Loading...
Error: Cannot Load Popup Box
Language:
English
Deutsch
Español
Français
Italiano
日本語
Nederlands
Português
中文(简体)
中文(繁體)
Thai
Türkçe
עברית
Gaeilge
Cymraeg
Ελληνικά
Català
Euskara
Русский
čeština
Search For:
in:
All Fields
Title
Author
Subject
Call Number
ISBN/ISSN
Tag
Advanced
Retain my current filters
Home
>
Search:
Suggested Topics
... within your search.
Computer security
Computer networks
(7)
Data protection
(6)
Information technology
(5)
Computer crimes
(3)
Application software
(1)
more ...
Additional Suggested Topics
... within your search.
Business
(1)
Business enterprises
(1)
Coding theory
(1)
Computer architecture
(1)
Data encryption (Computer science)
(1)
Data recovery (Computer science)
(1)
Database security
(1)
Encyclopedias and dictionaries
(1)
Macintosh (Computer)
(1)
Mathematics
(1)
Microsoft Windows (Computer file)
(1)
Oracle (Computer file)
(1)
Python (Computer program language)
(1)
Security measures
(1)
Security systems
(1)
Telecommunications engineers
(1)
UNIX Shells
(1)
less ...
Showing
1
-
17
of
17
for search:
''
, query time: 0.03s
Sort
Relevance
Date Descending
Date Ascending
Call Number
Author
Title
Next generation SSH2 implementation : securing data in motion /
by
Liu, Dale
Published 2009
Call Number:
Loading
Located:
Loading
Loading...
MONOGRAPHS
Add to Favorites
Introduction to network security /
by
Jacobson, Douglas
Published 2009
Call Number:
Loading
Located:
Loading
Loading...
MONOGRAPHS
Add to Favorites
CISO soft skills : securing organizations impaired by employee politics, apathy, and intolerant perspectives /
by
Collette, Ron
Published 2009
Call Number:
Loading
Located:
Loading
Loading...
MONOGRAPHS
Add to Favorites
Hacking exposed : network security secrets & solutions /
by
McClure, Stuart
Published 2009
Call Number:
Loading
Located:
Loading
Loading...
MONOGRAPHS
Add to Favorites
Architecting secure software systems /
by
Talukder, Asoke K
Published 2009
Call Number:
Loading
Located:
Loading
Loading...
MONOGRAPHS
Add to Favorites
Information security governance : a practical development and implementation approach /
by
Brotby, Krag
Published 2009
Call Number:
Loading
Located:
Loading
Loading...
MONOGRAPHS
Add to Favorites
Cyber fraud : tactics, techniques, and procedures /
Published 2009
Call Number:
Loading
Located:
Loading
Loading...
MONOGRAPHS
Add to Favorites
Encyclopedia of cybercrime /
Published 2009
Call Number:
Loading
Located:
Loading
Loading...
MONOGRAPHS
Add to Favorites
Data protection : governance, risk management, and compliance /
by
Hill, David G
Published 2009
Call Number:
Loading
Located:
Loading
Loading...
MONOGRAPHS
Add to Favorites
Security software development : assessing and managing security risks /
by
Ashbaugh, Douglas A
Published 2009
Call Number:
Loading
Located:
Loading
Loading...
MONOGRAPHS
Add to Favorites
CISSP exam cram /
by
Gregg, Michael
Published 2009
Call Number:
Loading
Located:
Loading
Loading...
MONOGRAPHS
Add to Favorites
Applied algebra : codes, ciphers, and discrete algorithms /
by
Hardy, Darel W
Published 2009
Call Number:
Loading
Located:
Loading
Loading...
MONOGRAPHS
Add to Favorites
Gray hat Python : Python programming for hackers and reverse engineers /
by
Seitz, Justin
Published 2009
Call Number:
Loading
Located:
Loading
Loading...
MONOGRAPHS
Add to Favorites
Macintosh OS X, iPod, and iPhone forensic analysis DVD toolkit /
by
Kubasiak, Ryan R
Published 2009
Call Number:
Loading
Located:
Loading
Loading...
MONOGRAPHS
Add to Favorites
Principles of information security /
by
Whitman, Michael E
Published 2009
Call Number:
Loading
Located:
Loading
Loading...
MONOGRAPHS
Add to Favorites
Information security management metrics : a definitive guide to effective security monitoring and measurement /
by
Brotby, W. Krag
Published 2009
Call Number:
Loading
Located:
Loading
Loading...
MONOGRAPHS
Add to Favorites
How to secure and audit Oracle 10g and 11g /
by
Natan, Ron Ben
Published 2009
Call Number:
Loading
Located:
Loading
Loading...
MONOGRAPHS
Add to Favorites
Search Tools:
Get RSS Feed
Email this Search
Save Search
Narrow Search
Remove Filters
Year of Publication: 2009
Suggested Topics: Computer security
Library: mai
Institution
KMUTT
(17)
Library
mai
Format
MONOGRAPHS
(17)
Call Number
Q - Science
(11)
H - Social Science
(3)
T - Technology
(3)
Author
Ashbaugh, Douglas A
(1)
Brotby, Krag
(1)
Brotby, W. Krag
(1)
Collette, Ron
(1)
Gregg, Michael
(1)
more ...
Hardy, Darel W
(1)
Hill, David G
(1)
Jacobson, Douglas
(1)
Kubasiak, Ryan R
(1)
Liu, Dale
(1)
McClure, Stuart
(1)
Natan, Ron Ben
(1)
Seitz, Justin
(1)
Talukder, Asoke K
(1)
Whitman, Michael E
(1)
less ...
Language
English
(17)
Year of Publication
From:
To:
Search Options
Search History
Advanced Search
Find More
Browse the Catalog
Browse Alphabetically
Course Reserves
New Items
Need Help?
Search Tips
Ask a Librarian
FAQs
KMUTT-LM Website