Click Here for Subscribed Journals

Your search returned 100 results.

Sort
Results
1.
Practical UNIX and Internet security / Simson Garfinkel and Gene Spafford. by Series: Computer security (Sebastopol, Calif.)
Edition: 2nd ed., expanded & updated.
Publication details: Bonn ; Cambridge, MA : O'Reilly & Associates, c1996
Availability: Not available: John F. Kennedy Memorial Library: Checked out (1).
2. Monographs
Applied cryptography : protocols, algorithms, and source code in C / Bruce Schneier. by
Edition: 2nd ed.
Publication details: New York : Wiley, c1996
Availability: Items available for loan: John F. Kennedy Memorial Library (4).
3. Monographs
Computers, ethics, and society / edited by M. David Ermann, Mary B. Williams, Michele S. Shauf. by
Edition: 2nd ed.
Publication details: New York : Oxford University Press, 1997
Availability: Items available for loan: John F. Kennedy Memorial Library (3)Location, call number: QA76.9.C66 C6575 1997, ...
4.
Security and control in information systems : a guide for business and accounting / Andrew Hawker. by Series: Routledge information systems textbooks
Publication details: London ; New York : Routledge , 2000
Availability: Items available for loan: FBE Library (1).
5.
Auditing and security : AS/400, NT, UNIX, networks, and disaster recovery plans / Yusufali F. Musaji. by
Publication details: New York : John Wiley, 2001
Availability: Items available for loan: FBE Library (1).
6. Monographs
Applied cryptography : protocols, algorithms, and source code in C / Bruce Schneier. by
Edition: 2nd ed.
Publication details: New York : Wiley, c1996
Availability: Items available for loan: Technology (N) Library (11)Location, call number: QA76.9.A25 S35 1996, ...
7. Monographs
Net security : your digtal doberman : sure-fire strategies for wired businesses / Michael Alexander. by
Edition: 1st ed.
Publication details: Ventana : Research Triangle Park, NC , c1997
Availability: Not available: Science Library: Checked out (1).
8.
Protection and security on the information superhighway / Frederick B. Cohen. by
Publication details: New York : Wiley, c1995
Online resources:
Availability: Items available for loan: Education Library (1).
9.
Security in distributed computing : did you lock the door? / Glen Bruce, Rob Dempsey. by
Publication details: Saddle River, NJ : Prentice Hall, c1997
Availability: Items available for loan: (1). Science Library (1).
10.
The international handbook on computer crime : computer-related economic crime and the infringements of privacy / Ulrich Sieber. by
Publication details: Chichester [Sussex] ; New York : Wiley, c1986
Availability: Items available for loan: John F. Kennedy Memorial Library (1).
11.
Security in computing / Charles P. Pfleeger. by
Edition: 2nd ed.
Publication details: Upper Saddle River, NJ : Prentice Hall PTR, c1997
Availability: Items available for loan: Science Library (2)Location, call number: QA76.9.A25 P45 1997, ...
12.
Windows NT security guide / Stephen A. Sutton. by
Publication details: Reading, Mass. : Addison-Wesley Developers Press, c1997
Availability: Items available for loan: Science Library (1)Location, call number: QA76.76.O63 S9.
13.
The NCSA guide to enterprise security : protecting information assets / Michel E. Kabay. by
Publication details: New York : McGraw-Hill, c1996
Other title:
  • Enterprise security
Availability: Items available for loan: Science Library (1)Location, call number: QA76.9.A25 K32.
14.
Windows 95 and NT 4.0 registry & customization handbook / written by Jerry Honeycutt with Bernard Farrell ... [et al.]. by
Publication details: Indianapolis : Que Corp., c1997
Availability: Items available for loan: Science Library (2)Location, call number: QA76.76.O63 H6645, ...
15.
LAN times guide to security and data integrity / Marc Farley, Tom Stearns, and Jeffrey Hsu. by
Publication details: Berkeley, Calif. : Osborne McGraw-Hill, c1996
Other title:
  • Guide to security and data integrity
Availability: Items available for loan: Science Library (1)Location, call number: Book Cart TK5105.59. F37.
16.
Digital signature schemes : general framework and fail-stop signatures / Birgit Pfitzmann. by Series: Lecture notes in computer science ; 1100
Publication details: Berlin ; New York : Springer, c1996
Availability: Items available for loan: Science Library (2)Location, call number: QA76.9.A25 P444, ...
17.
Windows NT security : a practical guide to securing Windows NT servers and workstations / Charles B. Rutstein. by Series: McGraw-Hill NCSA guides
Publication details: New York : McGraw-Hill, c1997
Other title:
  • Practical guide to securing Windows NT servers and workstations
Availability: Items available for loan: Science Library (1)Location, call number: QA76.76.O63 R895.
18.
Protecting business information : a manager's guide / James A. Schweitzer. by
Publication details: Boston : Butterworth-Heinemann, c1996
Availability: Items available for loan: FBE Library (2)Location, call number: HD38.7. S388, ...
19.
Hard disk backup. Series: Central point PC tools
Publication details: [S.l.] : Central point Software, Inc., c1991
Availability: Items available for loan: Science Library (1)Location, call number: QA76.76.C65 H37.
20.
Network and Internet security / Vijay Ahuja. by
Publication details: Boston : AP Professional, c1996
Availability: Items available for loan: Technology North Library (1)Location, call number: TK5105.59.A39.
Pages