Search again

Found: 7  Titles

Order by :    Show:   Per Page
image

image
Data protection from insider threats Elisa Bertino.
Author
Bertino, Elisa.
Published
San Rafael, Calif. (1537 Fourth Street, San Rafael, CA 94901 USA) : Morgan & Claypool, c2012.
Call Number
QA76.9.A25 B473 2012,005.8 23

image
Introduction to secure outsourcing computation / Xiaofeng Chen.
Author
Chen, Xiaofeng,
Call Number
QA76.585 .C445 2016,004.6782 23

image
Operating system security Trent Jaeger.
Author
Jaeger, Trent.
Published
San Rafael, Calif. (1537 Fourth Street, 1537 Fourth Street, San Rafael, CA 94901 USA) : Morgan & Claypool Publishers, c2008.
Call Number
QA76.9.A25 J34 2008,005.8 22

image

image
Security basics for computer architects / Ruby B. Lee.
Author
Lee, Ruby B.,
Call Number
MoCl 6812828 IEEE,QA76.9.A25 L447 2013,005.8 23

image
Usable security : history, themes, and challenges / Simson Garfinkel, Heather Richter Lipford.
Author
Garfinkel, Simson.,
Call Number
QA76.9.A25 G278 2014,005.8 23,MoCL 6920435 IEEE

Search Tools: Get RSS Feed
Style Switcher
Theme Colors

Layout Styles