Loading...
Error: Cannot Load Popup Box
Language:
English
Deutsch
Español
Français
Italiano
日本語
Nederlands
Português
中文(简体)
中文(繁體)
Thai
Türkçe
עברית
Gaeilge
Cymraeg
Ελληνικά
Català
Euskara
Русский
čeština
Search For:
in:
All Fields
Title
Author
Subject
Call Number
ISBN/ISSN
Tag
Advanced
Retain my current filters
Home
>
Search:
Suggested Topics
... within your search.
Computer networks
Computer security
Electronic books
(53)
Congresses
(23)
Security measures
(22)
Data encryption (Computer science)
(15)
more ...
Additional Suggested Topics
... within your search.
Data protection
(13)
Information technology
(12)
Electronic book
(9)
Computer crimes
(7)
Microsoft Windows (Computer file)
(6)
Computers
(5)
Congresses and conventions
(5)
Computer hackers
(4)
Electronic data processing departments
(4)
Internet
(4)
Web services
(4)
Artificial intelligence
(3)
Cryptography
(3)
Database management
(3)
Electronic commerce
(3)
Machine learning
(3)
Operating systems (Computers)
(3)
Access control
(2)
Business enterprises
(2)
Component software
(2)
Computer network security
(2)
Computer software
(2)
Digital communications
(2)
Management
(2)
less ...
Showing
1
-
20
of
136
for search:
''
, query time: 0.03s
Sort
Relevance
Date Descending
Date Ascending
Call Number
Author
Title
Network and internetwork security : principles and practice /
by
Stallings, William
Published 1995
Call Number:
Loading
Located:
Loading
Loading...
Add to Favorites
The database hacker's handbook : defending database servers /
Published 2005
Call Number:
Loading
Located:
Loading
Loading...
Add to Favorites
Enhancing computer security with smart technology /
Published 2006
Call Number:
Loading
Located:
Loading
Full Text
Add to Favorites
Complete characterization of security notions for probabilistic private-key encryption
by
Katz, Jonathan
Call Number:
Loading
Located:
Loading
Loading...
Add to Favorites
Security in communication networks : third international conference, SCN 2002, Amalfi, Italy, September 11-13, 2002 : revised papers /
Published 2003
Call Number:
Loading
Located:
Loading
Loading...
Add to Favorites
Building an effective information security policy architecture /
by
Bacik, Sandy
Published 2008
Call Number:
Loading
Located:
Loading
Full Text
Add to Favorites
Public key infrastructure building trusted applications and Web services /
Published 2004
Call Number:
Loading
Located:
Loading
Full Text
Add to Favorites
Securing e-business applications and communications
by
Held, Jonathan S
Published 2001
Call Number:
Loading
Located:
Loading
Full Text
Add to Favorites
Secure computers and networks analysis, design, and implementation /
by
Fisch, Eric A
Published 2000
Call Number:
Loading
Located:
Loading
Full Text
Add to Favorites
Mechanics of user identification and authentication fundamentals of identity management /
by
Todorov, Dobromir.
Published 2007
Call Number:
Loading
Located:
Loading
Full Text
Add to Favorites
Information assurance architecture
by
Willett, Keith D
Published 2008
Call Number:
Loading
Located:
Loading
Full Text
Add to Favorites
Information security risk analysis
by
Peltier, Thomas R
Published 2005
Call Number:
Loading
Located:
Loading
Full Text
Add to Favorites
A practical guide to security assessments
by
Kairab, Sudhanshu
Published 2005
Call Number:
Loading
Located:
Loading
Full Text
Add to Favorites
Effective leadership skills for the CISO
Published 2008
Call Number:
Loading
Located:
Loading
book distributed by CRC Press. Purchase or institutional license may be required for access.
Add to Favorites
Enhancing computer security with smart technology
Published 2006
Call Number:
Loading
Located:
Loading
book distributed by CRC Press. Purchase or institutional license may be required for access.
Add to Favorites
Effective leadership skills for the CISO
Published 2008
Call Number:
Loading
Located:
Loading
book distributed by CRC Press. Purchase or institutional license may be required for access.
Add to Favorites
Enhancing computer security with smart technology
Published 2006
Call Number:
Loading
Located:
Loading
book distributed by CRC Press. Purchase or institutional license may be required for access.
Add to Favorites
Practical embedded security : building secure resource-constrained systems /
by
Stapko, Timothy
Published 2008
Call Number:
Loading
Located:
Loading
Loading...
Add to Favorites
Security power tools /
Published 2007
Call Number:
Loading
Located:
Loading
Loading...
Add to Favorites
Network security and management /
by
Singh, Brijendra
Published 2007
Call Number:
Loading
Located:
Loading
Loading...
Add to Favorites
1
2
3
4
5
6
7
Next »
Search Tools:
Get RSS Feed
Email this Search
Save Search
Narrow Search
Remove Filters
Suggested Topics: Computer networks
Suggested Topics: Computer security
Institution
KMUTT
(136)
Library
mai
(50)
Format
MONOGRAPHS
(36)
EBOOKS
(13)
PERIODICALS
(1)
Call Number
Q - Science
(84)
T - Technology
(42)
H - Social Science
(6)
K - Law
(1)
Z - Library Science
(1)
Author
Bacik, Sandy
(2)
Carvey, Harlan
(2)
Kissell, Joe
(2)
McClure, Stuart
(2)
Panko, Raymond R
(2)
more ...
Stallings, William
(2)
Whitman, Michael E
(2)
Ashbaugh, Douglas A
(1)
Barrett, Daniel J
(1)
Basin, David
(1)
Bergman, Neil
(1)
Bertocci, Vittorio
(1)
Bragg, Roberta
(1)
Buchanan, William
(1)
Cappelli, Dawn
(1)
Colantonio, Alessandro
(1)
Conrad, Eric
(1)
Cremers, Cas
(1)
Dalziel, Henry
(1)
Davis, Michael A
(1)
Dowd, Mark
(1)
Dunning, Ted
(1)
Fisch, Eric A
(1)
Gibson, Darril
(1)
Gregg, Michael
(1)
Gregory, Peter
(1)
Gulati, Madhup
(1)
Held, Jonathan S
(1)
Hoffman, Billy
(1)
Howard, Michael
(1)
less ...
Language
English
(134)
Thai
(2)
Genre
Electronic books
(7)
Periodicals
(1)
Region
United States
(2)
Year of Publication
From:
To:
Search Options
Search History
Advanced Search
Find More
Browse the Catalog
Browse Alphabetically
Course Reserves
New Items
Need Help?
Search Tips
Ask a Librarian
FAQs
KMUTT-LM Website