Your search returned 12 results.

Sort
Results
1.
iPad & iPhone administrator's Guide by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New York ; McGraw Hill ; 2011
Availability: Items available for loan: PCC (1)Collection, call number: C 004.1675068 H26i.

2.
Cryptography engineering : design principles and practical applications by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Indianapolis ; Wiley Publishing ; 2010
Availability: Items available for loan: PCC (1)Collection, call number: C 005.82 F38c.

3.
Principles of information security by
Edition: 5th ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Boston, MA ; Cengage ; 2016
Availability: Items available for loan: PCC (1)Collection, call number: C 005.8 W61p.

4.
Architecting secure software systems by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Boea Raton ; Taylor + Francis Group ; 2008
Availability: Items available for loan: PCC (1)Collection, call number: C 005.8 T14a.

5.
computer security principles and practice by
Edition: 3rd ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Boston ; Pearson Education Limited ; 2015
Availability: Items available for loan: PCC (1)Collection, call number: C 005.8 Sta9c.

6.
Cryptography and network security: principles and practice by
Edition: 5th ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Upper Saddle River, NJ ; Perason Prentice Hall ; 2011
Availability: Items available for loan: PCC (1)Collection, call number: C 005.8 St9c.

7.
System assurance beyond detecting vulnerabilities by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Burlington, MA ; Mergan Kaufanaun ; 2011
Availability: Items available for loan: PCC (1)Collection, call number: C 005.8 M31s.

8.
COH: Certified ethical hacker study guide by
Edition: 18th ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Indianapolis, Indiana ; Wiley Publishing ; 2010
Availability: Items available for loan: PCC (1)Collection, call number: C 005.8 G78c.

9.
Information assurance for the enterprise : a roadmap to information security by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New York ; McGraw-Hill ; 2007
Availability: Items available for loan: PCC (1)Collection, call number: C 005.6 Sc6i.

10.
Reading and cases in the management of information security by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Boston ; Thomson Course Technology ; 2006
Availability: Items available for loan: PCC (1)Collection, call number: C 658.478 W59r.

11.
Reading and cases in the management of information security by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Boston ; Thomson Course Technology ; 2006
Availability: Items available for loan: PCC (1)Collection, call number: C 658.478 W59r.

12.
Security strategies in windows platforms and applications by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Sudbury, Mass ; Jones + Bartlett Learning ; 2011
Availability: Items available for loan: PCC (1)Collection, call number: C005. So4.