Results
|
|
1.
|
|
iPad & iPhone administrator's Guide by
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: New York ; McGraw Hill ; 2011
Availability: Items available for loan: PCC (1)Collection, call number: C 004.1675068 H26i.
|
|
|
2.
|
|
|
|
|
3.
|
|
Principles of information security by
Edition: 5th ed.
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: Boston, MA ; Cengage ; 2016
Availability: Items available for loan: PCC (1)Collection, call number: C 005.8 W61p.
|
|
|
4.
|
|
Architecting secure software systems by
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: Boea Raton ; Taylor + Francis Group ; 2008
Availability: Items available for loan: PCC (1)Collection, call number: C 005.8 T14a.
|
|
|
5.
|
|
computer security principles and practice by
Edition: 3rd ed.
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: Boston ; Pearson Education Limited ; 2015
Availability: Items available for loan: PCC (1)Collection, call number: C 005.8 Sta9c.
|
|
|
6.
|
|
Cryptography and network security: principles and practice by
Edition: 5th ed.
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: Upper Saddle River, NJ ; Perason Prentice Hall ; 2011
Availability: Items available for loan: PCC (1)Collection, call number: C 005.8 St9c.
|
|
|
7.
|
|
System assurance beyond detecting vulnerabilities by
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: Burlington, MA ; Mergan Kaufanaun ; 2011
Availability: Items available for loan: PCC (1)Collection, call number: C 005.8 M31s.
|
|
|
8.
|
|
COH: Certified ethical hacker study guide by
Edition: 18th ed.
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: Indianapolis, Indiana ; Wiley Publishing ; 2010
Availability: Items available for loan: PCC (1)Collection, call number: C 005.8 G78c.
|
|
|
9.
|
|
|
|
|
10.
|
|
|
|
|
11.
|
|
|
|
|
12.
|
|
|