Loading...
Error: Cannot Load Popup Box
Language:
English
Deutsch
Español
Français
Italiano
日本語
Nederlands
Português
中文(简体)
中文(繁體)
Thai
Türkçe
עברית
Gaeilge
Cymraeg
Ελληνικά
Català
Euskara
Русский
čeština
Search For:
in:
All Fields
Title
Author
Subject
Call Number
ISBN/ISSN
Tag
Advanced
Retain my current filters
Home
>
Search:
Suggested Topics
... within your search.
Computer security
Electronic books
(161)
Computer networks
(136)
Cryptography
(82)
Data protection
(81)
Computer science
(71)
more ...
Additional Suggested Topics
... within your search.
Data encryption (Computer science)
(68)
Congresses
(66)
Congresses and conventions
(51)
ความปลอดภัยในระบบคอมพิวเตอร์
(40)
Computer crimes
(37)
Computer access control
(36)
Computer communication systems
(35)
Security measures
(33)
Information technology
(32)
Computer hackers
(31)
Coding theory
(28)
Electronic book
(26)
Management information systems
(21)
Number theory
(21)
Computers
(20)
Algorithms
(18)
แฮกเกอร์
(17)
Computers and civilization
(15)
Computer software
(12)
Electrical engineering
(12)
Microsoft Windows (Computer file)
(12)
Artificial intelligence
(11)
Computer network security
(11)
Database security
(11)
less ...
Showing
121
-
140
of
674
for search:
''
, query time: 0.03s
Sort
Relevance
Date Descending
Date Ascending
Call Number
Author
Title
Securing e-business applications and communications
by
Held, Jonathan S
Published 2001
Call Number:
Loading
Located:
Loading
Full Text
Add to Favorites
Secure computers and networks analysis, design, and implementation /
by
Fisch, Eric A
Published 2000
Call Number:
Loading
Located:
Loading
Full Text
Add to Favorites
Managing an information security and privacy awareness and training program
by
Herold, Rebecca.
Published 2005
Call Number:
Loading
Located:
Loading
Full Text
Add to Favorites
Mechanics of user identification and authentication fundamentals of identity management /
by
Todorov, Dobromir.
Published 2007
Call Number:
Loading
Located:
Loading
Full Text
Add to Favorites
Oracle identity management governance, risk, and compliance architecture /
by
Pohlman, Marlin B.
Published 2008
Call Number:
Loading
Located:
Loading
Full Text
Add to Favorites
Information warfare in business strategies of control and resistance in the network society /
by
Munro, Iain
Published 2005
Call Number:
Loading
Located:
Loading
Full Text
Add to Favorites
Information security policies and procedures a practitioner's reference /
by
Peltier, Thomas R.
Published 2004
Call Number:
Loading
Located:
Loading
Full Text
Add to Favorites
Investigator's guide to steganography
by
Kipper, Gregory.
Published 2004
Call Number:
Loading
Located:
Loading
Full Text
Add to Favorites
Information assurance architecture
by
Willett, Keith D
Published 2008
Call Number:
Loading
Located:
Loading
Full Text
Add to Favorites
Information security policies, procedures, and standards guidelines for effective information security management /
by
Peltier, Thomas R
Published 2002
Call Number:
Loading
Located:
Loading
Full Text
Add to Favorites
Information security management handbook
Published 2003
Call Number:
Loading
Located:
Loading
Full Text
Add to Favorites
How to achieve 27001 certification an example of applied compliance management /
by
Arnason, Sigurjon Thor
Published 2008
Call Number:
Loading
Located:
Loading
Full Text
Add to Favorites
Information security design, implementation, measurement, and compliance /
by
Layton, Timothy P
Published 2007
Call Number:
Loading
Located:
Loading
Full Text
Add to Favorites
Information security cost management
by
Bazavan, Ioana V
Published 2007
Call Number:
Loading
Located:
Loading
Full Text
Add to Favorites
Information security architecture
by
Tudor, Jan Killmeyer
Published 2000
Call Number:
Loading
Located:
Loading
Full Text
Add to Favorites
Information security risk analysis
by
Peltier, Thomas R
Published 2005
Call Number:
Loading
Located:
Loading
Full Text
Add to Favorites
Insider computer fraud an in-depth framework for detecting and defending against insider IT attacks /
by
Brancik, Kenneth C
Published 2008
Call Number:
Loading
Located:
Loading
Full Text
Add to Favorites
Information security management handbook.
Published 2005
Call Number:
Loading
Located:
Loading
Full Text
Add to Favorites
Information security management handbook.
Published 2008
Call Number:
Loading
Located:
Loading
Full Text
Add to Favorites
Information security management handbook.
Published 2003
Call Number:
Loading
Located:
Loading
Full Text
Add to Favorites
[1]
« Prev
2
3
4
5
6
7
8
9
10
11
12
Next »
[34]
Search Tools:
Get RSS Feed
Email this Search
Save Search
Narrow Search
Remove Filters
Suggested Topics: Computer security
Institution
KMUTT
(674)
Library
mai
(263)
zzz
(5)
Format
MONOGRAPHS
(137)
EBOOKS
(124)
RESEARCHREP
(3)
PERIODICALS
(2)
ARTICLES
(1)
more ...
SENPROJECTS
(1)
less ...
Call Number
Q - Science
(464)
T - Technology
(87)
H - Social Science
(30)
A - General Works
(1)
K - Law
(1)
more ...
M - Music
(1)
Z - Library Science
(1)
less ...
Author
Whitman, Michael E
(7)
Peltier, Thomas R
(4)
Scambray, Joel
(4)
Stanek, William R
(4)
ทศพล กนกนุวัตร์
(4)
more ...
Coppersmith, Don
(3)
Herrmann, Debra S.
(3)
Knudsen, Lars R
(3)
Stallings, William
(3)
จตุชัย แพงจันทร์
(3)
Anderson, Ross J
(2)
Androulidakis, Iosif I
(2)
Ayala, Luis
(2)
Bacik, Sandy
(2)
Carvey, Harlan
(2)
Cooper, James Arlin
(2)
Cramer, Ronald
(2)
Ferguson, Niels
(2)
Gregory, Peter
(2)
Herrmann, Debra S
(2)
Jang, Michael
(2)
Katz, Jonathan
(2)
Kissell, Joe
(2)
Konheim, Alan G
(2)
Long, Johnny
(2)
McClure, Stuart
(2)
Nemati, Hamid
(2)
Panko, Raymond R
(2)
Peltier, Thomas R.
(2)
Pfleeger, Charles P
(2)
less ...
Language
English
(633)
Thai
(41)
Genre
Electronic books
(19)
Case studies
(1)
Periodicals
(1)
Study guides
(1)
Region
United States
(3)
Year of Publication
From:
To:
Search Options
Search History
Advanced Search
Find More
Browse the Catalog
Browse Alphabetically
Course Reserves
New Items
Need Help?
Search Tips
Ask a Librarian
FAQs
KMUTT-LM Website