81. For the record   Publication: Washington, D.C. : National Academy Press, 1997 . 1 online resource (xix, 264 p.) : Date:1997 Availability: No items available: Actions: Add to cart
82. The international handbook of computer security by Shim, Jae K. Publication: Chicago, Ill. : Glenlake Pub., 2000 . 1 online resource (xii, 260 pages) , Includes index. Date:2000 Availability: No items available: Actions: Add to cart
83. Computer and intrusion forensics   Publication: Boston : Artech House, 2003 . 1 online resource (xxi, 395 p.) : Date:2003 Availability: No items available: Actions: Add to cart
84. Key capabilities of an electronic health record system   Publication: Washington, D.C. : National Academies Press, 2003 . 1 online resource (31 p.) Date:2003 Availability: No items available: Actions: Add to cart
85. A business guide to information security by Calder, Alan, Publication: London ; | Sterling, VA : Kogan Page, 2005 . 1 online resource (viii 182 p.) Date:2005 Availability: No items available: Actions: Add to cart
86. Securing SCADA systems by Krutz, Ronald L., Publication: Indianapolis, Ind. : Wiley Pub., 2006 . 1 online resource (1 v.) , Title from title screen. Date:2006 Availability: No items available: Actions: Add to cart
87. Information security by McCann, Tiffany. Publication: Morristown, NJ : FEI Research Foundation, 2002 . 1 online resource. Date:2002 Availability: No items available: Actions: Add to cart
88. Finding and fixing vulnerabilities in information systems   Publication: Santa Monica, CA : Rand, 2003 . 1 online resource (xxvi, 117 pages) : Date:2003 Availability: No items available: Actions: Add to cart
89. Protecting your library's digital sources by Kahn, Miriam Publication: Chicago : American Library Association, 2004 . 1 online resource (xiii, 104 p.) Date:2004 Availability: No items available: Actions: Add to cart
90. The information systems security officer's guide by Kovacich, Gerald L. Publication: Amsterdam ; | Boston : Butterworth-Heinemann, 2003 . 1 online resource (xxviii, 361 p.) : Date:2003 Availability: No items available: Actions: Add to cart
91. Disaster recovery planning by Sandhu, Roopendra Jeet. Publication: Cincinnati, Ohio : Premier Press, 2002 . 1 online resource (xxvi, 294 p.) : , Includes index. Date:2002 Availability: No items available: Actions: Add to cart
92. Configuring Symantec antivirus by Hunter, Laura E. Publication: Rockland, MA : Syngress, 2003 . 1 online resource (xxxiii, 717 p.) : , Includes index. Date:2003 Availability: No items available: Actions: Add to cart
93. Introduction to computer and network security :   Publication: Boca Raton, FL. : CRC P., 2014 . xxiv, 295 p. : Date:2014 Availability: Copies available: Turkeyen Campus Science & Technology [QA76.9.A25 B76] (2), Actions: Add to cart
94. Information assurance :   Publication: London : Springer, 2006 . xiii, 259 p : Date:2006 Availability: Copies available: Turkeyen Campus Science & Technology [QA76.9.A25 B55 2006] (2), Actions: Add to cart
95. Information technology and the law /   Publication: Lelystad : Koninklijke Vermande, 1991 . vi, 87 p. Date:1991 Availability: Copies available: Turkeyen Campus Law Collection [KM258 I5413] (1), Actions: Add to cart
96. Security in computing /   Publication: Upper Siddle River, NJ. : Pearson Education, 2015 . xxxiii, 910 p. : Date:2015 Availability: Copies available: Turkeyen Campus Science & Technology [QA76.9 A25 P45 2015] (2), Actions: Add to cart