyber-democracy and cyber-defense : challenges, opportunities and implications for theory, policy and practice by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Berlin ; New York: Springer, 2014
Availability: Items available for loan: ACL (1)Call number: 303.4833 CAR.

143.
Cyber security, situation management, and impact assessment II and visual analytics for homeland defense and security II : 5 and 8-9 April 2010, Orlando, Florida, United States by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Bellingham, Wash: SPIE, 2010
Availability: Items available for loan: ACL (1)Call number: 005.8 BUF.

144.
Cyber security : economic strategies and public policy alternatives by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Cheltenham, UK ; Northampton, MA: Edward Elgar, 2008
Availability: Items available for loan: ACL (1)Call number: 005.8 GAL.

145.
Cyber crime and digital evidence by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: London, 2015
Availability: Items available for loan: ACL (1)Call number: 345.730268 TUM.

146.
Cyber adversary characterization: auditing the hacker mind by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Rockland, MA: Syngress Publishing, 2004
Availability: Items available for loan: ACL (1)Call number: 005.8 PAR.

147.
CYA securing IIS 6. 0: cover your A [star] [star] by getting it right the first time by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Rockland, MA: Syngress, 2004
Availability: Items available for loan: ACL (1)Call number: 005.8 CHE.

148.
CWSP guide to wireless security by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Boston: Thomson Course Technology, 2007
Availability: Items available for loan: ACL (1)Call number: 005.8 CIA.

149.
Daring and caution in Turkish strategic culture : republic at sea by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Basingstoke, Hampshire: Palgrave Macmillan, 2009
Availability: Items available for loan: ACL (1)Call number: 355/.0335561 MUF.

150.
Database security, volume X : status and prospects by
Edition: 1st ed
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: London: Chapman & Hall on behalf of the International Federation for Information Processing, 1997
Availability: Items available for loan: ACL (1)Call number: 005.8 SAM.

151.
Database security XII : status and prospects : IFIP TC11 WG11.3 twelfth international working conference on database security, July 15-17, 1998, Chalkidiki, Greece by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Boston, MA: Kluwer Academic Publishers, 1999
Availability: Items available for loan: ACL (1)Call number: 005.8 JAJ.

152.
Database security XI : status and prospects : IFIP TC11 WG11.3 eleventh international conference on database security, 10-13 August 1997, Lake Tahoe, California, USA by
Edition: 1st ed
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: London: Chapman & Hall on behalf of the International Federation for Information Processing, 1998
Availability: Items available for loan: ACL (1)Call number: 005.8 LIN.

153.
Database security IX : status and prospects : proceedings of the ninth annual IFIP TC11 workshop conference on database security, August 1995 by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: London: Chapman and Hall, 1996
Availability: Items available for loan: ACL (1)Call number: 005.8 SPO.

154.
Database security & auditing by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Australia: [publisher not identified], 2007
Availability: Items available for loan: ACL (1)Call number: 005.8 AFY.

155.
Database and application security XV : IFIP TC11/WG11.3 fifteenth annual working conference on database and application security, July 15-18, 2001, Niagara on the Lake, Ontario, Canada by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Boston, MA: Kluwer Academic Publishers, 2002
Availability: Items available for loan: ACL (1)Call number: 005.8 OLI.

156.
Data protection and information lifecycle management by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Upper Saddle River, NJ: Prentice Hall Professional Technical Reference, 2006
Availability: Items available for loan: ACL (1)Call number: 005.8 PET.

157.
Data protection : governance, risk management, and compliance by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Baca Raton, FL: Taylor & Francis, 2009
Availability: Items available for loan: ACL (1)Call number: 005.86 HIL.

158.
Data privacy and security by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Berlin: Springer, 2003
Availability: Items available for loan: ACL (1)Call number: 005.8 SAL.

159.
Data networks : routing, security, and performance optimization by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Boston: Digital Press, 2002
Availability: Items available for loan: ACL (1)Call number: 004.6 KEN.

160.
Data mining tools for malware detection by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Boca Raton, FL: CRC Press, 2012
Availability: Items available for loan: ACL (1)Call number: 005.8 MAS.

Pages

Powered by Koha