The management of network security : technology, design, and management control / by Houston Carr, Charles Snyder, and Bliss Bailey
MELB, W'PONDS
2010
The management of network security : technology, design, and management control / by Houston Carr, Charles Snyder, and Bliss Bailey
MELB, W'PONDS
2010
005.8 Car/Sci : Computers at risk : safe computing in the information age / System Security Study Committee, Computer Science and Telecommunications Board, Commission on Physical Sciences, Mathematics, and Applications, National Research Council
Computers at risk : safe computing in the information age / System Security Study Committee, Computer Science and Telecommunications Board, Commission on Physical Sciences, Mathematics, and Application
W'PONDS
1991
005.8 Car/Wfa : Windows forensics and incident recovery / Harlan Carvey
Windows forensics and incident recovery / Harlan Carvey
MELB
(ISC)2 CISSP certified information systems security professional official study guide & practice tests bundle / Mike Chapple, James Michael Stewart, Darril, David Seidl
MELB
2021
(ISC)2 CISSP certified information systems security professional official study guide & practice tests bundle / Mike Chapple, James Michael Stewart, Darril, David Seidl
MELB
2021
005.8 Cha/Pki : Public key infrastructure : second European PKI Workshop: Research and Applications, EuroPKI 2005, Canterbury, UK, June 30-July 1, 2005 : revised selected papers / David Chadwick, Gansen Zhao (eds.)
Public key infrastructure : second European PKI Workshop: Research and Applications, EuroPKI 2005, Canterbury, UK, June 30-July 1, 2005 : revised selected papers / David Chadwick, Gansen Zhao (eds.)
W'PONDS
2005
005.8 Che/Ias : Intelligence and security informatics for international security : information sharing and data mining / Hsinchun Chen
Intelligence and security informatics for international security : information sharing and data mining / Hsinchun Chen
MELB
2006
005.8 Che/Nse : National security / edited by H. Chen ... [and others]
National security / edited by H. Chen ... [and others]
MELB
005.8 Col/Itp : Insider threat : protecting the enterprise from sabotage, spying, and theft / Eric Cole, Sandra Ring
Insider threat : protecting the enterprise from sabotage, spying, and theft / Eric Cole, Sandra Ring
W'PONDS
2006
005.8 Col/Nsb : Network security bible / Eric Cole, Ronald Krutz, and James W. Conley
Network security bible / Eric Cole, Ronald Krutz, and James W. Conley
MELB
2005
005.8 Com/Eac 1992 : Eighth Annual Computer Security Applications Conference, San Antonio, Texas, November 30 - December 4, 1992 / sponsored by American Society for Industrial Security ... [and others]
Eighth Annual Computer Security Applications Conference, San Antonio, Texas, November 30 - December 4, 1992 / sponsored by American Society for Industrial Security ... [and others]
W'PONDS
1992
005.8 Con/Cha : Code hacking : a developer's guide to network security / Richard Conway, Julian Cordingley
Code hacking : a developer's guide to network security / Richard Conway, Julian Cordingley
W'PONDS