|
|
21. |
|
Role engineering for enterprise security management
by Coyne, Edward J.,
Publication:
Boston : Artech House, 2008
. 1 online resource (xvii, 224 p.) :
Date:2008
Availability:
No items available:
Actions:
Add to cart (remove)
|
|
|
22. |
|
Integrated security systems design
by Norman, Thomas L.
Publication:
Amsterdam ; | Boston : Elsevier Butterworth-Heinemann, 2007
. 1 online resource (xii, 458 p.) :
Date:2007
Availability:
No items available:
Actions:
Add to cart (remove)
|
|
|
23. |
|
Risk management solutions for Sarbanes-Oxley section 404 IT compliance
by Quarterman, John S.,
Publication:
Indianapolis, Ind. : Wiley Pub., 2006
. 1 online resource (xxvii, 278 p.) :
, Title from title screen.
Date:2006
Availability:
No items available:
Actions:
Add to cart (remove)
|
|
|
24. |
|
Penetration tester's open source toolkit
Publication:
Rockland, Mass. : Syngress Pub., 2006
. 1 online resource (xxix, 704 p.) :
, Title from title screen.
Date:2006
Availability:
No items available:
Actions:
Add to cart (remove)
|
|
|
25. |
|
Perfect passwords
by Burnett, Mark.
Publication:
Rockland, Mass. : Syngress, 2006
. 1 online resource (xv, 181 p.) :
Date:2006
Availability:
No items available:
Actions:
Add to cart (remove)
|
|
|
26. |
|
Outsourcing information security
by Axelrod, C. Warren.
Publication:
Boston : Artech House, 2004
. 1 online resource (xxvi, 248 p.) :
Date:2004
Availability:
No items available:
Actions:
Add to cart (remove)
|
|
|
27. |
|
Access denied
Publication:
Cambridge, Mass. : MIT Press, 2008
. 1 online resource (xv, 449 p.) :
Date:2008
Availability:
No items available:
Actions:
Add to cart (remove)
|
|
|
28. |
|
User's guide to cryptography and standards
by Dent, Alexander W.
Publication:
Boston, MA : Artech House, 2004
. 1 online resource (xv, 382 p.) :
Date:2004
Availability:
No items available:
Actions:
Add to cart (remove)
|
|
|
29. |
|
Critical information infrastructure protection and the law
Publication:
Washington, D.C. : National Academies Press, 2003
. 1 online resource (xvi, 86 p.)
, "Committee on Critical Information Infrastructure and the Law, Computer Science and Telecommunications Board, National Academy of Engineering, National Research Council of the National Academies."
Date:2003
Availability:
No items available:
Actions:
Add to cart (remove)
|
|
|
30. |
|
Essential computer security
by Bradley, Tony,
Publication:
Rockland, MA : Syngress Pub., 2006
. 1 online resource (xxvi, 279 p.) :
Date:2006
Availability:
No items available:
Actions:
Add to cart (remove)
|
|
|
31. |
|
Building DMZs for Enterprise networks
by Shimonski, Robert.
Publication:
Rockland, MA : Syngress Pub., 2003
. 1 online resource (xxxvii, 744 p.) :
, Includes index.
Date:2003
Availability:
No items available:
Actions:
Add to cart (remove)
|
|
|
32. |
|
Role-based access control
by Ferraiolo, David.
Publication:
Boston : Artech House, 2003
. 1 online resource (xvii, 316 p.) :
Date:2003
Availability:
No items available:
Actions:
Add to cart (remove)
|
|
|
33. |
|
Database security and integrity/
Publication:
Reading, Mass. : Addison-Wesley, 1981
Date:1981
Availability:
Copies available:
Turkeyen Campus
Science & Technology
[QA76.9 D3 F47]
(1),
Actions:
Add to cart (remove)
|
|