Loading...
Error: Cannot Load Popup Box
Language:
English
Deutsch
Español
Français
Italiano
日本語
Nederlands
Português
中文(简体)
中文(繁體)
Thai
Türkçe
עברית
Gaeilge
Cymraeg
Ελληνικά
Català
Euskara
Русский
čeština
Search For:
in:
All Fields
Title
Author
Subject
Call Number
ISBN/ISSN
Tag
Advanced
Retain my current filters
Home
>
Search:
Suggested Topics
... within your search.
Computer networks
Computer security
Electronic books
(5)
Security measures
(4)
Digital communications
(2)
Management
(2)
more ...
Additional Suggested Topics
... within your search.
Web services
(2)
Access control
(1)
Ajax (Web site development technology)
(1)
Business enterprises
(1)
C (Computer program language)
(1)
Computer hackers
(1)
Computer network architectures
(1)
Computer software
(1)
Data protection
(1)
Design and construction
(1)
Distributed operating systems (Computers)
(1)
Embedded computer systems
(1)
Information resources management
(1)
Information technology
(1)
Radio frequency identification systems
(1)
Windows CardSpace
(1)
less ...
Showing
1
-
18
of
18
for search:
''
, query time: 0.03s
Sort
Relevance
Date Descending
Date Ascending
Call Number
Author
Title
Building an effective information security policy architecture /
by
Bacik, Sandy
Published 2008
Call Number:
Loading
Located:
Loading
Full Text
Add to Favorites
Information assurance architecture
by
Willett, Keith D
Published 2008
Call Number:
Loading
Located:
Loading
Full Text
Add to Favorites
Effective leadership skills for the CISO
Published 2008
Call Number:
Loading
Located:
Loading
book distributed by CRC Press. Purchase or institutional license may be required for access.
Add to Favorites
Effective leadership skills for the CISO
Published 2008
Call Number:
Loading
Located:
Loading
book distributed by CRC Press. Purchase or institutional license may be required for access.
Add to Favorites
Practical embedded security : building secure resource-constrained systems /
by
Stapko, Timothy
Published 2008
Call Number:
Loading
Located:
Loading
Loading...
Add to Favorites
Information assurance : dependability and security in networked systems /
Published 2008
Call Number:
Loading
Located:
Loading
Loading...
Add to Favorites
Certified information systems security professional (CISSP)
Published 2008
Call Number:
Loading
Located:
Loading
Loading...
Add to Favorites
CISO leadership : essential principles for success /
Published 2008
Call Number:
Loading
Located:
Loading
Full Text
Add to Favorites
Digital privacy : theory, technologies, and practices /
Published 2008
Call Number:
Loading
Located:
Loading
Full Text
Add to Favorites
Hacking exposed Linux Linux security secrets and solutions /
Published 2008
Call Number:
Loading
Located:
Loading
Full Text
Add to Favorites
Digital privacy theory, technologies, and practices /
Published 2008
Call Number:
Loading
Located:
Loading
book distributed by CRC Press. Purchase or institutional license may be required for access.
Add to Favorites
Building an effective information security policy architecture
by
Bacik, Sandy.
Published 2008
Call Number:
Loading
Located:
Loading
book distributed by CRC Press. Purchase or institutional license may be required for access.
Add to Favorites
Understanding Windows CardSpace : an introduction to the concepts and challenges of digital identities /
by
Bertocci, Vittorio
Published 2008
Call Number:
Loading
Located:
Loading
Loading...
MONOGRAPHS
Add to Favorites
Secure computer and network systems : modeling, analysis and design /
by
Ye, Nong
Published 2008
Call Number:
Loading
Located:
Loading
Loading...
MONOGRAPHS
Add to Favorites
SOA security /
by
Kanneganti, Ramarao
Published 2008
Call Number:
Loading
Located:
Loading
Loading...
MONOGRAPHS
Add to Favorites
Computer security, privacy, and politics : current issues, challenges, and solutions /
by
Subramanian, Ramesh
Published 2008
Call Number:
Loading
Located:
Loading
Loading...
MONOGRAPHS
Add to Favorites
Ajax security /
by
Hoffman, Billy
Published 2008
Call Number:
Loading
Located:
Loading
Loading...
MONOGRAPHS
Add to Favorites
Vulnerability analysis and defense for the internet /
Published 2008
Call Number:
Loading
Located:
Loading
Loading...
MONOGRAPHS
Add to Favorites
Search Tools:
Get RSS Feed
Email this Search
Save Search
Narrow Search
Remove Filters
Year of Publication: 2008
Suggested Topics: Computer networks
Suggested Topics: Computer security
Institution
KMUTT
(18)
Library
mai
(6)
Format
MONOGRAPHS
(6)
Call Number
Q - Science
(14)
T - Technology
(4)
Author
Bacik, Sandy
(2)
Bertocci, Vittorio
(1)
Hoffman, Billy
(1)
Kanneganti, Ramarao
(1)
Stapko, Timothy
(1)
more ...
Subramanian, Ramesh
(1)
Willett, Keith D
(1)
Ye, Nong
(1)
less ...
Language
English
(18)
Genre
Electronic books
(4)
Year of Publication
From:
To:
Search Options
Search History
Advanced Search
Find More
Browse the Catalog
Browse Alphabetically
Course Reserves
New Items
Need Help?
Search Tips
Ask a Librarian
FAQs
KMUTT-LM Website