Search ResultsElectronic Resources
Limit Search Results
Author
Material Type
Language
Publication Date
-
Subject
Library
38 Results Found Subscribe to search results
000000000000DEFAULT
Print
Select a list
Make this your default list.
The following items were successfully added.
    There was an error while adding the following items. Please try again.
      by 
      Sagers, Glen., author.
      Format: 
      Excerpt: 
      individuals. The individual techniques and tools may vary by size, but everyone with a computer needs to turn
      by 
      Saltzer, J. H., 1939-
      Format: 
      Excerpt: 
      languages, software engineering, security, fault tolerance, and architecture. Through carefully analyzed
      by 
      Zelkowitz, Marvin V., 1945-
      Format: 
      Excerpt: 
      and Applications; 3. Multimedia Security; 6. Computer Forensics; 8. Security Protocols for Wireless
      by 
      Wiles, Jack.
      Format: 
      Excerpt: 
      This book provides IT security professionals with the information (hardware, software, and
      by 
      Bradley, Tony, 1969-
      Format: 
      Excerpt: 
      1. Foreword 2. Introduction 3. Basic Windows Security 4. Passwords 5. Antivirus Software 6
      by 
      Zelkowitz, Marvin V., 1945-
      Format: 
      Excerpt: 
      current subfield within computer science, with many citations, and often include new developments in the
      by 
      Zelkowitz, Marvin V., 1945-
      Format: 
      Excerpt: 
      security issues and includes topics like certifying computer professionals, non-invasive attacks
      by 
      Snedaker, Susan.
      MacEwan University Access (Unlimited Concurrent Users) from ScienceDirect
      ScienceDirect https://www.sciencedirect.com/science/book/9781931836128
      Format: 
      Excerpt: 
      Server Roles and Server Security; Security Templates and Software Updates; Managing Physical and Logical
      by 
      Baccas, Paul.
      Format: 
      Excerpt: 
      computer security. * Macintosh OS X Boot Process and Forensic Software All the power, all the tools, and
      by 
      Winkler, Ira.
      Format: 
      Excerpt: 
      Security Software; The 95/5 Rule; Chapter 14. Chance Favors the Prepared; Ubiquitous Security; The Purpose
      by 
      Smith, James E. (James Edward), 1950-
      MacEwan University Access (Unlimited Concurrent Users) from ScienceDirect
      ScienceDirect https://www.sciencedirect.com/science/book/9781558609105
      Format: 
      Excerpt: 
      in computer system design. They provide system security, flexibility, cross-platform compatibility
      by 
      Long, Johnny.
      Format: 
      Excerpt: 
      computer crime and security-related topics. His unforgettable presentations are filled with three decades