Search Results for Security systems - Narrowed by: Computer File Accompanies Open Access BookSirsiDynix Enterprisehttp://portal.utm.my/client/en_AU/main/main/qu$003dSecurity$002bsystems$0026qf$003dITYPE$002509Material$002bType$0025091$00253AATT_CF_OAB$002509Computer$002bFile$002bAccompanies$002bOpen$002bAccess$002bBook$0026ps$003d300$0026isd$003dtrue?dt=list2024-05-21T20:20:20ZEffective nuclear regulatory systems : facing safety and security challenges : proceedings of an International Conference on Effective Nuclear Regulatory Systems: Facing Safety and Security Challengesent://SD_ILS/0/SD_ILS:7908652024-05-21T20:20:20Z2024-05-21T20:20:20Zby International Conference on Effective Nuclear Regulatory Systems: Facing Safety and Security Challeges (2006 : Moscow, Russia)<br/>Author International Conference on Effective Nuclear Regulatory Systems: Facing Safety and Security Challeges (2006 : Moscow, Russia), International Atomic Energy Agency<br/>Format: Books<br/>Call Number CP 027605<br/>Publisher International Atomic Energy Agency,<br/>Publication Date 2006<br/>ISBN 9789201106063<br/>CISSP certified information systems security professional study guideent://SD_ILS/0/SD_ILS:5892632024-05-21T20:20:20Z2024-05-21T20:20:20Zby Stewart, James Michael<br/>Author Stewart, James Michael, Tittel, Ed, Chapple, Mike<br/>Format: Computer file<br/>Call Number CP 015609<br/>Edition 4th ed.<br/>Publisher Wiley Publishing,<br/>Publication Date 2008<br/>ISBN 978055504172<br/>Windows registry forensics advanced digital forensic analysis of the Windows registryent://SD_ILS/0/SD_ILS:8133672024-05-21T20:20:20Z2024-05-21T20:20:20Zby Carvey, Harlan<br/>Author Carvey, Harlan<br/>Format: Books<br/>Call Number CP 030880<br/>Publisher Elsevier,<br/>Publication Date 2011<br/>ISBN 9781597495806<br/>CISA : certified information systems auditor study guideent://SD_ILS/0/SD_ILS:5853832024-05-21T20:20:20Z2024-05-21T20:20:20Zby Cannon, David L.<br/>Author Cannon, David L.<br/>Format: Computer file<br/>Call Number CP 014590<br/>Edition 2nd ed.<br/>Publisher Wiley Publishing,<br/>Publication Date 2008<br/>ISBN 9780555041413<br/>Trustworthy computing analytical and quantitative engineering evaluationent://SD_ILS/0/SD_ILS:5892772024-05-21T20:20:20Z2024-05-21T20:20:20Zby Sahinoglu, M.<br/>Author Sahinoglu, M.<br/>Format: Computer file<br/>Call Number CP 015619<br/>Publisher John Wiley & Sons,<br/>Publication Date 2007<br/>How to break Web software functional and security testing of Web applications and Web servicesent://SD_ILS/0/SD_ILS:5654892024-05-21T20:20:20Z2024-05-21T20:20:20Zby Andrews, Mike<br/>Author Andrews, Mike, Whittaker, James A., 1965-<br/>Format: Computer file<br/>Call Number CP 8182<br/>Publisher Addison-Wesley,<br/>Publication Date 2006<br/>ISBN 9780321369444<br/>CISA - Certified Information Systems Auditor study guideent://SD_ILS/0/SD_ILS:5662962024-05-21T20:20:20Z2024-05-21T20:20:20Zby Cannon, David L.<br/>Author Cannon, David L., Bergmann, Timonthy S., Pamplin, Brady<br/>Format: Computer file<br/>Call Number CP 4534<br/>Publisher Wiley Pub.,<br/>Publication Date 2006<br/>ISBN 9780782144383<br/>Trusted platform module basics using TPM in embedded systemsent://SD_ILS/0/SD_ILS:5709302024-05-21T20:20:20Z2024-05-21T20:20:20Zby Kinney, Steven<br/>Author Kinney, Steven<br/>Format: Computer file<br/>Call Number CP 8937<br/>Publisher Newnes,<br/>Publication Date 2006<br/>ISBN 9780750679602 9780750679527<br/>Sun Certified Security Administrator for Solaris 9 & 10 study guideent://SD_ILS/0/SD_ILS:5681762024-05-21T20:20:20Z2024-05-21T20:20:20Zby Chirillo, John, 1970-<br/>Author Chirillo, John, 1970-, Danielyan, Edgar<br/>Format: Computer file<br/>Call Number CP 8579<br/>Publisher McGraw-Hill,<br/>Publication Date 2005<br/>ISBN 9780072254259<br/>Advanced guide to linux networking and securityent://SD_ILS/0/SD_ILS:5702462024-05-21T20:20:20Z2024-05-21T20:20:20Zby Sawicki, Ed<br/>Author Sawicki, Ed, Well, Nicholas<br/>Format: Computer file<br/>Call Number CP 7219 v.3<br/>Publisher Course Technology,<br/>Publication Date 2005<br/>ISBN 9781418835392<br/>Guide to linux networking and securityent://SD_ILS/0/SD_ILS:5926142024-05-21T20:20:20Z2024-05-21T20:20:20Zby Wells, Nicholas<br/>Author Wells, Nicholas<br/>Format: Computer file<br/>Call Number CP 2287 v.1<br/>Publisher Thomson/Course Technology,<br/>Publication Date 2003<br/>ISBN 9780619000943<br/>Web security, for network and system administratorsent://SD_ILS/0/SD_ILS:6113632024-05-21T20:20:20Z2024-05-21T20:20:20Zby Mackey, David<br/>Author Mackey, David<br/>Format: Computer file<br/>Call Number CP 6428 v.2<br/>Publisher Course Technology,<br/>Publication Date 2003<br/>ISBN 9780619064952<br/>Unix system security toolsent://SD_ILS/0/SD_ILS:5676182024-05-21T20:20:20Z2024-05-21T20:20:20Zby Ross, Seth T.<br/>Author Ross, Seth T.<br/>Format: Computer file<br/>Call Number CP 1201<br/>Publisher MCGraw Hill,<br/>Publication Date 2000<br/>ISBN 9780079137883<br/>ICTE 2013 : Proceedings of the Fourth International Conference on Transportation Engineering : October 19-20, 2013, Chengdu, Chinaent://SD_ILS/0/SD_ILS:8333602024-05-21T20:20:20Z2024-05-21T20:20:20Zby Peng, Qiyuan, editor<br/>Author Peng, Qiyuan, editor, Wang, Kelvin C.P., editor<br/>Format: Electronic Resources<br/>Call Number CP 034948<br/>ISBN 9780784413159<br/>