Loading...
Error: Cannot Load Popup Box
Language:
English
Deutsch
Español
Français
Italiano
日本語
Nederlands
Português
中文(简体)
中文(繁體)
Thai
Türkçe
עברית
Gaeilge
Cymraeg
Ελληνικά
Català
Euskara
Русский
čeština
Search For:
in:
All Fields
Title
Author
Subject
Call Number
ISBN/ISSN
Tag
Advanced
Retain my current filters
Home
>
Search:
Suggested Topics
... within your search.
Computer security
Electronic books
(5)
Computer software
(3)
Data protection
(3)
Computer networks
(2)
Cryptography
(2)
more ...
Additional Suggested Topics
... within your search.
Electronic data processing personnel
(2)
Microsoft Windows (Computer file)
(2)
Certification
(1)
Ciphers
(1)
Client/server computing
(1)
Computational grids (Computer systems)
(1)
Computer crimes
(1)
Computer hackers
(1)
Configuration management
(1)
Data encryption (Computer science)
(1)
Data mining
(1)
Data warehousing
(1)
Database security
(1)
Debugging in computer science
(1)
Identity
(1)
ManagementManagement
(1)
Phishing
(1)
SQL server
(1)
Security measures
(1)
Software maintenance
(1)
Software protection
(1)
less ...
Showing
1
-
20
of
26
for search:
''
, query time: 0.03s
Sort
Relevance
Date Descending
Date Ascending
Call Number
Author
Title
Secure programming with static analysis /
by
Chess, Brian
Published 2007
Call Number:
Loading
Located:
Loading
Loading...
Add to Favorites
Grid computing security /
by
Chakrabarti, Anirban
Published 2007
Call Number:
Loading
Located:
Loading
Loading...
Add to Favorites
Computer security and crytography /
by
Konheim, Alan G
Published 2007
Call Number:
Loading
Located:
Loading
Loading...
Add to Favorites
Testing code security
by
Van der Linden, Maura A
Published 2007
Call Number:
Loading
Located:
Loading
Full Text
Add to Favorites
Information security cost management
by
Bazavan, Ioana V
Published 2007
Call Number:
Loading
Located:
Loading
Full Text
Add to Favorites
Complete guide to CISM certification
by
Peltier, Thomas R
Published 2007
Call Number:
Loading
Located:
Loading
Full Text
Add to Favorites
Complete guide to CISM certification
by
Peltier, Thomas R.
Published 2007
Call Number:
Loading
Located:
Loading
book distributed by CRC Press. Purchase or institutional license may be required for access.
Add to Favorites
Computer forensics : principles and practices /
by
Volonino, Linda
Published 2007
Call Number:
Loading
Located:
Loading
Loading...
Add to Favorites
Cryptology unlocked /
by
Wobst, Reinhard
Published 2007
Call Number:
Loading
Located:
Loading
Loading...
Add to Favorites
Security in distributed, grid, mobile, and pervasive computing /
by
Xiao, Yang
Published 2007
Call Number:
Loading
Located:
Loading
Full Text
Add to Favorites
Trust, complexity and control : confidence in a convergent world /
by
Cofta, Piotr
Published 2007
Call Number:
Loading
Located:
Loading
Loading...
Add to Favorites
Data-driven block ciphers for fast telecommunication systems
by
Moldovyan, Nick
Published 2007
Call Number:
Loading
Located:
Loading
Full Text
Add to Favorites
Windows Vista security : securing Vista against malicious attacks /
by
Grimes, Roger A
Published 2007
Call Number:
Loading
Located:
Loading
Loading...
MONOGRAPHS
Add to Favorites
Information security management handbook /
by
Tipton, Harold F
Published 2007
Call Number:
Loading
Located:
Loading
Loading...
MONOGRAPHS
Add to Favorites
Security in distributed, grid, mobile, and pervasive computing
by
Xiao, Yang, 1966-
Published 2007
Call Number:
Loading
Located:
Loading
book distributed by CRC Press. Purchase or institutional license may be required for access.
EBOOKS
Add to Favorites
Phishing and countermeasures : understanding the increasing problem of electronic identity theft /
Published 2007
Call Number:
Loading
Located:
Loading
Loading...
MONOGRAPHS
Add to Favorites
Microsoft Vista for IT security professionals /
Published 2007
Call Number:
Loading
Located:
Loading
Loading...
MONOGRAPHS
Add to Favorites
Software deployment, updating, and patching
by
Stackpole, Bill.
Published 2007
Call Number:
Loading
Located:
Loading
book distributed by CRC Press. Purchase or institutional license may be required for access.
EBOOKS
Add to Favorites
Stealing the network : how to own a shadow /
by
Long, Johnny
Published 2007
Call Number:
Loading
Located:
Loading
Loading...
MONOGRAPHS
Add to Favorites
The art of software security assessment : identifying and preventing software vulnerabilities /
by
Dowd, Mark
Published 2007
Call Number:
Loading
Located:
Loading
Loading...
MONOGRAPHS
Add to Favorites
1
2
Next »
Search Tools:
Get RSS Feed
Email this Search
Save Search
Narrow Search
Remove Filters
Year of Publication: 2007
Call Number: Q - Science
Suggested Topics: Computer security
Institution
KMUTT
(26)
Library
mai
(14)
Format
MONOGRAPHS
(12)
EBOOKS
(2)
Call Number
Q - Science
Author
Bazavan, Ioana V
(1)
Chakrabarti, Anirban
(1)
Chess, Brian
(1)
Cofta, Piotr
(1)
Daswani, Neil
(1)
more ...
Dowd, Mark
(1)
Grimes, Roger A
(1)
Kadrich, Mark
(1)
Konheim, Alan G
(1)
Long, Johnny
(1)
Minasi, Mark
(1)
Moldovyan, Nick
(1)
Peltier, Thomas R
(1)
Peltier, Thomas R.
(1)
Pfleeger, Charles P
(1)
Singhal, Anoop
(1)
Stackpole, Bill
(1)
Tipton, Harold F
(1)
Van der Linden, Maura A
(1)
Volonino, Linda
(1)
Wobst, Reinhard
(1)
Xiao, Yang
(1)
Xiao, Yang, 1966-
(1)
less ...
Language
English
(26)
Genre
Electronic books
(1)
Study guides
(1)
Year of Publication
From:
To:
Search Options
Search History
Advanced Search
Find More
Browse the Catalog
Browse Alphabetically
Course Reserves
New Items
Need Help?
Search Tips
Ask a Librarian
FAQs
KMUTT-LM Website