Loading...
Error: Cannot Load Popup Box
Language:
English
Deutsch
Español
Français
Italiano
日本語
Nederlands
Português
中文(简体)
中文(繁體)
Thai
Türkçe
עברית
Gaeilge
Cymraeg
Ελληνικά
Català
Euskara
Русский
čeština
Search For:
in:
All Fields
Title
Author
Subject
Call Number
ISBN/ISSN
Tag
Advanced
Retain my current filters
Home
>
Search:
Suggested Topics
... within your search.
Computer security
Data protection
(7)
Electronic books
(3)
Business communication
(1)
Computer access control systems
(1)
Computer hackers
(1)
more ...
Additional Suggested Topics
... within your search.
Congresses
(1)
Cryptography
(1)
Digital signatures
(1)
Electronic commerce
(1)
Handbooks, manuals, etc
(1)
Microsoft Windows (Computer file)
(1)
SET (Computer network protocol)
(1)
Watermarks
(1)
Wireless communication systems
(1)
less ...
Showing
1
-
13
of
13
for search:
''
, query time: 0.02s
Sort
Relevance
Date Descending
Date Ascending
Call Number
Author
Title
Writing information security policies /
by
Barman, Scott
Published 2002
Call Number:
Loading
Located:
Loading
Loading...
Add to Favorites
Hacking exposed web applications /
by
Scambray, Joel
Published 2002
Call Number:
Loading
Located:
Loading
Loading...
Add to Favorites
Computer security handbook /
Published 2002
Call Number:
Loading
Located:
Loading
Loading...
Add to Favorites
Information security policies, procedures, and standards guidelines for effective information security management /
by
Peltier, Thomas R
Published 2002
Call Number:
Loading
Located:
Loading
Full Text
Add to Favorites
Building an information security awareness program
by
Desman, Mark B
Published 2002
Call Number:
Loading
Located:
Loading
Full Text
Add to Favorites
A practical guide to security engineering and information assurance
by
Herrmann, Debra S
Published 2002
Call Number:
Loading
Located:
Loading
Full Text
Add to Favorites
Building an information security awareness program
by
Desman, Mark B.
Published 2002
Call Number:
Loading
Located:
Loading
book distributed by CRC Press. Purchase or institutional license may be required for access.
Add to Favorites
A practical guide to security engineering and information assurance
by
Herrmann, Debra S.
Published 2002
Call Number:
Loading
Located:
Loading
book distributed by CRC Press. Purchase or institutional license may be required for access.
Add to Favorites
WiSe : proceedings of the 2002 ACM workshop on wireless security : co-located with MobiCom 2002 conference, September 28, 2002, Atlanta, Georgia, USA
Published 2002
Call Number:
Loading
Located:
Loading
Loading...
Add to Favorites
Digital signatures /
by
Atreya, Mohan
Published 2002
Call Number:
Loading
Located:
Loading
Loading...
MONOGRAPHS
Add to Favorites
Informed watermarking /
by
Eggers, Joachim
Published 2002
Call Number:
Loading
Located:
Loading
Loading...
MONOGRAPHS
Add to Favorites
The hacker diaries : confessions of teenage hackers /
by
Verton, Dan
Published 2002
Call Number:
Loading
Located:
Loading
Loading...
MONOGRAPHS
Add to Favorites
Cryptography : an introduction /
Published 2002
Call Number:
Loading
Located:
Loading
Loading...
MONOGRAPHS
Add to Favorites
Search Tools:
Get RSS Feed
Email this Search
Save Search
Narrow Search
Remove Filters
Year of Publication: 2002
Call Number: Q - Science
Suggested Topics: Computer security
Institution
KMUTT
(13)
Library
mai
(4)
Format
MONOGRAPHS
(4)
Call Number
Q - Science
Author
Atreya, Mohan
(1)
Barman, Scott
(1)
Desman, Mark B
(1)
Desman, Mark B.
(1)
Eggers, Joachim
(1)
more ...
Herrmann, Debra S
(1)
Herrmann, Debra S.
(1)
Peltier, Thomas R
(1)
Scambray, Joel
(1)
Verton, Dan
(1)
less ...
Language
English
(13)
Genre
Electronic books
(2)
Year of Publication
From:
To:
Search Options
Search History
Advanced Search
Find More
Browse the Catalog
Browse Alphabetically
Course Reserves
New Items
Need Help?
Search Tips
Ask a Librarian
FAQs
KMUTT-LM Website