Search again

Found: 7  Titles

Order by :    Show:   Per Page
image

image
Data protection from insider threats Elisa Bertino.
Author
Bertino, Elisa.
Published
San Rafael, Calif. (1537 Fourth Street, San Rafael, CA 94901 USA) : Morgan & Claypool, c2012.
Call Number
QA76.9.A25 B473 2012,005.8 23

image
Introduction to secure outsourcing computation / Xiaofeng Chen.
Author
Chen, Xiaofeng,
Call Number
QA76.585 .C445 2016,004.6782 23

image
Learn ethical hacking from scratch your stepping stone to penetration testing / Zaid Sabih.
Author
Sabih, Zaid.
Published
Birmingham, UK : Packt Publishing, c2018.
Call Number
Ebook

image

image
Security basics for computer architects / Ruby B. Lee.
Author
Lee, Ruby B.,
Call Number
MoCl 6812828 IEEE,QA76.9.A25 L447 2013,005.8 23

image
Usable security : history, themes, and challenges / Simson Garfinkel, Heather Richter Lipford.
Author
Garfinkel, Simson.,
Call Number
QA76.9.A25 G278 2014,005.8 23,MoCL 6920435 IEEE

Search Tools: Get RSS Feed
Style Switcher
Theme Colors

Layout Styles