Search ResultsElectronic Resources
Limit Search Results
Author
Material Type
Language
Subject
Library
67 Results Found Subscribe to search results
000000000000DEFAULT
Print
Select a list
Make this your default list.
The following items were successfully added.
    There was an error while adding the following items. Please try again.
      by 
      Bradley, Tony, 1969-
      Format: 
      Excerpt: 
      Computers -- Access control -- Passwords.
      by 
      Beale, Jay.
      Format: 
      Excerpt: 
      Computers -- Access control.
      by 
      Ransome, James.
      Format: 
      Excerpt: 
      control and manage a secure software development process in the form of best practices and metrics
      by 
      Mao, Wenji.
      Format: 
      Excerpt: 
      Parallel Control -- Part 4. Socio-Cultural Computing and ISI: A Synthesis -- 7. Social Computing in ISI: An
      by 
      Andress, Jason.
      Format: 
      Excerpt: 
      . Authorization and Access control Chapter 4. Auditing and Accountability Chapter 5. Cryptography Chapter 6
      by 
      Andress, Jason.
      Format: 
      Excerpt: 
      . Authorization and Access control Chapter 4. Auditing and Accountability Chapter 5. Cryptography Chapter 6
      by 
      Cole, Eric.
      Format: 
      Excerpt: 
      Insider Threat; Chapter 9 Response: Technologies That Can Be Used to Control the Insider Threat; Chapter
      by 
      Wotring, Brian.
      Format: 
      Excerpt: 
      changes. In other words, it's change control in a potentially hostile environment. Best of all, this book
      by 
      Winkler, J. R. (Joachim R.)
      Format: 
      Excerpt: 
      fundamental concern. Loss of certain control and lack of trust make this transition difficult unless you know
      by 
      Fair, Ted.
      Format: 
      Excerpt: 
      control -- Spying on the PC -- Spying on Web browsing -- Spying on e-mail -- Spying on chat and instant
      by 
      131ah.
      Format: 
      Excerpt: 
      Control yourself / The lagos creeper / Product of fate: the evolution of a hacker / A real gullible
      by 
      Shein, Rob.
      Format: 
      Excerpt: 
      8. Exploit Impact; Chapter 9. Damage Control; Chapter 10. Recovery; Appendix: The Laws of Security