Limit Search Results
Author
Language
Format
39 Results Found Subscribe to search results
000000000000MAIN
Print
3. 
Cover image for Integrated security systems design : concepts, specifications, and implementation
4. 
Cover image for Foiling the systems breakers : computer security and access control
5. 
Cover image for Access control, authentication, and public key infrastructure
12. 
Cover image for Managed code rootkits : hooking into runtime environments