Limit Search Results
Author
Language
Format
Subject
Switch to list view
Switch to thumbnail view
78 Results Found Subscribe to search results
000000000000MAIN
Print
2. 
Cover image for Information security : principles and new concepts
4. 
Cover image for The Intrusion detection networks : a key to collaborative security
5. 
Cover image for Role mining in business : taming role-based access control administration
6. 
Cover image for Managed code rootkits : hooking into runtime environments
7. 
Cover image for Access control, security, and trust : a logical approach
9. 
Cover image for Designing an IAM framework with Oracle identity and access management suite
11. 
Cover image for Access denied : the practice and policy of global Internet filtering
Go to:Search Results
|
Top of Page
|
Search Facets