Loading...
Error: Cannot Load Popup Box
Language:
English
Deutsch
Español
Français
Italiano
日本語
Nederlands
Português
中文(简体)
中文(繁體)
Thai
Türkçe
עברית
Gaeilge
Cymraeg
Ελληνικά
Català
Euskara
Русский
čeština
Search For:
in:
All Fields
Title
Author
Subject
Call Number
ISBN/ISSN
Tag
Advanced
Retain my current filters
Home
>
Search:
Suggested Topics
... within your search.
Computer security
Linux
(3)
Operating systems (Computers)
(3)
Computer networks
(2)
Software maintenance
(2)
Application software
(1)
more ...
Additional Suggested Topics
... within your search.
Civil defense
(1)
Computer crimes
(1)
Computer hackers
(1)
Data mining
(1)
Electronic book
(1)
Electronic books
(1)
Electronic commerce
(1)
Electronic data processing personnel
(1)
Encyclopedias and dictionaries
(1)
Java (Computer program language)
(1)
Machine learning
(1)
Microsoft .NET
(1)
Microsoft Windows (Computer file)
(1)
Programming (Mathematics)
(1)
Security measures
(1)
Spyware (computer software)
(1)
Terrorism
(1)
Web site development
(1)
less ...
Showing
1
-
19
of
19
for search:
''
, query time: 0.45s
Sort
Relevance
Date Descending
Date Ascending
Call Number
Author
Title
Defeating the hacker : a non-technical guide to computer security /
by
Schifreen, Robert
Published 2006
Call Number:
Loading
Located:
Loading
Loading...
Add to Favorites
Enterprise security : IT security solutions : concepts, practical experiences, technologies /
Published 2006
Call Number:
Loading
Located:
Loading
Loading...
Add to Favorites
Building and implementing a security certification and accreditation program official (ISC) guide to the CAP CBK /
by
Howard, Patrick D
Published 2006
Call Number:
Loading
Located:
Loading
Full Text
Add to Favorites
Network security : a hacker’s perspective /
by
Fadia, Ankit
Published 2006
Call Number:
Loading
Located:
Loading
Loading...
Add to Favorites
Machine learning and data mining for computer security : methods and applications /
Published 2006
Call Number:
Loading
Located:
Loading
Loading...
Add to Favorites
Foundations of computer security /
by
Salomon, David
Published 2006
Call Number:
Loading
Located:
Loading
Loading...
Add to Favorites
Combating Spyware in the enterprise /
Published 2006
Call Number:
Loading
Located:
Loading
Loading...
MONOGRAPHS
Add to Favorites
Core security patterns : best practices and strategies for J2EE, Web services, and identity management /
by
Steel, Christopher
Published 2006
Call Number:
Loading
Located:
Loading
Loading...
MONOGRAPHS
Add to Favorites
BigNum math : implementing cryptographic multiple precision arithmetic /
by
Denis, Tom St
Published 2006
Call Number:
Loading
Located:
Loading
Loading...
MONOGRAPHS
Add to Favorites
Advanced host intrusion prevention with CSA /
by
Sullivan, Chad
Published 2006
Call Number:
Loading
Located:
Loading
Loading...
MONOGRAPHS
Add to Favorites
Linux annoyances for geeks /
by
Jang, Michael
Published 2006
Call Number:
Loading
Located:
Loading
Loading...
MONOGRAPHS
Add to Favorites
Minoli-cordovana's authoritative computer & network security dictionary /
by
Minoli, Daniel
Published 2006
Call Number:
Loading
Located:
Loading
Loading...
MONOGRAPHS
Add to Favorites
Professional ASP.NET 2.0 security, membership, and role management /
by
Schackow, Stafan
Published 2006
Call Number:
Loading
Located:
Loading
Loading...
MONOGRAPHS
Add to Favorites
Advanced guide to Linux networking and security /
by
Sawicki, Ed
Published 2006
Call Number:
Loading
Located:
Loading
Loading...
MONOGRAPHS
Add to Favorites
Linux patch management : keeping Linux systems up to date /
by
Jang, Michael
Published 2006
Call Number:
Loading
Located:
Loading
Loading...
MONOGRAPHS
Add to Favorites
Computer security basics /
by
Lehtinen, Rick
Published 2006
Call Number:
Loading
Located:
Loading
Loading...
MONOGRAPHS
Add to Favorites
Computer security fundamentals /
by
Easttom, Chuck
Published 2006
Call Number:
Loading
Located:
Loading
Full Text
EBOOKS
Add to Favorites
Critical infrastructure protection in homeland security : defending a networked nation /
by
Lewis, Ted G
Published 2006
Call Number:
Loading
Located:
Loading
Loading...
MONOGRAPHS
Add to Favorites
Hacking exposed : Web applications /
by
Scambray, Joel
Published 2006
Call Number:
Loading
Located:
Loading
Loading...
MONOGRAPHS
Add to Favorites
Search Tools:
Get RSS Feed
Email this Search
Save Search
Narrow Search
Remove Filters
Year of Publication: 2006
Call Number: Q - Science
Suggested Topics: Computer security
Institution
KMUTT
(19)
Library
mai
(13)
Format
MONOGRAPHS
(12)
EBOOKS
(1)
Call Number
Q - Science
Author
Jang, Michael
(2)
Denis, Tom St
(1)
Easttom, Chuck
(1)
Fadia, Ankit
(1)
Howard, Patrick D
(1)
more ...
Lehtinen, Rick
(1)
Lewis, Ted G
(1)
Minoli, Daniel
(1)
Salomon, David
(1)
Sawicki, Ed
(1)
Scambray, Joel
(1)
Schackow, Stafan
(1)
Schifreen, Robert
(1)
Steel, Christopher
(1)
Sullivan, Chad
(1)
less ...
Language
English
(19)
Year of Publication
From:
To:
Search Options
Search History
Advanced Search
Find More
Browse the Catalog
Browse Alphabetically
Course Reserves
New Items
Need Help?
Search Tips
Ask a Librarian
FAQs
KMUTT-LM Website