Search ResultsElectronic Resources
by
Sagers, Glen., author.
Format:
Excerpt:
individuals. The individual techniques and tools may vary by size, but everyone with a computer needs to turn
by
Saltzer, J. H., 1939-
ScienceDirect https://www.sciencedirect.com/science/book/9780123749574
Format:
Excerpt:
languages, software engineering, security, fault tolerance, and architecture. Through carefully analyzed
by
Zelkowitz, Marvin V., 1945-
Format:
Excerpt:
and Applications; 3. Multimedia Security; 6. Computer Forensics; 8. Security Protocols for Wireless
by
Wiles, Jack.
ScienceDirect http://www.sciencedirect.com/science/book/9781597492232
Format:
Excerpt:
This book provides IT security professionals with the information (hardware, software, and
by
Bradley, Tony, 1969-
ScienceDirect https://www.sciencedirect.com/science/book/9781597491143
Format:
Excerpt:
1. Foreword 2. Introduction 3. Basic Windows Security 4. Passwords 5. Antivirus Software 6
by
Zelkowitz, Marvin V., 1945-
Format:
Excerpt:
current subfield within computer science, with many citations, and often include new developments in the
by
Zelkowitz, Marvin V., 1945-
Format:
Excerpt:
security issues and includes topics like certifying computer professionals, non-invasive attacks
by
Snedaker, Susan.
MacEwan University Access (Unlimited Concurrent Users) from ScienceDirect
ScienceDirect https://www.sciencedirect.com/science/book/9781931836128
ScienceDirect https://www.sciencedirect.com/science/book/9781931836128
Format:
Excerpt:
Server Roles and Server Security; Security Templates and Software Updates; Managing Physical and Logical
by
Baccas, Paul.
ScienceDirect http://www.sciencedirect.com/science/book/9781597492546
Format:
Excerpt:
computer security. * Macintosh OS X Boot Process and Forensic Software All the power, all the tools, and
by
Winkler, Ira.
ScienceDirect https://www.sciencedirect.com/science/book/9781597491686
Format:
Excerpt:
Security Software; The 95/5 Rule; Chapter 14. Chance Favors the Prepared; Ubiquitous Security; The Purpose
by
Smith, James E. (James Edward), 1950-
MacEwan University Access (Unlimited Concurrent Users) from ScienceDirect
ScienceDirect https://www.sciencedirect.com/science/book/9781558609105
ScienceDirect https://www.sciencedirect.com/science/book/9781558609105
Format:
Excerpt:
in computer system design. They provide system security, flexibility, cross-platform compatibility
by
Long, Johnny.
ScienceDirect https://www.sciencedirect.com/science/book/9781597492157
Format:
Excerpt:
computer crime and security-related topics. His unforgettable presentations are filled with three decades




