Limit Search Results
Format
24 Results Found Subscribe to search results
000000000000MAIN
Print
1. 
Cover image for Information security : principles and new concepts
2. 
Cover image for The Intrusion detection networks : a key to collaborative security
3. 
Cover image for Role mining in business : taming role-based access control administration
4. 
Cover image for Managed code rootkits : hooking into runtime environments
7. 
Cover image for Oracle identity management : governance, risk, and compliance architecture
10. 
Cover image for Professional rootkits
11. 
Cover image for Critical information infrastructures : resilience and protection