Loading...
Error: Cannot Load Popup Box
Language:
English
Deutsch
Español
Français
Italiano
日本語
Nederlands
Português
中文(简体)
中文(繁體)
Thai
Türkçe
עברית
Gaeilge
Cymraeg
Ελληνικά
Català
Euskara
Русский
čeština
Search For:
in:
All Fields
Title
Author
Subject
Call Number
ISBN/ISSN
Tag
Advanced
Retain my current filters
Home
>
Search:
Suggested Topics
... within your search.
Computer security
Computer networks
(8)
Data protection
(6)
Information technology
(6)
Computer crimes
(3)
Computer hackers
(2)
more ...
Additional Suggested Topics
... within your search.
Algorithms
(1)
Application software
(1)
Business
(1)
Business enterprises
(1)
Coding theory
(1)
Computer architecture
(1)
Cryptography
(1)
Data encryption (Computer science)
(1)
Data recovery (Computer science)
(1)
Database security
(1)
Electronic data processing
(1)
Encyclopedias and dictionaries
(1)
Internet
(1)
Macintosh (Computer)
(1)
Mathematics
(1)
Microsoft Windows (Computer file)
(1)
Operating systems (Computers)
(1)
Oracle (Computer file)
(1)
Python (Computer program language)
(1)
Security measures
(1)
Security systems
(1)
Telecommunications engineers
(1)
UNIX Shells
(1)
less ...
Showing
1
-
20
of
23
for search:
''
, query time: 0.89s
Sort
Relevance
Date Descending
Date Ascending
Call Number
Author
Title
Algorithms, architectures and information systems security /
Published 2009
Call Number:
Loading
Located:
Loading
Loading...
Add to Favorites
Distributed systems security : issues, processes, and solutions /
Published 2009
Call Number:
Loading
Located:
Loading
Loading...
Add to Favorites
The Mac hacker's handbook /
by
Miller, Charlie
Published 2009
Call Number:
Loading
Located:
Loading
Loading...
Add to Favorites
Chained exploits : advanced hacking attacks from start to finish /
by
Whitaker, Andrew
Published 2009
Call Number:
Loading
Located:
Loading
Loading...
Add to Favorites
Unauthorised access : physical penetration testing for IT security teams /
by
Allsopp, Wil
Published 2009
Call Number:
Loading
Located:
Loading
Loading...
Add to Favorites
Understanding and applying cryptography and data security /
by
Elbirt, Adam J
Published 2009
Call Number:
Loading
Located:
Loading
Loading...
Add to Favorites
Next generation SSH2 implementation : securing data in motion /
by
Liu, Dale
Published 2009
Call Number:
Loading
Located:
Loading
Loading...
MONOGRAPHS
Add to Favorites
Introduction to network security /
by
Jacobson, Douglas
Published 2009
Call Number:
Loading
Located:
Loading
Loading...
MONOGRAPHS
Add to Favorites
CISO soft skills : securing organizations impaired by employee politics, apathy, and intolerant perspectives /
by
Collette, Ron
Published 2009
Call Number:
Loading
Located:
Loading
Loading...
MONOGRAPHS
Add to Favorites
Hacking exposed : network security secrets & solutions /
by
McClure, Stuart
Published 2009
Call Number:
Loading
Located:
Loading
Loading...
MONOGRAPHS
Add to Favorites
Architecting secure software systems /
by
Talukder, Asoke K
Published 2009
Call Number:
Loading
Located:
Loading
Loading...
MONOGRAPHS
Add to Favorites
Information security governance : a practical development and implementation approach /
by
Brotby, Krag
Published 2009
Call Number:
Loading
Located:
Loading
Loading...
MONOGRAPHS
Add to Favorites
Cyber fraud : tactics, techniques, and procedures /
Published 2009
Call Number:
Loading
Located:
Loading
Loading...
MONOGRAPHS
Add to Favorites
Encyclopedia of cybercrime /
Published 2009
Call Number:
Loading
Located:
Loading
Loading...
MONOGRAPHS
Add to Favorites
Data protection : governance, risk management, and compliance /
by
Hill, David G
Published 2009
Call Number:
Loading
Located:
Loading
Loading...
MONOGRAPHS
Add to Favorites
Security software development : assessing and managing security risks /
by
Ashbaugh, Douglas A
Published 2009
Call Number:
Loading
Located:
Loading
Loading...
MONOGRAPHS
Add to Favorites
CISSP exam cram /
by
Gregg, Michael
Published 2009
Call Number:
Loading
Located:
Loading
Loading...
MONOGRAPHS
Add to Favorites
Applied algebra : codes, ciphers, and discrete algorithms /
by
Hardy, Darel W
Published 2009
Call Number:
Loading
Located:
Loading
Loading...
MONOGRAPHS
Add to Favorites
Gray hat Python : Python programming for hackers and reverse engineers /
by
Seitz, Justin
Published 2009
Call Number:
Loading
Located:
Loading
Loading...
MONOGRAPHS
Add to Favorites
Macintosh OS X, iPod, and iPhone forensic analysis DVD toolkit /
by
Kubasiak, Ryan R
Published 2009
Call Number:
Loading
Located:
Loading
Loading...
MONOGRAPHS
Add to Favorites
1
2
Next »
Search Tools:
Get RSS Feed
Email this Search
Save Search
Narrow Search
Remove Filters
Year of Publication: 2009
Suggested Topics: Computer security
Institution
KMUTT
(23)
Library
mai
(17)
Format
MONOGRAPHS
(17)
Call Number
Q - Science
(17)
H - Social Science
(3)
T - Technology
(3)
Author
Allsopp, Wil
(1)
Ashbaugh, Douglas A
(1)
Brotby, Krag
(1)
Brotby, W. Krag
(1)
Collette, Ron
(1)
more ...
Elbirt, Adam J
(1)
Gregg, Michael
(1)
Hardy, Darel W
(1)
Hill, David G
(1)
Jacobson, Douglas
(1)
Kubasiak, Ryan R
(1)
Liu, Dale
(1)
McClure, Stuart
(1)
Miller, Charlie
(1)
Natan, Ron Ben
(1)
Seitz, Justin
(1)
Talukder, Asoke K
(1)
Whitaker, Andrew
(1)
Whitman, Michael E
(1)
less ...
Language
English
(23)
Year of Publication
From:
To:
Search Options
Search History
Advanced Search
Find More
Browse the Catalog
Browse Alphabetically
Course Reserves
New Items
Need Help?
Search Tips
Ask a Librarian
FAQs
KMUTT-LM Website