Search again

Found: 22  Titles

Order by :    Show:   Per Page
image

image

image
Data protection from insider threats Elisa Bertino
Author
Bertino, Elisa.
Published
[San Rafael, CA] : Morgan & Claypool, c2012.
Call Number
Ebook

image
Data protection from insider threats Elisa Bertino.
Author
Bertino, Elisa.
Published
San Rafael, Calif. (1537 Fourth Street, San Rafael, CA 94901 USA) : Morgan & Claypool, c2012.
Call Number
QA76.9.A25 B473 2012,005.8 23

image
Hacking exposed tm 6 : network security secrets & solutions / Stuart McClure, Joel Scambray, George Kurtz.
Author
McClure, Stuart.
Published
New York : McGraw-Hill, c2009.
Call Number
TK5105.59 M248h 2009
Location
ห้องสมุดสำนักการเรียนรู้ตลอดชีวิตฯ

image
Hacking exposed VoIP : voice over IP security secrets & solutions / David Endler, Mark Collier
Author
Endler, David
Published
New York, NY : McGraw-Hill, c2007.
Call Number
QA76.9.A25 E6h
Location
ห้องสมุดสำนักการเรียนรู้ตลอดชีวิตฯ

image
Implementing database security and auditing : a guide for DBAs, information security administrators and auditors / Ron Ben Natan.
Author
Ben-Natan, Ron.
Published
Amsterdam : Elsevier, c2005.
Call Number
QA76.9.A25 B404i
Location
ห้องสมุดสำนักการเรียนรู้ตลอดชีวิตฯ

image
Information security fundamentals / Thomas R. Peltier, Justin Peltier, John Blackley.
Author
Peltier, Thomas R.
Published
Boca Raton : Auerbach, c2005.
Call Number
QA76.9.A25 P4i
Location
ห้องสมุดสำนักการเรียนรู้ตลอดชีวิตฯ

image
Information technology risk management in enterprise environments : a review of industry practices and a practical guide to risk management teams / Jake Kouns, Daniel Minoli.
Author
Kouns, Jake.
Published
Hoboken, NJ : John Wiley, c2010.
Call Number
HF5548.37 K663i
Location
ห้องสมุดสำนักการเรียนรู้ตลอดชีวิตฯ

image

image
Introduction to cryptology and PC security / Brian Beckett.
Author
Beckett, Brian.
Published
London : McGraw-Hill, c1997.
Call Number
QA76.9.A25 B4i
Location
ห้องสมุดสำนักการเรียนรู้ตลอดชีวิตฯ

image
Privacy vs. security Sophie Stalla-Bourdillon, Joshua Phillips, Mark D. Ryan.
Author
Stalla-Bourdillon, Sophie.
Published
Berlin : Springer, c2014.
Call Number
Ebook

image
Protection and security on the information superhighway / Frederick B. Cohen.
Author
Cohen, Frederick B.
Published
New York : John Wiley, c1995.
Call Number
QA76.9.A25 C625p
Location
ห้องสมุดสำนักการเรียนรู้ตลอดชีวิตฯ

image
Security in computing / Charles P. Pfleeger, Shari Lawrence Pfleeger.
Author
Pfleeger, Charles P.
Published
Upper Saddle River, NJ : Prentice Hall, c2007.
Call Number
QA76.9.A25 P45s 2007
Location
ห้องสมุดสำนักการเรียนรู้ตลอดชีวิตฯ

image
Security in computing / Charles P. Pfleeger.
Author
Pfleeger, Charles P.
Published
Upper Saddle River, NJ : Prentice-Hall, c1997.
Call Number
QA76.9.A25 P45s 1997
Location
ห้องสมุดสำนักการเรียนรู้ตลอดชีวิตฯ

Search Tools: Get RSS Feed
Style Switcher
Theme Colors

Layout Styles