21. Relation based access control / by Zhang, Rui, Publication: . 1 online resource (v, 114 pages) : , Part of the author's thesis (Ph .D.), Dept. of Information Engineering and Computer Science, University of Trento. Availability: No items available: Actions: Add to cart
22. Access contested   Publication: Cambridge, MA : MIT Press, 2012 . 1 online resource (xv, 414 p.) : Date:2012 Availability: No items available: Actions: Add to cart
23. Designing and implementing Linux firewalls and QoS using netfilter, iproute2, NAT, and L7-filter by Gheorghe, Lucian. Publication: Birmingham, U.K. : Packt Pub., 2006 . 1 online resource (v, 272 p.) : , "Learn how to secure your system and implement QoS using real-world scenarios for networks of all sizes." | Includes index. Date:2006 Availability: No items available: Actions: Add to cart
24. Data breaches   Publication: Ely, U.K. : IT Governance Pub., 2008 . 1 online resource (120 p.) : , Title from home page (viewed Jan. 4, 2011). Date:2008 Availability: No items available: Actions: Add to cart
25. Mastering Microsoft Forefront UAG 2010 customization by Ben-Ari, Erez. Publication: Birmingham, UK : Packt Publishing, 2012 . 1 online resource (iii, 173 p.) : , Title from PDF title page (viewed on Mar. 27, 2012). | "Professional expertise distilled"--Cover. | Includes index. Date:2012 Availability: No items available: Actions: Add to cart
26. Gray hat Python by Seitz, Justin. Publication: San Francisco : No Starch Press, 2009 . 1 online resource (xx, 189 p.) : Date:2009 Availability: No items available: Actions: Add to cart No cover image available No cover image available
27. Hacking by Erickson, Jon, Publication: San Francisco, Calif. : No Starch Press, 2008 . 1 online resource (x, 472 p.) : Date:2008 Availability: No items available: Actions: Add to cart No cover image available No cover image available
28. Linux firewalls by Rash, Michael. Publication: San Francisco : No Starch Press, 2007 . 1 online resource (xix, 308 p.) : , Includes index. Date:2007 Availability: No items available: Actions: Add to cart
29. Silence on the Wire by Zalewski, Michal. Publication: San Francisco : No Starch Press, 2005 . 1 online resource (314 p.) Date:2005 Availability: No items available: Actions: Add to cart
30. The tangled Web by Zalewski, Michal. Publication: San Francisco : No Starch Press, 2012 . 1 online resource (xix, 299 p.) : Date:2012 Availability: No items available: Actions: Add to cart
31. Databases and information systems VI   Publication: Amsterdam ; | Washington, DC : IOS Press, 2010 . 1 online resource (439 p.) : Date:2010 Availability: No items available: Actions: Add to cart
32. PfSense 2 cookbook by Williamson, Matt. Publication: Birmingham, UK : Packt, 2011 . 1 online resource (234 p.) : , Includes index. Date:2011 Availability: No items available: Actions: Add to cart
33. Web commerce security by Nahari, Hadi. Publication: Indianapolis : Wiley Pub., 2011 . 1 online resource (xxix, 474 p.) : Date:2011 Availability: No items available: Actions: Add to cart
34. Lessons from the identity trail   Publication: Oxford ; | New York : Oxford University Press, 2009 . 1 online resource (xxxi, 554 p.) : Date:2009 Availability: No items available: Actions: Add to cart
35. Intrusion detection by Yu, Zhenwei. Publication: London : | Singapore ; | Hackensack, NJ : Imperial College Press ; | Distributed by World Scientific Pub. Co., 2011 . 1 online resource (xii, 171 p.) : Date:2011 Availability: No items available: Actions: Add to cart
36. Firewall design and analysis by Liu, Alex X. Publication: Singapore ; | Hackensack, NJ : World Scientific, 2011 . 1 online resource (xi, 109 p.) : Date:2011 Availability: No items available: Actions: Add to cart
37. Document Security by Mendell, Ronald L. Publication: Springfield : Charles C Thomas Publisher, LTD, 2007 . 1 online resource (181 p.) Date:2007 Availability: No items available: Actions: Add to cart
38. Department of Defense Sponsored Information Security Research by Wang, Cliff. Publication: Hoboken : John Wiley & Sons, 2007 . 1 online resource (706 p.) Date:2007 Availability: No items available: Actions: Add to cart
39. Hands-on ethical hacking and network defense by Simpson, Michael T Publication: New York : Wadsworth Publishing Co., 2012 . 1 online resource. Date:2012 Availability: No items available: Actions: Add to cart
40. Advanced penetration testing for highly-secured environments by Allen, Lee. Publication: Birmingham : Packt Pub., 2012 . 1 online resource. Date:2012 Availability: No items available: Actions: Add to cart