Loading...
Error: Cannot Load Popup Box
Language:
English
Deutsch
Español
Français
Italiano
日本語
Nederlands
Português
中文(简体)
中文(繁體)
Thai
Türkçe
עברית
Gaeilge
Cymraeg
Ελληνικά
Català
Euskara
Русский
čeština
Search For:
in:
All Fields
Title
Author
Subject
Call Number
ISBN/ISSN
Tag
Advanced
Retain my current filters
Home
>
Search:
Suggested Topics
... within your search.
Computer security
Electronic books
(10)
Computer networks
(6)
Data protection
(6)
Cryptography
(3)
Data encryption (Computer science)
(3)
more ...
Additional Suggested Topics
... within your search.
Information technology
(2)
Risk assessment
(2)
Software maintenance
(2)
Business
(1)
Business intelligence
(1)
Computational complexity
(1)
Computer access control systems
(1)
Computer network security
(1)
Digital watermarking
(1)
Electronic data processing departments
(1)
Error-correcting codes (Information theory)
(1)
Information warfare
(1)
Intellectual property
(1)
Microsoft Windows (Computer file)
(1)
Multimedia systems
(1)
Operating systems (Computers)
(1)
Phishing
(1)
Systems engineering
(1)
Telecommunication systems
(1)
less ...
Showing
1
-
20
of
26
for search:
''
, query time: 0.03s
Sort
Relevance
Date Descending
Date Ascending
Call Number
Author
Title
Complexity theory and cryptology : an introduction to cryptocomplexity /
by
Rothe, Jorg
Published 2005
Call Number:
Loading
Located:
Loading
Loading...
Add to Favorites
Basics of contemporary cryptography for IT practitioners /
by
Ryabko, Boris
Published 2005
Call Number:
Loading
Located:
Loading
Loading...
Add to Favorites
Cryptography, information theory, and error-correction : a handbook for the 21st century /
by
Bruen, Aiden A
Published 2005
Call Number:
Loading
Located:
Loading
Loading...
Add to Favorites
Phishing : cutting the identity theft line /
by
Lininger, Rachael
Published 2005
Call Number:
Loading
Located:
Loading
Loading...
Add to Favorites
Security patterns : integrating security and systems engineering /
Published 2005
Call Number:
Loading
Located:
Loading
Loading...
Add to Favorites
Principles of information security /
by
Whitman, Michael E
Published 2005
Call Number:
Loading
Located:
Loading
Loading...
Add to Favorites
The database hacker's handbook : defending database servers /
Published 2005
Call Number:
Loading
Located:
Loading
Loading...
Add to Favorites
The software vulnerability guide /
by
Thompson, Herbert H
Published 2005
Call Number:
Loading
Located:
Loading
Loading...
Add to Favorites
Statistical methods in computer security
by
Chen, William W.S
Published 2005
Call Number:
Loading
Located:
Loading
Full Text
Add to Favorites
Managing an information security and privacy awareness and training program
by
Herold, Rebecca.
Published 2005
Call Number:
Loading
Located:
Loading
Full Text
Add to Favorites
Information warfare in business strategies of control and resistance in the network society /
by
Munro, Iain
Published 2005
Call Number:
Loading
Located:
Loading
Full Text
Add to Favorites
Information security risk analysis
by
Peltier, Thomas R
Published 2005
Call Number:
Loading
Located:
Loading
Full Text
Add to Favorites
Information security management handbook.
Published 2005
Call Number:
Loading
Located:
Loading
Full Text
Add to Favorites
Assessing and managing security risk in IT systems a structured methodology /
by
McCumber, John
Published 2005
Call Number:
Loading
Located:
Loading
Full Text
Add to Favorites
A practical guide to security assessments
by
Kairab, Sudhanshu
Published 2005
Call Number:
Loading
Located:
Loading
Full Text
Add to Favorites
Curing the patch management headache
by
Nicastro, Felicia M
Published 2005
Call Number:
Loading
Located:
Loading
Full Text
Add to Favorites
Codes the guide to secrecy from ancient to modern times /
by
Mollin, Richard A
Published 2005
Call Number:
Loading
Located:
Loading
Full Text
Add to Favorites
Curing the patch management headache
by
Nicastro, Felicia M.
Published 2005
Call Number:
Loading
Located:
Loading
book distributed by CRC Press. Purchase or institutional license may be required for access.
Add to Favorites
Industrial network security /
by
Teumim, David J
Published 2005
Call Number:
Loading
Located:
Loading
Loading...
Add to Favorites
Information security fundamentals /
by
Peltier, Thomas R
Published 2005
Call Number:
Loading
Located:
Loading
Loading...
Add to Favorites
1
2
Next »
Search Tools:
Get RSS Feed
Email this Search
Save Search
Narrow Search
Remove Filters
Year of Publication: 2005
Suggested Topics: Computer security
Institution
KMUTT
(26)
Library
mai
(3)
Format
MONOGRAPHS
(3)
Call Number
Q - Science
(22)
H - Social Science
(2)
T - Technology
(2)
Author
Peltier, Thomas R
(2)
Barrett, Daniel J
(1)
Bruen, Aiden A
(1)
Chen, William W.S
(1)
Herold, Rebecca
(1)
more ...
Kabatiansky, G
(1)
Kairab, Sudhanshu
(1)
Korff, Yanek
(1)
Lininger, Rachael
(1)
McClure, Stuart
(1)
McCumber, John
(1)
Mollin, Richard A
(1)
Mollin, Richard A., 1947-
(1)
Munro, Iain
(1)
Nicastro, Felicia M
(1)
Nicastro, Felicia M.
(1)
Rothe, Jorg
(1)
Ryabko, Boris
(1)
Seitz, Juergen
(1)
Teumim, David J
(1)
Thompson, Herbert H
(1)
Whitman, Michael E
(1)
less ...
Language
English
(26)
Genre
Electronic books
(2)
Year of Publication
From:
To:
Search Options
Search History
Advanced Search
Find More
Browse the Catalog
Browse Alphabetically
Course Reserves
New Items
Need Help?
Search Tips
Ask a Librarian
FAQs
KMUTT-LM Website