Your search returned 78 results.

Sort
Results
21.
Building a global information assurance program by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Boca Raton, FL: Auerbach Publications, 2003
Availability: Items available for loan: ACL (1)Call number: 005.8 CUR.

22.
Business continuity : IT risk management for international corporations by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Berlin ; New York: Springer, 2002
Availability: Items available for loan: ACL (1)Call number: 658.478 WIE.

23.
Certification and security in E-services : from E-government to E-business : IFIP 17th world computer Congress, TC11 stream on security in E-services, August 26-29, 2002, Montréal, Québec, Canada by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Dordrecht ; Boston: Kluwer Academic Publishers, 2003
Availability: Items available for loan: ACL (1)Call number: 005.8 NAR.

24.
Check point NGX R65 security administration by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Rockland, Mass. ; Oxford: Elsevier Science [distributor], Syngress, 2008
Availability: Items available for loan: ACL (1)Call number: 005.8 BON.

25.
Check point NG: next generation security administration by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Rockland, MA: Syngress Publishing, 2002
Availability: Items available for loan: ACL (1)Call number: 005.8 SIM.

26.
Cisco security professionals: guide to secure intrusion detection systems by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Rockland, MA: Syngress Publishing, 2009
Availability: Items available for loan: ACL (1)Call number: 005.8 BUR.

27.
Complete guide to CISM certification by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Boca Raton, FL: Auerbach Publications, 2007
Availability: Items available for loan: ACL (1)Call number: 005.8068 PEL.

28.
CompTIA security+ 2008 in depth by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Australia: Course Technology, 2009
Availability: Items available for loan: ACL (1)Call number: 005.8 CIA.

29.
Composition of secure multi-party protocols : a comprehensive study by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Berlin ; New York: Springer, 2003
Availability: Items available for loan: ACL (1)Call number: 004.62 LIN.

30.
Computers, ethics, and society by
Edition: 3rd ed
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Oxford: Oxford University Press, 2003
Availability: Items available for loan: ACL (1)Call number: 303.4834 ERM.

31.
Computer system security: basic concepts and solved exercises by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Dedham, Mass: Artech House, 2007
Availability: Items available for loan: ACL (1)Call number: 005.8 AVO.

32.
Computer security : art and science by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Upper Saddle River, NJ: Addison Wesley, 2003
Availability: Items available for loan: ACL (1)Call number: 005.8 BIS.

33.
Computer security : 20 things every employee should know by
Edition: 2nd ed
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New York: McGraw-Hill, 2005
Availability: Items available for loan: ACL (1)Call number: 005.8 BEN.

34.
Configuring Netscreen firewalls by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Rockland, MA: Syngress, 2005
Availability: Items available for loan: ACL (1)Call number: 005.8 CAM.

35.
Core security patterns : best practices and strategies for J2EE, Web services, and identity management by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Upper Saddle River, N.J: Prentice Hall PTR, 2006
Availability: Items available for loan: ACL (1)Call number: 005.8 STE.

36.
Creating the secure managed desktop : using group policy, SoftGrid, Microsoft deployment toolkit, and other management tools by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Indianapolis, IN: Wiley Pub, 2008
Availability: Items available for loan: ACL (1)Call number: 005.8 MOS.

37.
Critical infrastructures : state of the art in research and application by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Dordrecht ; Boston: Kluwer Academic Publishers, 2003
Availability: Items available for loan: ACL (1)Call number: 363 THI.

38.
Cryptanalysis of RSA and its variants by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Boca Raton, FL: CRC Press, 2010
Availability: Items available for loan: ACL (1)Call number: 005.8 HIN.

39.
Cryptanalysis of number theoretic ciphers by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Boca Raton, FL: CRC Press/Chapman & Hall, 2003
Availability: Items available for loan: ACL (1)Call number: 005.8 WAG.

40.
Cryptography, information theory, and error-correction : a handbook for the 21st century by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Hoboken, N.J: Wiley-Interscience, 2005
Availability: Items available for loan: ACL (1)Call number: QA76.9.A25 B79 2005 005.8.

Pages

Powered by Koha