Click Here for Subscribed Journals

Your search returned 14 results.

Sort
Results
1.
Protection and security on the information superhighway / Frederick B. Cohen. by
Publication details: New York : Wiley, c1995
Online resources:
Availability: Items available for loan: Education Library (1).
2.
Security in computing / Charles P. Pfleeger. by
Edition: 2nd ed.
Publication details: Upper Saddle River, NJ : Prentice Hall PTR, c1997
Availability: Items available for loan: Science Library (2)Location, call number: QA76.9.A25 P45 1997, ...
3.
The NCSA guide to enterprise security : protecting information assets / Michel E. Kabay. by
Publication details: New York : McGraw-Hill, c1996
Other title:
  • Enterprise security
Availability: Items available for loan: Science Library (1)Location, call number: QA76.9.A25 K32.
4.
LAN times guide to security and data integrity / Marc Farley, Tom Stearns, and Jeffrey Hsu. by
Publication details: Berkeley, Calif. : Osborne McGraw-Hill, c1996
Other title:
  • Guide to security and data integrity
Availability: Items available for loan: Science Library (1)Location, call number: Book Cart TK5105.59. F37.
5.
Protecting business information : a manager's guide / James A. Schweitzer. by
Publication details: Boston : Butterworth-Heinemann, c1996
Availability: Items available for loan: FBE Library (2)Location, call number: HD38.7. S388, ...
6. Monographs
Privacy-preserving data mining : models and algorithms / edited by Charu C, Aggarwal and Philip S. Yu. by
Publication details: New York : Springer, c2008.
Availability: Items available for loan: Graduate Library (2)Location, call number: QA76.9.P74, ...
7. Monographs
The shellcoder's handbook : discovering and exploiting security holes / Chris Anley ... [et al.]. by
Edition: 2nd ed.
Publication details: Indianapolis, IN : Wiley Technology Pub., 2007
Availability: Items available for loan: Technology North Library (2)Location, call number: Book Cart QA76.9.A25 S464 2007, ...
8.
The shellcoder's handbook : discovering and exploiting security holes / Chris Anley ... [et al.]. by
Edition: 2nd ed.
Publication details: Indianapolis, IN : Wiley Technology Pub., 2007
Availability: No items available.
9. Monographs
Information security management handbook / Micki Krause, Harold F. Tipton, editors. by
Edition: 4th ed.
Publication details: Boca Raton, FL : Auerbach, c2000
Online resources:
Availability: Items available for loan: Technology (N) Library (1)Location, call number: QA76.9.A25 H36 2000Ref.
10. Monographs
Security in computing / Charles P. Pfleeger, Shari Lawrence Pfleeger, Jonathan Margulies. by
Edition: Fifth edition.
Publication details: [S.l] [S.n] c2015
Availability: Items available for loan: Science Library (2)Location, call number: QA76.9.A25 P45 2015, ...
Pages