//]]>
Information assurance architecture / by Willett, Keith D. Publication: Boca Raton, FL : CRC Press, 2008 . xxix, 588 p. : 25 cm. Date:2008 Availability: Copies available: AUM Main Library (2),
Actions: Add to Cart
IT auditing : , using controls to protect information assets / by Davis, Chris Publication: New York : McGraw-Hill, 2011 . xxix, 480 p. : 24 cm. Date:2011 Availability: Copies available: AUM Main Library (2),
Actions: Add to Cart
Software engineering for secure systems : , industrial and research perspectives /   Publication: Hershey, PA : Information Science Reference, 2011 . xvii, 370 p. : 29 cm. Date:2011 Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Security software development : , assessing and managing security risks / by Ashbaugh, Douglas A. Publication: Boca Raton, FL : CRC Press, 2009 . xvii, 313 p. : 25 cm. Date:2009 Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Defense against the black arts : , how hackers do what they do and how to protect against it / by Varsalone, Jesse. Publication: Boca Raton, FL : CRC Press, 2012 . xvi, 396 p. : 26 cm. Date:2012 Availability: Copies available: AUM Main Library (2),
Actions: Add to Cart
System assurance : , beyond detecting vulnerabilities / by Mansourov, Nikolai Publication: Amsterdam : Elseiver, 2011 . xix, 346 p. Date:2011 Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Enterprise information security and privacy /   Publication: Boston, MA : Artech House, 2009 . xxiv, 231 p. : Date:2009 Availability: Copies available: AUM Main Library (2),
Actions: Add to Cart
Intelligence and security informatics for international security : , Information sharing and data mining / by Chen, Hsinchum Publication: New York : Springer, 2006 . xvii, 182 p. : Date:2006 Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Group policy : fundamentals, security, and the managed desktop / by Moskowitz, Jeremy. Publication: Indianapolis, Ind. : Wiley, 2010 . xxxii, 903 p. : 24 cm. Date:2010 Availability: Copies available: AUM Main Library (3),
Actions: Add to Cart
Creating the secure managed desktop : , using group policy, SoftGrid, Microsoft deployment toolkit, and other management tools / by Moskowitz, Jeremy. Publication: Indianapolis, Ind. : Wiley, 2008 . xxxiv, 685 p. : 24 cm. Date:2008 Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Dear Hacker : , letters to the editor of 2600 / by Goldstein, Emmanuel, Publication: Indianapolis, Ind : Wiley, 2010 . xvi, 559 p. ; 24 cm. Date:2010 Availability: Copies available: AUM Main Library (3),
Actions: Add to Cart
Professional rootkits / by Vieler, Ric, Publication: Indianapolis, Ind : Wiley/Wrox, 2007 . xix, 334 p. : 24 cm. Date:2007 Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
E-discovery for dummies / by Volonino, Linda L. Publication: Indianapolis, Ind : Wiley, 2009 . xiv, 346 p. Date:2009 Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Implementing email security and tokens : , current standards, tools, and practices / by Turner, Sean H. Publication: Indianapolis, Ind : Wiley, 2008 . xv, 296 p. : 24 cm. Date:2008 Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Principles of information systems security : , text and cases / by Dhillon, Gurpreet, Publication: Hoboken, N.J : Wiley, 2007 . xii, 451 p. : 25 cm. Date:2007 Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Professional ASP.NET 3.5 security, membership, and role management with C# and VB / by Haidar, Bilal. Publication: Indianapolis, Ind : Wiley, 2008 . xxix, 904 p. ; 24 cm. Date:2008 Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Cloud security : , a comprehensive guide to secure cloud computing / by Krutz, Ronald L., Publication: Indianapolis, Ind : Wiley, 2010 . xxvi, 358 p. : 24 cm. Date:2010 Availability: Copies available: AUM Main Library (3),
Actions: Add to Cart
Windows forensics : , the field guide for conducting corporate computer investigations / by Steel, Chad, Publication: Indianapolis, Ind : Wiley, 2006 . xvii, 382 p. : 24 cm. Date:2006 Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Mastering system center data protection manager 2007 / by Ganger, Devin L. Publication: Indianapolis, Ind. : Wiley Pub., 2008 . xxii, 482 p. : 24 cm. Date:2008 Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Cryptography engineering : , design principles and practical applications / by Ferguson, Niels. Publication: Indianapolis, Ind : Wiley, 2010 . xxix, 353 p. : 24 cm. Date:2010 Availability: Copies available: AUM Main Library (3),
Actions: Add to Cart
1 2 3 Next >>

Languages: 
English |
العربية