|
41.
|
Cyber Security Policy Guidebook. by Bayuk, Jennifer L | Healey, Jason | Rohmeyer, Paul | Sachs, Marcus H | Schmidt, Jeffrey | Weiss, Joseph. Edition: 1st ed.Material type: Text; Format:
available online
; Literary form:
Not fiction
Publisher: New York : John Wiley & Sons, Incorporated, 2012Copyright date: ©2012Online access: Click to View Availability: No items available :
|
|
42.
|
|
|
43.
|
Death of the Internet. by Jakobsson, Markus. Edition: 1st ed.Material type: Text; Format:
available online
; Literary form:
Not fiction
Publisher: Piscataway : Wiley, 2012Copyright date: ©2012Online access: Click to View Availability: No items available :
|
|
44.
|
|
|
45.
|
WordPress 3 Ultimate Security. by Connelly, Olly. Edition: 1st ed.Material type: Text; Format:
available online
; Literary form:
Not fiction
Publisher: Olton : Packt Publishing Ltd, 2011Copyright date: ©2011Online access: Click to View Availability: No items available :
|
|
46.
|
Microsoft Data Protection Manager 2010. by Buchanan, Steve. Edition: 1st ed.Material type: Text; Format:
available online
; Literary form:
Not fiction
Publisher: Olton : Packt Publishing Ltd, 2011Copyright date: ©2011Online access: Click to View Availability: No items available :
|
|
47.
|
Active Directory Disaster Recovery. by Rommel, Florian. Edition: 1st ed.Material type: Text; Format:
available online
; Literary form:
Not fiction
Publisher: Olton : Packt Publishing Ltd, 2008Copyright date: ©2008Online access: Click to View Availability: No items available :
|
|
48.
|
|
|
49.
|
|
|
50.
|
Network Backup with Bacula How-To. by Pankov, Eugene. Edition: 1st ed.Material type: Text; Format:
available online
; Literary form:
Not fiction
Publisher: Birmingham : Packt Publishing Ltd, 2012Copyright date: ©2012Online access: Click to View Availability: No items available :
|
|
51.
|
Information Warfare. by Ventre, Daniel. Series: IsteEdition: 1st ed.Material type: Text; Format:
available online
; Literary form:
Not fiction
Publisher: Hoboken : John Wiley & Sons, Incorporated, 2013Copyright date: ©2009Online access: Click to View Availability: No items available :
|
|
52.
|
|
|
53.
|
|
|
54.
|
Information Security Management Principles. by Alexander, David | Finch, Amanda | Taylor, Andy | Sutton, David | Taylor, Andy. Edition: 2nd ed.Material type: Text; Format:
available online
; Literary form:
Not fiction
Publisher: Swindon : BCS Learning & Development Limited, 2013Copyright date: ©2013Online access: Click to View Availability: No items available :
|
|
55.
|
|
|
56.
|
|
|
57.
|
Getting Started with FortiGate. by Fabbri, Rosato | Volpe, Fabrizio. Material type: Text; Format:
available online
; Literary form:
Not fiction
Publisher: Birmingham : Packt Publishing Ltd, 2013Copyright date: ©2013Online access: Click to View Availability: No items available :
|
|
58.
|
The NSA Report : Liberty and Security in a Changing World. by Staff, President's Review Group on Intelligence and Communications Technologies | Clarke, Richard A | Morell, Michael J | Stone, Geoffrey R | Sunstein, Cass R | Swire, Peter. Material type: Text; Format:
available online
; Literary form:
Not fiction
Publisher: Princeton : Princeton University Press, 2014Copyright date: ©2014Online access: Click to View Availability: No items available :
|
|
59.
|
|
|
60.
|
|