Search again

Found: 13  Titles

Order by :    Show:   Per Page
image
Architecting secure software systems Asoke K. Talukder, Manish Chaitanya.
Author
Talukder, Asoke K.
Published
Boca Raton : CRC Press, c2009.
Call Number
QA76.9.A25 T34 2009

image

image
Cryptanalysis of RSA and its variants M. Jason Hinek.
Author
Hinek, M. Jason.
Published
Boca Raton : CRC Press, c2010.
Call Number
TK5102.94 .H56 2010

image
Data protection governance, risk management, and compliance / David G. Hill.
Author
Hill, David G.
Published
Boca Raton, Fla. : Taylor & Francis, c2009.
Call Number
QA76.9.A25 H52 2009

image
Information security architecture an integrated approach to security in the organization / Jan Killmeyer.
Author
Tudor, Jan Killmeyer.
Published
Boca Raton, Fla. : Auerbach Publications, 2006.
Call Number
QA76.9.A25 T83 2006

image
Information security risk analysis Thomas R. Peltier.
Author
Peltier, Thomas R.
Published
Boca Raton, Fla. : Auerbach Publications, 2010.
Call Number
QA76.9.A25 P429 2010

image
Profiling hackers the science of criminal profiling as applied to the world of hacking / Raoul Chiesa, Stefania Ducci, Silvio Ciappi.
Author
Chiesa, Raoul,
Published
Boca Raton : Auerbach Publications, c2009.
Call Number
HV6773 .C477 2009

image
Risk analysis and security countermeasure selection Thomas L. Norman.
Author
Norman, Thomas L.
Published
Boca Raton : CRC Press, c2010.
Call Number
HV8290 .N67 2010

image
Secure and resilient software development Mark S. Merkow, Lakshmikanth Raghavan.
Author
Merkow, Mark S.
Published
Boca Raton, Fla. : CRC Press, 2010.
Call Number
QA76.76.D47 M466 2010

image
Secure coding in C and C++ / Robert C. Seacord.
Author
Seacord, Robert C.
Published
Upper Saddle River, NJ : Addison-Wesley, c2013.
Call Number
005.362C S4384S,QA76.9.A25 S368 2013
Location
คณะวิศวกรรมศาสตร์

image
Security software development assessing and managing security risks / Douglas A. Ashbaugh.
Author
Ashbaugh, Douglas A.
Published
Boca Raton : CRC Press, c2009.
Call Number
QA76.9.A25 A8246 2009

image
The executive MBA in information security John J. Trinckes, Jr.
Author
Trinckes, John J.
Published
Boca Raton : CRC Press, c2010.
Call Number
HF5548.37 .T75 2010

image
Vulnerability management Park Foreman.
Author
Foreman, Park.
Published
Boca Raton, Fla. : CRC Press, c2010.
Call Number
QA76.9.A25 F656 2010

Search Tools: Get RSS Feed
Style Switcher
Theme Colors

Layout Styles