Your search returned 5 results. Subscribe to this search

|
1. System Forensics, Investigation, and Response

by VACCA, JHON R | RUDOLPH, K.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Delhi JONES AND BARTLETT PUBLISHERS 2011Availability: Items available for loan: [Call number: 005.8 VAC] (1).

2. Fundamentals of Information Systems Security

by KIM, DAVID | SOLOMON, MICHAEL G.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Delhi JONES AND BARTLETT PUBLISHERS 2012Availability: Items available for loan: [Call number: 005.8 KIM, C-1] (2).

3. Access Control, Authentication, and Public Key Infrastructure

by BALLAD, BILL | BANKS, ERIN K | BALLAD, TRICIA.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi JONES & BARTLETT LEARNING 2011Availability: Items available for loan: [Call number: 005.8 BAL,C-1] (2).

4. Hacker Techniques, Tools, and Incident Handling

by ORIYANO, SEAN-PHILIP | GREGG, MICHAEL.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi JONES & BARTLETT LEARNING 2011Availability: Items available for loan: [Call number: 005.8 ORI,C-1] (2).

5. Security Strategies in Linux Platforms and Applications

by JANG, MICHAEL.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi JONES & BARTLETT LEARNING 2011Availability: Items available for loan: [Call number: 005.8 JAN, C-1] (2).