Search again

Found: 243  Titles

Order by :    Show:   Per Page
image
Trust management in cloud services Talal H. Noor, Quan Z. Sheng, Athman Bouguettaya.
Author
Noor, Talal H.
Published
Cham : Springer, c2014.
Call Number
Ebook

image
Trust, complexity and control : confidence in a convergent world / Piotr Cofta.
Author
Cofta, Piotr.
Published
Chichester : John Wiley, c2007.
Call Number
QA76.9.A25 C62t
Location
ห้องสมุดสำนักการเรียนรู้ตลอดชีวิตฯ

image
Trustworthy execution on mobile devices Amit Vasudevan, Jonathan M. McCune, James Newsome.
Author
Vasudevan, Amit.
Published
New York, NY : Springer, c2014.
Call Number
Ebook

image
Understanding and applying cryptography and data security / Adam J. Elbirt
Author
Elbirt, Adam J
Published
Boca Raton : CRC Press, c2009
Call Number
QA76.9.A25 E4u
Location
ห้องสมุดสำนักการเรียนรู้ตลอดชีวิตฯ

image
Understanding public-key infrastructure : concepts, standards, and deployment considerations / Carlisle Adams, Steve Lloyd.
Author
Adams, Carlisle.
Published
Indianapolis, IN : Macmillan Technical, c1999.
Call Number
QA76.9.A25 A3u
Location
ห้องสมุดสำนักการเรียนรู้ตลอดชีวิตฯ

image
UNIX security for the organization / R. Bringle Bryant.
Author
Bryant, R. Bringle.
Published
Indianapolis, IN : Sams, c1994.
Call Number
QA76.76.O63 B77u
Location
ห้องสมุดสำนักการเรียนรู้ตลอดชีวิตฯ

image
Usable security : history, themes, and challenges / Simson Garfinkel, Heather Richter Lipford.
Author
Garfinkel, Simson.,
Call Number
QA76.9.A25 G278 2014,005.8 23,MoCL 6920435 IEEE

image
Usable security usable securiy history, themes, and challenges / Stephen Weatherill.
Author
Garfinkel, Simson.
Published
Cham : Springer, c2014.
Call Number
Ebook

image
User's guide to cryptography and standards / Alexander W. Dent, Chris J. Mitchell.
Author
Dent, Alexander W.
Published
Boston : Artech House, c2005.
Call Number
QA76.9.A25 D404u
Location
ห้องสมุดสำนักการเรียนรู้ตลอดชีวิตฯ

image
Viruses revealed / David Harley, Robert Slade, Urs Gattiker.
Author
Harley, David.
Published
Berkeley, CA. : Osborne/McGraw-Hill, c2001.
Call Number
QA76.76.C68 H31v
Location
ห้องสมุดวิทยาเขตชุมพรเขตรอุดมศักดิ์

image
Web service security : scenarios, patterns, and implementation guidance for Web Services Enhancements (WSE) 3.0 / Jason Hogg ... [et al.]
Author
Hogg, Jason.
Published
[S.l.] : Microsoft Corporation, c2005.
Call Number
TK5105.875.I57 W39
Location
ห้องสมุดสำนักการเรียนรู้ตลอดชีวิตฯ

image
What is computer science? an information security perspective / Daniel Page, Nigel Smart.
Author
Page, Daniel.
Published
Cham : Springer, c2014.
Call Number
Ebook

image
White hat toolbox : security tools, tricks and traces / Laura A. Chappell
Author
Chappell, Laura A
Published
Saratoga, CA : Podbooks.com, c2003-2004.
Call Number
TK5105.59 C45w
Location
ห้องสมุดสำนักการเรียนรู้ตลอดชีวิตฯ

image
Windows NT security handbook / Tom Sheldon.
Author
Sheldon, Tom.
Published
Berkeley : Osborne McGraw-Hill, c1997.
Call Number
QA76.76.O63 S46w
Location
ห้องสมุดสำนักการเรียนรู้ตลอดชีวิตฯ

image
Wireless security : models, threats, and solutions / Randall K. Nichols, Panos C. Lekkas.
Author
Nichols, Randall K.
Published
New York : McGraw-Hill, c2002.
Call Number
QA76.9.A25 N51w
Location
ห้องสมุดสำนักการเรียนรู้ตลอดชีวิตฯ

Search Tools: Get RSS Feed
Style Switcher
Theme Colors

Layout Styles