Your search returned 234 results.

Sort
Results
161.
Data leaks for dummies(r) by
Edition: 1st ed
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Hoboken, NJ: Wiley Pub, 2009
Availability: Items available for loan: ACL (1)Call number: 005.8 BUN.

162.
Debating national security : the public dimension by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Bern: Peter Lang, 1991
Availability: Items available for loan: ACL (1)Call number: 355.03 RAT.

163.
Defending Taiwan : the future vision of Taiwan's defence policy and military strategy by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: London ; New York: RoutledgeCurzon, 2003
Availability: Items available for loan: ACL (1)Call number: 355.033051249 EDM.

164.
Defeating the hacker : a non-technical guide to computer security by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Hoboken, NJ: Wiley, 2006
Availability: Items available for loan: ACL (1)Call number: 005.8 SCH.

165.
Decrypted secrets : methods and maxims of cryptology by
Edition: 3rd, rev. and updated ed
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Berlin: Springer, 2002
Availability: Items available for loan: ACL (1)Call number: 005.8 BAU.

166.
Designing security for a Microsoft Windows 2000 network : exam 70-220 by
Edition: 1st ed
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Upper Saddle River, N.J: Pearson/Prentice Hall, 2004
Availability: Items available for loan: ACL (1)Call number: 005.4476 BRA.

167.
Designing security architecture solutions by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Hoboken, NJ: John Wiley, 2002
Availability: Items available for loan: ACL (1)Call number: 005.8 RAM.

168.
Designing privacy enhancing technologies : international workshop on design issues in anonymity and unobservability, Berkeley, CA, USA, July 25-26, 2000 : proceedings by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Berlin: Springer, 2001
Availability: Items available for loan: ACL (1)Call number: QA76.9.A25 I563 2000 005.8.

169.
Designing network security by
Edition: 2nd ed
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Indianapolis, IN: Cisco Press, 2004
Availability: Items available for loan: ACL (1)Call number: 005.8 KAE.

170.
Designing an IAM framework with Oracle identity and access management suite by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New York: Oracle/McGraw-Hill, 2010
Availability: Items available for loan: ACL (1)Call number: 005.8 SCH.

171.
Developing secure software by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Australia: Cengage Learning, 2008
Availability: Items available for loan: ACL (1)Call number: 005.1 GRE.

172.
Digital defense : what you should know about protecting your company's assets by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Boston: Harvard Business School, 2003
Availability: Items available for loan: ACL (1)Call number: 658.478 PAR.

173.
Digital watermarking for digital media by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Hershey, PA: Information Science Pub, 2005
Availability: Items available for loan: ACL (1)Call number: 005.82 SEI.

174.
Digital watermarking and steganography : fundamentals and techniques by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Baca Raton, FL: Taylor & Francis, 2008
Availability: Items available for loan: ACL (1)Call number: 005.8 SHI.

175.
Digital watermarking and steganography by
Edition: 2nd ed
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Amsterdam ; Boston: Morgan Kaufmann Publishers, 2008
Availability: Items available for loan: ACL (1)Call number: 005.8 COX.

176.
Digital signature schemes : general framework and fail-stop signatures by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Berlin: Springer, 1996
Availability: Items available for loan: ACL (1)Call number: 005.82 PFI.

177.
Digital rights management for e-commerce systems by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Hershey, PA: Information Science Reference, 2009
Availability: Items available for loan: ACL (1)Call number: 005.8 TSO.

178.
Digital rights management : technological, economic, legal and political aspects by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Berlin: Springer, 2003
Availability: Items available for loan: ACL (1)Call number: 005.8 BEC.

179.
Digital privacy : theory, technologies, and practices by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New York: Auerbach Publications, 2008
Availability: Items available for loan: ACL (1)Call number: 005.8 ACQ.

180.
Digital identity by
Edition: 1st ed
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Sebastopol, CA: O'Reilly, 2005
Availability: Items available for loan: ACL (1)Call number: 005.8 WIN.

Pages

Powered by Koha