21. Role engineering for enterprise security management by Coyne, Edward J., Publication: Boston : Artech House, 2008 . 1 online resource (xvii, 224 p.) : Date:2008 Availability: No items available: Actions: Add to cart
22. Integrated security systems design by Norman, Thomas L. Publication: Amsterdam ; | Boston : Elsevier Butterworth-Heinemann, 2007 . 1 online resource (xii, 458 p.) : Date:2007 Availability: No items available: Actions: Add to cart
23. Risk management solutions for Sarbanes-Oxley section 404 IT compliance by Quarterman, John S., Publication: Indianapolis, Ind. : Wiley Pub., 2006 . 1 online resource (xxvii, 278 p.) : , Title from title screen. Date:2006 Availability: No items available: Actions: Add to cart
24. Penetration tester's open source toolkit   Publication: Rockland, Mass. : Syngress Pub., 2006 . 1 online resource (xxix, 704 p.) : , Title from title screen. Date:2006 Availability: No items available: Actions: Add to cart
25. Perfect passwords by Burnett, Mark. Publication: Rockland, Mass. : Syngress, 2006 . 1 online resource (xv, 181 p.) : Date:2006 Availability: No items available: Actions: Add to cart
26. Outsourcing information security by Axelrod, C. Warren. Publication: Boston : Artech House, 2004 . 1 online resource (xxvi, 248 p.) : Date:2004 Availability: No items available: Actions: Add to cart
27. Access denied   Publication: Cambridge, Mass. : MIT Press, 2008 . 1 online resource (xv, 449 p.) : Date:2008 Availability: No items available: Actions: Add to cart
28. User's guide to cryptography and standards by Dent, Alexander W. Publication: Boston, MA : Artech House, 2004 . 1 online resource (xv, 382 p.) : Date:2004 Availability: No items available: Actions: Add to cart
29. Critical information infrastructure protection and the law   Publication: Washington, D.C. : National Academies Press, 2003 . 1 online resource (xvi, 86 p.) , "Committee on Critical Information Infrastructure and the Law, Computer Science and Telecommunications Board, National Academy of Engineering, National Research Council of the National Academies." Date:2003 Availability: No items available: Actions: Add to cart
30. Essential computer security by Bradley, Tony, Publication: Rockland, MA : Syngress Pub., 2006 . 1 online resource (xxvi, 279 p.) : Date:2006 Availability: No items available: Actions: Add to cart
31. Building DMZs for Enterprise networks by Shimonski, Robert. Publication: Rockland, MA : Syngress Pub., 2003 . 1 online resource (xxxvii, 744 p.) : , Includes index. Date:2003 Availability: No items available: Actions: Add to cart
32. Role-based access control by Ferraiolo, David. Publication: Boston : Artech House, 2003 . 1 online resource (xvii, 316 p.) : Date:2003 Availability: No items available: Actions: Add to cart
33. Database security and integrity/   Publication: Reading, Mass. : Addison-Wesley, 1981 Date:1981 Availability: Copies available: Turkeyen Campus Science & Technology [QA76.9 D3 F47] (1), Actions: Add to cart