Loading...
Error: Cannot Load Popup Box
Language:
English
Deutsch
Español
Français
Italiano
日本語
Nederlands
Português
中文(简体)
中文(繁體)
Thai
Türkçe
עברית
Gaeilge
Cymraeg
Ελληνικά
Català
Euskara
Русский
čeština
Search For:
in:
All Fields
Title
Author
Subject
Call Number
ISBN/ISSN
Tag
Advanced
Retain my current filters
Home
>
Search:
Suggested Topics
... within your search.
Computer security
Computer networks
(18)
Electronic books
(10)
Security measures
(7)
Data protection
(4)
Information technology
(3)
more ...
Additional Suggested Topics
... within your search.
Web services
(3)
Access control
(2)
Computer crimes
(2)
Computer software
(2)
Cryptography
(2)
Digital communications
(2)
Management
(2)
Ajax (Web site development technology)
(1)
Biometric identification
(1)
Business
(1)
Business enterprises
(1)
C (Computer program language)
(1)
Coding theory
(1)
Computer hackers
(1)
Computer input-output equipment
(1)
Computer network architectures
(1)
Computer network security
(1)
Computer programs
(1)
Computer software development
(1)
Computers
(1)
Configuration management
(1)
Congresses
(1)
Database security
(1)
Design and construction
(1)
less ...
Showing
21
-
40
of
45
for search:
''
, query time: 0.42s
Sort
Relevance
Date Descending
Date Ascending
Call Number
Author
Title
IPTV security : protecting high-value digital contents /
by
Ramirez, David
Published 2008
Call Number:
Loading
Located:
Loading
Loading...
Add to Favorites
Hacking exposed Linux Linux security secrets and solutions /
Published 2008
Call Number:
Loading
Located:
Loading
Full Text
Add to Favorites
Digital privacy theory, technologies, and practices /
Published 2008
Call Number:
Loading
Located:
Loading
book distributed by CRC Press. Purchase or institutional license may be required for access.
Add to Favorites
Building an effective information security policy architecture
by
Bacik, Sandy.
Published 2008
Call Number:
Loading
Located:
Loading
book distributed by CRC Press. Purchase or institutional license may be required for access.
Add to Favorites
Smart cards, tokens, security and applications /
by
Mayes, Keith E
Published 2008
Call Number:
Loading
Located:
Loading
Loading...
MONOGRAPHS
Add to Favorites
Understanding Windows CardSpace : an introduction to the concepts and challenges of digital identities /
by
Bertocci, Vittorio
Published 2008
Call Number:
Loading
Located:
Loading
Loading...
MONOGRAPHS
Add to Favorites
Biometrics for dummies /
by
Gregory, Peter
Published 2008
Call Number:
Loading
Located:
Loading
Loading...
MONOGRAPHS
Add to Favorites
Introduction to modern cryptography /
by
Katz, Jonathan
Published 2008
Call Number:
Loading
Located:
Loading
Loading...
MONOGRAPHS
Add to Favorites
The new school of information security /
by
Shostack, Adam
Published 2008
Call Number:
Loading
Located:
Loading
Loading...
MONOGRAPHS
Add to Favorites
Infosecurity 2008 threat analysis /
Published 2008
Call Number:
Loading
Located:
Loading
Loading...
MONOGRAPHS
Add to Favorites
Secure software development : a security programmer's guide /
by
Grembi, Jason
Published 2008
Call Number:
Loading
Located:
Loading
Loading...
MONOGRAPHS
Add to Favorites
Secure computer and network systems : modeling, analysis and design /
by
Ye, Nong
Published 2008
Call Number:
Loading
Located:
Loading
Loading...
MONOGRAPHS
Add to Favorites
Group policy : fundamentals, security, and troubleshooting /
by
Moskowitz, Jeremy
Published 2008
Call Number:
Loading
Located:
Loading
Loading...
MONOGRAPHS
Add to Favorites
Hardware-based computer security techniques to defeat hackers : from biometrics to quantum cryptography /
by
Dube, Roger
Published 2008
Call Number:
Loading
Located:
Loading
Loading...
MONOGRAPHS
Add to Favorites
SOA security /
by
Kanneganti, Ramarao
Published 2008
Call Number:
Loading
Located:
Loading
Loading...
MONOGRAPHS
Add to Favorites
Securing web services : practical usage of standards and specifications /
by
Periorellis, Panos
Published 2008
Call Number:
Loading
Located:
Loading
Loading...
MONOGRAPHS
Add to Favorites
Mainframe basics for security professionals : getting started with RACF /
Published 2008
Call Number:
Loading
Located:
Loading
Loading...
MONOGRAPHS
Add to Favorites
Computer security, privacy, and politics : current issues, challenges, and solutions /
by
Subramanian, Ramesh
Published 2008
Call Number:
Loading
Located:
Loading
Loading...
MONOGRAPHS
Add to Favorites
Ajax security /
by
Hoffman, Billy
Published 2008
Call Number:
Loading
Located:
Loading
Loading...
MONOGRAPHS
Add to Favorites
Digital watermarking and steganography : fundamentals and
by
Shih, Frank Y
Published 2008
Call Number:
Loading
Located:
Loading
Loading...
MONOGRAPHS
Add to Favorites
« Prev
1
2
3
Next »
Search Tools:
Get RSS Feed
Email this Search
Save Search
Narrow Search
Remove Filters
Year of Publication: 2008
Suggested Topics: Computer security
Institution
KMUTT
(45)
Library
mai
(21)
Format
MONOGRAPHS
(21)
Call Number
Q - Science
(34)
T - Technology
(11)
Author
Bacik, Sandy
(2)
Anderson, Ross J
(1)
Arnason, Sigurjon Thor
(1)
Bertocci, Vittorio
(1)
Brancik, Kenneth C
(1)
more ...
Dube, Roger
(1)
Gregory, Peter
(1)
Grembi, Jason
(1)
Hoffman, Billy
(1)
Johansson, Jesper M
(1)
Kanneganti, Ramarao
(1)
Katz, Jonathan
(1)
Mayes, Keith E
(1)
Moskowitz, Jeremy
(1)
Nemati, Hamid
(1)
Periorellis, Panos
(1)
Pohlman, Marlin B.
(1)
Ramirez, David
(1)
Rommel, Florian
(1)
Shih, Frank Y
(1)
Shostack, Adam
(1)
Smith, Sean
(1)
Stackpole, Bill
(1)
Stallings, William
(1)
Stapko, Timothy
(1)
Subramanian, Ramesh
(1)
Turner, Sean
(1)
Willett, Keith D
(1)
Ye, Nong
(1)
Zou, Xukai
(1)
less ...
Language
English
(45)
Genre
Electronic books
(4)
Year of Publication
From:
To:
Search Options
Search History
Advanced Search
Find More
Browse the Catalog
Browse Alphabetically
Course Reserves
New Items
Need Help?
Search Tips
Ask a Librarian
FAQs
KMUTT-LM Website