|
1.
|
|
|
2.
|
|
|
3.
|
Security in computing / Charles P. Pfleeger, Shari Lawrence Pfleeger. by Pfleeger, Charles P, 1948- | Pfleeger, Shari Lawrence. Edition: 4th ed.Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: Upper Saddle River, NJ : Prentice Hall, c2007Availability: Items available for loan: Main LibraryCall number: QA 76.9 PFL (3).
|
|
4.
|
|
|
5.
|
|
|
6.
|
|
|
7.
|
|
|
8.
|
|
|
9.
|
|
|
10.
|
|
|
11.
|
Privacy Protection and Computer Forensics. by Caloyannides, Michael. Edition: 2nd ed.Material type: Text; Format:
available online
; Literary form:
Not fiction
Publisher: Norwood : Artech House, 2004Copyright date: ©2004Online access: Click to View Availability: No items available :
|
|
12.
|
|
|
13.
|
|
|
14.
|
Writing Security Tools and Exploits. by Foster, James C. Edition: 1st ed.Material type: Text; Format:
available online
; Literary form:
Not fiction
Publisher: Kidlington : William Andrew, 2006Copyright date: ©2005Online access: Click to View Availability: No items available :
|
|
15.
|
|
|
16.
|
Security Law and Methods. by Pastor, James F. Material type: Text; Format:
available online
; Literary form:
Not fiction
Publisher: Burlington : Elsevier Science & Technology, 2006Copyright date: ©2007Online access: Click to View Availability: No items available :
|
|
17.
|
Data protection & Consumer Privacy. by Group, Emerald. Material type: Text; Format:
available online
; Literary form:
Not fiction
Publisher: Bradford : Emerald Publishing Limited, 2004Copyright date: ©2004Online access: Click to View Availability: No items available :
|
|
18.
|
|
|
19.
|
|
|
20.
|
|