Your search returned 78 results.

Sort
Results
61.
Digital fortress by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: London: Corgi Books, 2004
Availability: Items available for loan: ACL (1)Call number: 813.54 BRO.

62.
Disaster proofing information systems : a complete methodology for eliminating single points of failure by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New York: McGraw-Hill, 2003
Availability: Items available for loan: ACL (1)Call number: 658.477 BUC.

63.
Dr. Tom Shinder's ISA server 2006 migration guide by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Rockland, MA: Syngress Publishing, 2007
Availability: Items available for loan: ACL (1)Call number: TK5105.59 .S526 2007 005.8.

64.
E-commerce security and privacy by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Dordrecht ; Boston: Kluwer Academic Publishers, 2001
Availability: Items available for loan: ACL (1)Call number: 005.8 GHO.

65.
Elliptic curves and their applications to cryptography : an introduction by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Dordrecht ; Boston: Kluwer Academic, 1999
Availability: Items available for loan: ACL (1)Call number: 005.82 ENG.

66.
E-mail virus protection handbook
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Rockland, MA: Syngress Publishing, 2000
Availability: Items available for loan: ACL (1)Call number: 005.8 SYN.

67.
Enterprise security : the manager's defense guide by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Boston, MA: Addison Wesley, 2003
Availability: Items available for loan: ACL (1)Call number: 005.8 CLA.

68.
Enterprise security : IT security solutions : concepts, practical experiences, technologies by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Erlangen: Publicis Corporate Publishing, 2006
Availability: Items available for loan: ACL (1)Call number: 005.8 FUM.

69.
Enterprise Java security : building secure J2EE applications by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Boston, MA: Addison Wesley, 2004
Availability: Items available for loan: ACL (1)Call number: 005.133J PIS.

70.
Enterprise directory and security implementation guide : designing and implementing directories in your organization by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Amsterdam ; Boston: Elsevier / Academic Press, 2002
Availability: Items available for loan: ACL (1)Call number: 005.8 CAR.

71.
(SCTS) Symantec certified technical specialist : small business security study guide by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Upper Saddle River, NJ: Addison Wesley, 2006
Availability: Items available for loan: ACL (1)Call number: 005.8 ALS.

72.
Elliptic curve i ncryptography by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Cambridge: Cambridge University Press, 2005
Availability: Items available for loan: ACL (1)Call number: 005.82 BLA.

73.
Applied cryptography : protocols, algorithms, and source code in C by
Edition: 2nd ed
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Hoboken, NJ: Wiley, 1996
Availability: Items available for loan: ACL (2)Call number: QA76.9.A25 S35 1996 005.8/2, ...

74.
Computer security by
Edition: 2nd ed
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Hoboken, N.J: Wiley, 2006
Availability: Items available for loan: ACL (1)Call number: 005.8 GOL.

75.
Encyclopaedia of information security risk analysis v.2 : Security risk management : building an information security by
Edition: 1st ed
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: London: Koros Press Limited, 2016
Availability: Items available for loan: ACL (1)Call number: 005.8 DIS.

76.
Effective Oracle database 10g security by design by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi: McGraw-Hill/Osborne ; Oracle Press, Tata McGraw Hill Education Private Limited, 2004
Availability: Items available for loan: ACL (1)Call number: 005.7575O KNO.

77.
Effective Oracle database 10g security by design by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Emeryville, CA: McGraw-Hill/Osborne ; Oracle Press, 2004
Availability: Items available for loan: ACL (1)Call number: 005.8 KNO.

78.
Encyclopaedia of cyber law & computer security : measures, controls & practices by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: London: Koros Press Limited, 2015
Availability: Items available for loan: ACL (2)Call number: 343.7309944 MOO, ...

Pages

Powered by Koha