Your search returned 71 results.

Sort
Results
41.
Conquest in cyberspace : national security and information warfare by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Cambridge: Cambridge University Press, 2007
Availability: Items available for loan: ACL (1)Call number: 355.3/43 LIB.

42.
Configuring IPCOP Firewalls: closing borders with open source by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi: SPD, 2006
Availability: Items available for loan: ACL (1)Call number: 005.8 DEM.

43.
Corporate computer and network security by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Upper Saddle River, NJ: Pearson Prentice Hall, 9999
Availability: Items available for loan: ACL (1)Call number: 005.8 PAN.

44.
Counter hack reloaded : a step-by-step guide to computer attacks and effective defenses by
Edition: 2nd ed
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Upper Saddle River, N.J: Prentice Hall Professional Technical Reference, 2006
Availability: Items available for loan: ACL (1)Call number: 005.8 SKO.

45.
Cyber-security and global information assurance : threat analysis and response solutions by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Hershey, PA: Information Science Reference, 2009
Availability: Items available for loan: ACL (1)Call number: 005.8 KNA.

46.
Cyber security : economic strategies and public policy alternatives by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Cheltenham, UK ; Northampton, MA: Edward Elgar, 2008
Availability: Items available for loan: ACL (1)Call number: 005.8 GAL.

47.
CYA securing IIS 6. 0: cover your A [star] [star] by getting it right the first time by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Rockland, MA: Syngress, 2004
Availability: Items available for loan: ACL (1)Call number: 005.8 CHE.

48.
CWSP guide to wireless security by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Boston: Thomson Course Technology, 2007
Availability: Items available for loan: ACL (1)Call number: 005.8 CIA.

49.
Data networks : routing, security, and performance optimization by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Boston: Digital Press, 2002
Availability: Items available for loan: ACL (1)Call number: 004.6 KEN.

50.
Data mining tools for malware detection by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Boca Raton, FL: CRC Press, 2012
Availability: Items available for loan: ACL (1)Call number: 005.8 MAS.

51.
Designing security for a Microsoft Windows 2000 network : exam 70-220 by
Edition: 1st ed
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Upper Saddle River, N.J: Pearson/Prentice Hall, 2004
Availability: Items available for loan: ACL (1)Call number: 005.4476 BRA.

52.
Designing privacy enhancing technologies : international workshop on design issues in anonymity and unobservability, Berkeley, CA, USA, July 25-26, 2000 : proceedings by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Berlin: Springer, 2001
Availability: Items available for loan: ACL (1)Call number: QA76.9.A25 I563 2000 005.8.

53.
Designing network security by
Edition: 2nd ed
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Indianapolis, IN: Cisco Press, 2004
Availability: Items available for loan: ACL (1)Call number: 005.8 KAE.

54.
Designing an IAM framework with Oracle identity and access management suite by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New York: Oracle/McGraw-Hill, 2010
Availability: Items available for loan: ACL (1)Call number: 005.8 SCH.

55.
Digital defense : what you should know about protecting your company's assets by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Boston: Harvard Business School, 2003
Availability: Items available for loan: ACL (1)Call number: 658.478 PAR.

56.
Digital privacy : theory, technologies, and practices by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New York: Auerbach Publications, 2008
Availability: Items available for loan: ACL (1)Call number: 005.8 ACQ.

57.
Digital identity by
Edition: 1st ed
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Sebastopol, CA: O'Reilly, 2005
Availability: Items available for loan: ACL (1)Call number: 005.8 WIN.

58.
Disseminating security updates at Internet scale by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Dordrecht ; Boston: Kluwer Academic Publishers, 2003
Availability: Items available for loan: ACL (1)Call number: 005.8 LI.

59.
Distributed networks : intelligence, security, and applications by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Boca Raton, FL: CRC Press, Taylor & Francis Group, 2014
Availability: Items available for loan: ACL (1).

60.
E-commerce agents : marketplace solutions, security issues, and supply and demand by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Berlin: Springer, 2001
Availability: Items available for loan: ACL (1)Call number: 658.84 LIU.

Pages

Powered by Koha