//]]>
Creating the secure managed desktop : , using group policy, SoftGrid, Microsoft deployment toolkit, and other management tools / by Moskowitz, Jeremy. Publication: Indianapolis, Ind. : Wiley, 2008 . xxxiv, 685 p. : 24 cm. Date:2008 Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Dear Hacker : , letters to the editor of 2600 / by Goldstein, Emmanuel, Publication: Indianapolis, Ind : Wiley, 2010 . xvi, 559 p. ; 24 cm. Date:2010 Availability: Copies available: AUM Main Library (3),
Actions: Add to Cart
Professional rootkits / by Vieler, Ric, Publication: Indianapolis, Ind : Wiley/Wrox, 2007 . xix, 334 p. : 24 cm. Date:2007 Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
E-discovery for dummies / by Volonino, Linda L. Publication: Indianapolis, Ind : Wiley, 2009 . xiv, 346 p. Date:2009 Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Implementing email security and tokens : , current standards, tools, and practices / by Turner, Sean H. Publication: Indianapolis, Ind : Wiley, 2008 . xv, 296 p. : 24 cm. Date:2008 Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Principles of information systems security : , text and cases / by Dhillon, Gurpreet, Publication: Hoboken, N.J : Wiley, 2007 . xii, 451 p. : 25 cm. Date:2007 Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Professional ASP.NET 3.5 security, membership, and role management with C# and VB / by Haidar, Bilal. Publication: Indianapolis, Ind : Wiley, 2008 . xxix, 904 p. ; 24 cm. Date:2008 Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Cloud security : , a comprehensive guide to secure cloud computing / by Krutz, Ronald L., Publication: Indianapolis, Ind : Wiley, 2010 . xxvi, 358 p. : 24 cm. Date:2010 Availability: Copies available: AUM Main Library (3),
Actions: Add to Cart
Windows forensics : , the field guide for conducting corporate computer investigations / by Steel, Chad, Publication: Indianapolis, Ind : Wiley, 2006 . xvii, 382 p. : 24 cm. Date:2006 Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Mastering system center data protection manager 2007 / by Ganger, Devin L. Publication: Indianapolis, Ind. : Wiley Pub., 2008 . xxii, 482 p. : 24 cm. Date:2008 Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Cryptography engineering : , design principles and practical applications / by Ferguson, Niels. Publication: Indianapolis, Ind : Wiley, 2010 . xxix, 353 p. : 24 cm. Date:2010 Availability: Copies available: AUM Main Library (3),
Actions: Add to Cart
IT audit, control, and security / by Moeller, Robert R. Publication: Hoboken, N.J. : Wiley, 2010 . xxiv, 667 p. : 26 cm. Date:2010 Availability: Copies available: AUM Main Library (2),
Actions: Add to Cart
Security in fixed and wireless networks : , an introduction to securing data communications / by Schafer, Gunter. Publication: Chichester, England : Wiley, 2003 . xiii, 382 p. : 25 cm. Date:2003 Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Computer security : , principles and practice / by Stallings, William. Publication: Upper Saddle River, N.J. : Pearson Education, 2008 . xvii, 798 p. : 24 cm. Date:2008 Availability: Copies available: AUM Main Library (2),
Actions: Add to Cart
Disaster management in telecommunications, broadcasting, and computer systems / by El Mahdy, Galal. Publication: Chichester, England ; | New York : Wiley, 2001 . xxi, 459 p. : 24 cm. Date:2001 Availability: Copies available: AUM Main Library (3),
Actions: Add to Cart
Auditing and security : , AS/400, NT, UNIX, networks, and disaster recovery plans / by Musaji, Yusufali F. Publication: New York : Wiley, 2001 . xxi, 530 p. ; 26 cm. Date:2001 Availability: Copies available: AUM Main Library (3),
Actions: Add to Cart
Data privacy and security / by Salomon, David Publication: New York : Springer, 2003 . xiv, 465 p. : 24 cm. Date:2003 Availability: Copies available: AUM Main Library (3),
Actions: Add to Cart
Cryptographic security architecture : , design and verification / by Gutmann, Peter. Publication: New York : Springer, 2004 . xviii, 320 p. : 25 cm. Date:2004 Availability: Copies available: AUM Main Library (3),
Actions: Add to Cart
Security of data and transaction processing /   Publication: Boston, MA : Kluwer Academic, 2000 . 141 p. : 24 cm. Date:2000 Availability: Copies available: AUM Main Library (3),
Actions: Add to Cart
Communications and multimedia security : , 9th IFIP TC-6 TC-11 international conference, CMS 2005, Salzburg, Austria, September 19-21, 2005, proceedings /   Publication: Berlin : Springer, 2005 . xiii, 360 p. : 24 cm. Date:2005 Availability: Copies available: AUM Main Library (3),
Actions: Add to Cart
1 2 3 4 Next >>

Languages: 
English |
العربية