በአማርኛ ለመጻፍ እዚህ ጋ ይጫኑ





Table and Images
በአማርኛ ለመጻፍ እዚህ ጋ ይጫኑ





Table and Images

Your search returned 11 results.

Sort
Results
Protection and security on the information superhighway / Frederick B. Cohen.

by Cohen, Frederick B.

Publication details: New York : Wiley, c1995Online access: Table of Contents Availability: Items available for loan: Education Library (1).
Security in computing / Charles P. Pfleeger.

by Pfleeger, Charles P.

Edition: 2nd ed.Publication details: Upper Saddle River, NJ : Prentice Hall PTR, c1997Availability: Items available for loan: Science Library (2)Call number: QA76.9.A25 P45 1997, ...
The NCSA guide to enterprise security : protecting information assets / Michel E. Kabay.

by Kabay, Michel E.

Publication details: New York : McGraw-Hill, c1996Other title: Enterprise security.Availability: Items available for loan: Science Library (1)Call number: QA76.9.A25 K32.
LAN times guide to security and data integrity / Marc Farley, Tom Stearns, and Jeffrey Hsu.

by Farley, Marc | Stearns, Tom | Hsu, Jeffrey.

Publication details: Berkeley, Calif. : Osborne McGraw-Hill, c1996Other title: Guide to security and data integrity.Availability: Items available for loan: Science Library (1)Call number: TK5105.59. F37.
Protecting business information : a manager's guide / James A. Schweitzer.

by Schweitzer, James A.

Publication details: Boston : Butterworth-Heinemann, c1996Online access: Publisher description | Table of contents Availability: Items available for loan: FBE Library (2)Call number: HD38.7. S388, ...
Monographs
Privacy-preserving data mining : models and algorithms / edited by Charu C, Aggarwal and Philip S. Yu.

by Aggarwal, Charu C, ed | Yu, Philip S, ed.

Publication details: New York : Springer, c2008. Availability: Items available for loan: Graduate Library (2)Call number: QA76.9.P74, ...
Monographs
The shellcoder's handbook : discovering and exploiting security holes / Chris Anley ... [et al.].

by Anley, Chris.

Edition: 2nd ed.Publication details: Indianapolis, IN : Wiley Technology Pub., 2007Availability: Items available for loan: Technology North Library (2)Call number: QA76.9.A25 S464 2007, ...
The shellcoder's handbook : discovering and exploiting security holes / Chris Anley ... [et al.].

by Anley, Chris.

Edition: 2nd ed.Publication details: Indianapolis, IN : Wiley Technology Pub., 2007Availability: No items available.
Monographs
Information security management handbook / Micki Krause, Harold F. Tipton, editors.

by Nozaki, Micki Krause | Tipton, Harold F.

Edition: 4th ed.Publication details: Boca Raton, FL : Auerbach, c2000Online access: Publisher description Availability: Items available for loan: Technology (N) Library (1)Call number: QA76.9.A25 H36 2000Ref.
Monographs
Security in computing / Charles P. Pfleeger, Shari Lawrence Pfleeger, Jonathan Margulies.

by Pfleeger, Charles P, 1948- | Pfleeger, Shari Lawrence | Margulies, Jonathan.

Edition: Fifth edition.Publication details: [S.l] [S.n] c2015Availability: Items available for loan: Science Library (2)Call number: QA76.9.A25 P45 2015, ...
Pages
Not finding what you're looking for?

2019 © Addis Ababa University Libraries

2019 © Addis Ababa University Libraries