Your search returned 234 results.

Sort
Results
41.
AVIEN malware defense guide for the enterprise by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Rockland, MA: Syngress, 2007
Availability: No items available.

42.
Aviation terrorism and security by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: London ; Portland, OR: Frank Cass, 1999
Availability: No items available.

43.
Basic methods of cryptography by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Cambridge: Cambridge University Press, 1998
Availability: No items available.

44.
Beautiful security by
Edition: 1st ed
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Sebastopol, CA: O'Reilly, 2009
Availability: No items available.

45.
Beginning cryptography with Java by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Indianapolis, IN: Wiley Pub, 2005
Availability: No items available.

46.
Best damn firewall book period by
Edition: 2nd ed
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Burlington, MA ; Oxford: Elsevier Science [distributor], Syngress, 2007
Availability: No items available.

47.
Bignum math implementing cryptographic multiple precision arithmetic by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Rockland, MA: Syngress Pub, 2006
Availability: No items available.

48.
Blackjacking : security threats to blackberry devices, PDAs, and cell phones in the enterprise by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Indianapolis, IN: Wiley Pub, 2007
Availability: No items available.

49.
Black hat physical device security: exploiting hardware and software by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Rockland, MA: Syngress Publishing, Inc, 2005
Availability: No items available.

50.
Border security in the Balkans: Europe gatekeepers by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New York: Routledge, 2004
Availability: No items available.

51.
Britain, Ost- and Deutschlandpolitik, and the CSCE, 1955-1975 by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Bern: Peter Lang, 2008
Availability: No items available.

52.
Buffer overflow attacks : detect, exploit, prevent by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Rockland, MA: Syngress Publishing, 2005
Availability: Items available for loan: ACL (1)Call number: 005.84 FOS.

53.
Building trustworthy semantic webs by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New York: Auerbach Publications, 2008
Availability: Items available for loan: ACL (1)Call number: 025.04 THU.

54.
Building security : handbook for architectural planning and design by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New York: McGraw-Hill, 2004
Availability: Items available for loan: ACL (1)Call number: 690.22 NAD.

55.
Building secure software how to avoid security problems the right way by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Boston: Addison Wesley, 2002
Availability: Items available for loan: ACL (1)Call number: QA76.76.D47 V857 2001 005.1.

56.
Building peace in Haiti by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Boulder, CO: L. Rienner Publishers, 1998
Availability: Items available for loan: ACL (1)Call number: 327.7294 KUM.

57.
Building Linux virtual private networks (VPNs) by
Edition: 1st ed
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Indianapolis, IN: New Riders, 2002
Availability: Items available for loan: ACL (1)Call number: 005.432 L KOL.

58.
Building an effective information security policy architecture by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Boca Raton, FL: CRC Press, 2008
Availability: Items available for loan: ACL (1)Call number: 005.8 BAC.

59.
Building a global information assurance program by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Boca Raton, FL: Auerbach Publications, 2003
Availability: Items available for loan: ACL (1)Call number: 005.8 CUR.

60.
Build your own security lab : a field guide for network testing by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Hoboken, NJ: Wiley, 2008
Availability: Items available for loan: ACL (1)Call number: 005.8 GRE.

Pages

Powered by Koha