321. National security   Publication: Amsterdam ; | Oxford : Elsevier, 2007 . 1 online resource (xxii, 419 p.) : Date:2007 Availability: No items available: Actions: Add to cart
322. Enemy at the water cooler by Contos, Brian T. Publication: Rockland, Mass. : Syngress, 2006 . 1 online resource (xxii, 262 p.) : , Title from Web page (viewed Feb. 28, 2007). Date:2006 Availability: No items available: Actions: Add to cart
323. Network routing basics by Macfarlane, James, Publication: Indianapolis, IN : Wiley Pub., 2006 . 1 online resource (xxi, 408 p.) : , "Wiley Technology Publishing"--P. [4] of cover. Date:2006 Availability: No items available: Actions: Add to cart
324. Proceedings of the 2009 International Conference on Computer and Network Technology, Chennai, India, 24-26 July 2009   Publication: Singapore ; | Hackensack, NJ : World Scientific, 2009 . 1 online resource (xv, 356 p.) : Date:2009 Availability: No items available: Actions: Add to cart
325. Encyclopedia on ad hoc and ubiquitous computing   Publication: Singapore ; | Hackensack, N.J. : World Scientific Pub. Co., 2010 . 1 online resource (xi, 676 p.) : Date:2010 Availability: No items available: Actions: Add to cart
326. Security in ad hoc and sensor networks by Beyah, Raheem Publication: Singapore ; | Hackensack, NJ : World Scientific, 2010 . 1 online resource (xii, 406 p.) : Date:2010 Availability: No items available: Actions: Add to cart
327. Selected topics in communication networks and distributed systems   Publication: Singapore ; | Hackensack, NJ : World Scientific, 2010 . 1 online resource (vii, 799 p.) : Date:2010 Availability: No items available: Actions: Add to cart
328. Toward a safer and more secure cyberspace   Publication: Washington, DC : National Academies Press, 2007 . 1 online resource (xx, 307 p.) Date:2007 Availability: No items available: Actions: Add to cart No cover image available No cover image available
329. The misuse of information systems by D'Arcy, John P., Publication: New York : LFB Scholarly Pub., 2007 . 1 online resource (x, 191 p.) : Date:2007 Availability: No items available: Actions: Add to cart No cover image available No cover image available
330. Role-based access control by Ferraiolo, David. Publication: Boston : Artech House, 2007 . 1 online resource (xix, 381 p.) : Date:2007 Availability: No items available: Actions: Add to cart
331. Role engineering for enterprise security management by Coyne, Edward J., Publication: Boston : Artech House, 2008 . 1 online resource (xvii, 224 p.) : Date:2008 Availability: No items available: Actions: Add to cart
332. Security for mobile networks and platforms by Aissi, Selim. Publication: Norwood, MA : Artech House, 2006 . 1 online resource (xvi, 313 pages) : Date:2006 Availability: No items available: Actions: Add to cart
333. Information security by Alexander, Philip, Publication: Westport, Conn. : Praeger Security International, 2008 . 1 online resource (viii, 175 p.) , Includes index, appendix, and glossary. Date:2008 Availability: No items available: Actions: Add to cart
334. IT compliance and controls by DeLuccia, James J., Publication: Hoboken, N.J. : John Wiley & Sons, 2008 . 1 online resource (xiv, 274 p.) : Date:2008 Availability: No items available: Actions: Add to cart
335. Network analysis, architecture, and design by McCabe, James D. Publication: Amsterdan ; | Boston : Elsevier/Morgan Kaufmann Publishers, 2007 . 1 online resource (xx, 473 p.) : , Includes index. Date:2007 Availability: No items available: Actions: Add to cart
336. Business continuity and disaster recovery for infosec managers by Rittinghouse, John W. Publication: Amsterdam ; | Boston : Elsevier Digital Press, 2005 . 1 online resource (lxix, 338 p.) : Date:2005 Availability: No items available: Actions: Add to cart
337. SharePoint 2007 and Office development expert solutions by Holloway, Randy, Publication: Indianapolis, Ind. : Wiley Pub., 2007 . 1 online resource (xxiii, 324 p.) : , Title from title screen. | Includes index. Date:2007 Availability: No items available: Actions: Add to cart
338. Optimizing and testing WLANs by Alexander, Tom. Publication: Amsterdam ; | Boston : Elsevier Newnes, 2007 . 1 online resource (xiv, 253 p.) : Date:2007 Availability: No items available: Actions: Add to cart
339. Practical embedded security by Stapko, Timothy John. Publication: Amsterdam ; | Boston : Elsevier/Newnes, 2008 . 1 online resource (xvii, 280 p.) : Date:2008 Availability: No items available: Actions: Add to cart
340. Internet security by Speed, Tim. Publication: Amsterdam ; | Boston : Digital Press, 2003 . 1 online resource (xviii, 398 p.) : Date:2003 Availability: No items available: Actions: Add to cart