|
|
81. |
|
For the record
Publication:
Washington, D.C. : National Academy Press, 1997
. 1 online resource (xix, 264 p.) :
Date:1997
Availability:
No items available:
Actions:
Add to cart (remove)
|
|
|
82. |
|
The international handbook of computer security
by Shim, Jae K.
Publication:
Chicago, Ill. : Glenlake Pub., 2000
. 1 online resource (xii, 260 pages)
, Includes index.
Date:2000
Availability:
No items available:
Actions:
Add to cart (remove)
|
|
|
83. |
|
Computer and intrusion forensics
Publication:
Boston : Artech House, 2003
. 1 online resource (xxi, 395 p.) :
Date:2003
Availability:
No items available:
Actions:
Add to cart (remove)
|
|
|
84. |
|
Key capabilities of an electronic health record system
Publication:
Washington, D.C. : National Academies Press, 2003
. 1 online resource (31 p.)
Date:2003
Availability:
No items available:
Actions:
Add to cart (remove)
|
|
|
85. |
|
A business guide to information security
by Calder, Alan,
Publication:
London ; | Sterling, VA : Kogan Page, 2005
. 1 online resource (viii 182 p.)
Date:2005
Availability:
No items available:
Actions:
Add to cart (remove)
|
|
|
86. |
|
Securing SCADA systems
by Krutz, Ronald L.,
Publication:
Indianapolis, Ind. : Wiley Pub., 2006
. 1 online resource (1 v.)
, Title from title screen.
Date:2006
Availability:
No items available:
Actions:
Add to cart (remove)
|
|
|
87. |
|
Information security
by McCann, Tiffany.
Publication:
Morristown, NJ : FEI Research Foundation, 2002
. 1 online resource.
Date:2002
Availability:
No items available:
Actions:
Add to cart (remove)
|
|
|
88. |
|
Finding and fixing vulnerabilities in information systems
Publication:
Santa Monica, CA : Rand, 2003
. 1 online resource (xxvi, 117 pages) :
Date:2003
Availability:
No items available:
Actions:
Add to cart (remove)
|
|
|
89. |
|
Protecting your library's digital sources
by Kahn, Miriam
Publication:
Chicago : American Library Association, 2004
. 1 online resource (xiii, 104 p.)
Date:2004
Availability:
No items available:
Actions:
Add to cart (remove)
|
|
|
90. |
|
The information systems security officer's guide
by Kovacich, Gerald L.
Publication:
Amsterdam ; | Boston : Butterworth-Heinemann, 2003
. 1 online resource (xxviii, 361 p.) :
Date:2003
Availability:
No items available:
Actions:
Add to cart (remove)
|
|
|
91. |
|
Disaster recovery planning
by Sandhu, Roopendra Jeet.
Publication:
Cincinnati, Ohio : Premier Press, 2002
. 1 online resource (xxvi, 294 p.) :
, Includes index.
Date:2002
Availability:
No items available:
Actions:
Add to cart (remove)
|
|
|
92. |
|
Configuring Symantec antivirus
by Hunter, Laura E.
Publication:
Rockland, MA : Syngress, 2003
. 1 online resource (xxxiii, 717 p.) :
, Includes index.
Date:2003
Availability:
No items available:
Actions:
Add to cart (remove)
|
|
|
93. |
|
Introduction to computer and network security :
Publication:
Boca Raton, FL. : CRC P., 2014
. xxiv, 295 p. :
Date:2014
Availability:
Copies available:
Turkeyen Campus
Science & Technology
[QA76.9.A25 B76]
(2),
Actions:
Add to cart (remove)
|
|
|
94. |
|
Information assurance :
Publication:
London : Springer, 2006
. xiii, 259 p :
Date:2006
Availability:
Copies available:
Turkeyen Campus
Science & Technology
[QA76.9.A25 B55 2006]
(2),
Actions:
Add to cart (remove)
|
|
|
95. |
|
Information technology and the law /
Publication:
Lelystad : Koninklijke Vermande, 1991
. vi, 87 p.
Date:1991
Availability:
Copies available:
Turkeyen Campus
Law Collection
[KM258 I5413]
(1),
Actions:
Add to cart (remove)
|
|
|
96. |
|
Security in computing /
Publication:
Upper Siddle River, NJ. : Pearson Education, 2015
. xxxiii, 910 p. :
Date:2015
Availability:
Copies available:
Turkeyen Campus
Science & Technology
[QA76.9 A25 P45 2015]
(2),
Actions:
Add to cart (remove)
|
|