Click Here for Subscribed Journals

Refine your search

Your search returned 87 results.

Sort
Results
1.
Building Internet Firewalls : Internet and Web security / Elizabeth D. Zwicky, Simon Cooper & D. Brent Chapman. by
Edition: 2nd ed.
Publication details: Beijing ; Cambridge, MA : O'Reilly, c2000
Availability: Items available for loan: John F. Kennedy Memorial Library (1).
2. Monographs
Applied cryptography : protocols, algorithms, and source code in C / Bruce Schneier. by
Edition: 2nd ed.
Publication details: New York : Wiley, c1996
Availability: Items available for loan: John F. Kennedy Memorial Library (4).
3. Monographs
Computers, ethics, and society / edited by M. David Ermann, Mary B. Williams, Michele S. Shauf. by
Edition: 2nd ed.
Publication details: New York : Oxford University Press, 1997
Availability: Items available for loan: John F. Kennedy Memorial Library (3)Location, call number: QA76.9.C66 C6575 1997, ...
4.
Security and control in information systems : a guide for business and accounting / Andrew Hawker. by Series: Routledge information systems textbooks
Publication details: London ; New York : Routledge , 2000
Availability: Items available for loan: FBE Library (1).
5.
Auditing and security : AS/400, NT, UNIX, networks, and disaster recovery plans / Yusufali F. Musaji. by
Publication details: New York : John Wiley, 2001
Availability: Items available for loan: FBE Library (1).
6. Monographs
Applied cryptography : protocols, algorithms, and source code in C / Bruce Schneier. by
Edition: 2nd ed.
Publication details: New York : Wiley, c1996
Availability: Items available for loan: Technology (N) Library (11)Location, call number: QA76.9.A25 S35 1996, ...
7.
Building Internet Firewalls : Internet and Web security / Elizabeth D. Zwicky, Simon Cooper & D. Brent Chapman. by
Edition: 2nd ed.
Publication details: Beijing ; Cambridge, Mass. : O'Reilly, c2000
Availability: Items available for loan: Technology North Library (1).
8. Monographs
Computer crime / August Bequai. by
Publication details: Lexington, Mass. : Lexington Books, c1978
Availability: Items available for loan: (1). Science Library (1).
9.
Protection and security on the information superhighway / Frederick B. Cohen. by
Publication details: New York : Wiley, c1995
Online resources:
Availability: Items available for loan: Education Library (1).
10.
Security in distributed computing : did you lock the door? / Glen Bruce, Rob Dempsey. by
Publication details: Saddle River, NJ : Prentice Hall, c1997
Availability: Items available for loan: (1). Science Library (1).
11.
12.
The international handbook on computer crime : computer-related economic crime and the infringements of privacy / Ulrich Sieber. by
Publication details: Chichester [Sussex] ; New York : Wiley, c1986
Availability: Items available for loan: John F. Kennedy Memorial Library (1).
13.
14.
Security in computing / Charles P. Pfleeger. by
Edition: 2nd ed.
Publication details: Upper Saddle River, NJ : Prentice Hall PTR, c1997
Availability: Items available for loan: Science Library (2)Location, call number: QA76.9.A25 P45 1997, ...
15.
Windows NT security guide / Stephen A. Sutton. by
Publication details: Reading, Mass. : Addison-Wesley Developers Press, c1997
Availability: Items available for loan: Science Library (1)Location, call number: QA76.76.O63 S9.
16.
The NCSA guide to enterprise security : protecting information assets / Michel E. Kabay. by
Publication details: New York : McGraw-Hill, c1996
Other title:
  • Enterprise security
Availability: Items available for loan: Science Library (1)Location, call number: QA76.9.A25 K32.
17.
Windows 95 and NT 4.0 registry & customization handbook / written by Jerry Honeycutt with Bernard Farrell ... [et al.]. by
Publication details: Indianapolis : Que Corp., c1997
Availability: Items available for loan: Science Library (2)Location, call number: QA76.76.O63 H6645, ...
18.
LAN times guide to security and data integrity / Marc Farley, Tom Stearns, and Jeffrey Hsu. by
Publication details: Berkeley, Calif. : Osborne McGraw-Hill, c1996
Other title:
  • Guide to security and data integrity
Availability: Items available for loan: Science Library (1)Location, call number: Book Cart TK5105.59. F37.
19.
Digital signature schemes : general framework and fail-stop signatures / Birgit Pfitzmann. by Series: Lecture notes in computer science ; 1100
Publication details: Berlin ; New York : Springer, c1996
Availability: Items available for loan: Science Library (2)Location, call number: QA76.9.A25 P444, ...
20.
Windows NT security : a practical guide to securing Windows NT servers and workstations / Charles B. Rutstein. by Series: McGraw-Hill NCSA guides
Publication details: New York : McGraw-Hill, c1997
Other title:
  • Practical guide to securing Windows NT servers and workstations
Availability: Items available for loan: Science Library (1)Location, call number: QA76.76.O63 R895.
Pages