Loading...
Error: Cannot Load Popup Box
Language:
English
Deutsch
Español
Français
Italiano
日本語
Nederlands
Português
中文(简体)
中文(繁體)
Thai
Türkçe
עברית
Gaeilge
Cymraeg
Ελληνικά
Català
Euskara
Русский
čeština
Search For:
in:
All Fields
Title
Author
Subject
Call Number
ISBN/ISSN
Tag
Advanced
Retain my current filters
Home
>
Search:
Suggested Topics
... within your search.
Computer security
Computer networks
(6)
Data protection
(4)
Information technology
(4)
Computer hackers
(2)
Algorithms
(1)
more ...
Additional Suggested Topics
... within your search.
Application software
(1)
Coding theory
(1)
Computer architecture
(1)
Computer crimes
(1)
Cryptography
(1)
Data encryption (Computer science)
(1)
Data recovery (Computer science)
(1)
Database security
(1)
Electronic data processing
(1)
Internet
(1)
Macintosh (Computer)
(1)
Mathematics
(1)
Microsoft Windows (Computer file)
(1)
Operating systems (Computers)
(1)
Oracle (Computer file)
(1)
Python (Computer program language)
(1)
Security measures
(1)
Security systems
(1)
UNIX Shells
(1)
less ...
Showing
1
-
17
of
17
for search:
''
, query time: 0.03s
Sort
Relevance
Date Descending
Date Ascending
Call Number
Author
Title
Algorithms, architectures and information systems security /
Published 2009
Call Number:
Loading
Located:
Loading
Loading...
Add to Favorites
Distributed systems security : issues, processes, and solutions /
Published 2009
Call Number:
Loading
Located:
Loading
Loading...
Add to Favorites
The Mac hacker's handbook /
by
Miller, Charlie
Published 2009
Call Number:
Loading
Located:
Loading
Loading...
Add to Favorites
Chained exploits : advanced hacking attacks from start to finish /
by
Whitaker, Andrew
Published 2009
Call Number:
Loading
Located:
Loading
Loading...
Add to Favorites
Unauthorised access : physical penetration testing for IT security teams /
by
Allsopp, Wil
Published 2009
Call Number:
Loading
Located:
Loading
Loading...
Add to Favorites
Understanding and applying cryptography and data security /
by
Elbirt, Adam J
Published 2009
Call Number:
Loading
Located:
Loading
Loading...
Add to Favorites
Next generation SSH2 implementation : securing data in motion /
by
Liu, Dale
Published 2009
Call Number:
Loading
Located:
Loading
Loading...
MONOGRAPHS
Add to Favorites
Hacking exposed : network security secrets & solutions /
by
McClure, Stuart
Published 2009
Call Number:
Loading
Located:
Loading
Loading...
MONOGRAPHS
Add to Favorites
Architecting secure software systems /
by
Talukder, Asoke K
Published 2009
Call Number:
Loading
Located:
Loading
Loading...
MONOGRAPHS
Add to Favorites
Information security governance : a practical development and implementation approach /
by
Brotby, Krag
Published 2009
Call Number:
Loading
Located:
Loading
Loading...
MONOGRAPHS
Add to Favorites
Data protection : governance, risk management, and compliance /
by
Hill, David G
Published 2009
Call Number:
Loading
Located:
Loading
Loading...
MONOGRAPHS
Add to Favorites
Security software development : assessing and managing security risks /
by
Ashbaugh, Douglas A
Published 2009
Call Number:
Loading
Located:
Loading
Loading...
MONOGRAPHS
Add to Favorites
Applied algebra : codes, ciphers, and discrete algorithms /
by
Hardy, Darel W
Published 2009
Call Number:
Loading
Located:
Loading
Loading...
MONOGRAPHS
Add to Favorites
Gray hat Python : Python programming for hackers and reverse engineers /
by
Seitz, Justin
Published 2009
Call Number:
Loading
Located:
Loading
Loading...
MONOGRAPHS
Add to Favorites
Macintosh OS X, iPod, and iPhone forensic analysis DVD toolkit /
by
Kubasiak, Ryan R
Published 2009
Call Number:
Loading
Located:
Loading
Loading...
MONOGRAPHS
Add to Favorites
Principles of information security /
by
Whitman, Michael E
Published 2009
Call Number:
Loading
Located:
Loading
Loading...
MONOGRAPHS
Add to Favorites
How to secure and audit Oracle 10g and 11g /
by
Natan, Ron Ben
Published 2009
Call Number:
Loading
Located:
Loading
Loading...
MONOGRAPHS
Add to Favorites
Search Tools:
Get RSS Feed
Email this Search
Save Search
Narrow Search
Remove Filters
Year of Publication: 2009
Suggested Topics: Computer security
Call Number: Q - Science
Institution
KMUTT
(17)
Library
mai
(11)
Format
MONOGRAPHS
(11)
Call Number
Q - Science
Author
Allsopp, Wil
(1)
Ashbaugh, Douglas A
(1)
Brotby, Krag
(1)
Elbirt, Adam J
(1)
Hardy, Darel W
(1)
more ...
Hill, David G
(1)
Kubasiak, Ryan R
(1)
Liu, Dale
(1)
McClure, Stuart
(1)
Miller, Charlie
(1)
Natan, Ron Ben
(1)
Seitz, Justin
(1)
Talukder, Asoke K
(1)
Whitaker, Andrew
(1)
Whitman, Michael E
(1)
less ...
Language
English
(17)
Year of Publication
From:
To:
Search Options
Search History
Advanced Search
Find More
Browse the Catalog
Browse Alphabetically
Course Reserves
New Items
Need Help?
Search Tips
Ask a Librarian
FAQs
KMUTT-LM Website