Limit Search Results
Author
Format
Subject
136 Results Found Subscribe to search results
000000000000MAIN
Print
2. 
Cover image for Information security : principles and new concepts
3. 
Cover image for Managing risk in information systems
4. 
Cover image for Identity and access management : business performanve through connected intelligence
5. 
Cover image for The basics of digital privacy : simple tools to protect your personal information and your identity online
6. 
Cover image for Access control, authentication, and public key infrastructure
7. 
Cover image for The Intrusion detection networks : a key to collaborative security
8. 
Cover image for UTM security with Fortinet : Mastering FortiOS
9. 
Cover image for Web penetration testing with kali linux : a practical guide to implementing penetration testing strategies on websites, web applications, and standard web protocol with kali linux
10. 
Cover image for Information security policy development for compliance : ISO/IEC 27001, NIST SP 800-53, HIPAA standard, PCI DSS V2.0, and AUP V5.0
11. 
Cover image for Client-side attacks and defense
12. 
Cover image for Role mining in business : taming role-based access control administration