Search ResultsElectronic Resources
Limit Search Results
Material Type
Language
Publication Date
-
Subject
Library
31 Results Found Subscribe to search results
0000000DEFAULT
Print
Select a list
Make this your default list.
The following items were successfully added.
    There was an error while adding the following items. Please try again.
      by 
      Foster, James C.
      Format: 
      Excerpt: 
      most devastating computer attacks to hit the Internet in recent years including SQL Slammer, Blaster
      by 
      Zelkowitz, Marvin V., 1945-
      Format: 
      Excerpt: 
      innovations in computer hardware, software, theory, design, and applications. It has also provided
      by 
      Baccas, Paul.
      Format: 
      Excerpt: 
      computer security. * Macintosh OS X Boot Process and Forensic Software All the power, all the tools, and
      by 
      Winkler, Ira.
      Format: 
      Excerpt: 
      Security Software; The 95/5 Rule; Chapter 14. Chance Favors the Prepared; Ubiquitous Security; The Purpose
      by 
      Long, Johnny.
      Format: 
      Excerpt: 
      computer crime and security-related topics. His unforgettable presentations are filled with three decades
      by 
      Leeuw, Karl de.
      Format: 
      Excerpt: 
      standards, viruses and worms on the Internet, computer transparency and free software, computer crime
      by 
      Contos, Brian T.
      Format: 
      Excerpt: 
      -- Hosting Pirated Software -- Pod-Slurping -- Auctioning State Property -- Writing Code for another Company