Search Results for Security systems - Narrowed by: Computer File Accompanies Open Access Book SirsiDynix Enterprise http://portal.utm.my/client/en_AU/main/main/qu$003dSecurity$002bsystems$0026qf$003dITYPE$002509Material$002bType$0025091$00253AATT_CF_OAB$002509Computer$002bFile$002bAccompanies$002bOpen$002bAccess$002bBook$0026ps$003d300$0026isd$003dtrue?dt=list 2024-05-21T20:20:20Z Effective nuclear regulatory systems : facing safety and security challenges : proceedings of an International Conference on Effective Nuclear Regulatory Systems: Facing Safety and Security Challenges ent://SD_ILS/0/SD_ILS:790865 2024-05-21T20:20:20Z 2024-05-21T20:20:20Z by&#160;International Conference on Effective Nuclear Regulatory Systems: Facing Safety and Security Challeges (2006 : Moscow, Russia)<br/>Author&#160;International Conference on Effective Nuclear Regulatory Systems: Facing Safety and Security Challeges (2006 : Moscow, Russia),&#160;International Atomic Energy Agency<br/>Format:&#160;Books<br/>Call Number&#160;CP 027605<br/>Publisher&#160;International Atomic Energy Agency,<br/>Publication Date&#160;2006<br/>ISBN&#160;9789201106063<br/> CISSP certified information systems security professional study guide ent://SD_ILS/0/SD_ILS:589263 2024-05-21T20:20:20Z 2024-05-21T20:20:20Z by&#160;Stewart, James Michael<br/>Author&#160;Stewart, James Michael,&#160;Tittel, Ed,&#160;Chapple, Mike<br/>Format:&#160;Computer file<br/>Call Number&#160;CP 015609<br/>Edition&#160;4th ed.<br/>Publisher&#160;Wiley Publishing,<br/>Publication Date&#160;2008<br/>ISBN&#160;978055504172<br/> Windows registry forensics advanced digital forensic analysis of the Windows registry ent://SD_ILS/0/SD_ILS:813367 2024-05-21T20:20:20Z 2024-05-21T20:20:20Z by&#160;Carvey, Harlan<br/>Author&#160;Carvey, Harlan<br/>Format:&#160;Books<br/>Call Number&#160;CP 030880<br/>Publisher&#160;Elsevier,<br/>Publication Date&#160;2011<br/>ISBN&#160;9781597495806<br/> CISA : certified information systems auditor study guide ent://SD_ILS/0/SD_ILS:585383 2024-05-21T20:20:20Z 2024-05-21T20:20:20Z by&#160;Cannon, David L.<br/>Author&#160;Cannon, David L.<br/>Format:&#160;Computer file<br/>Call Number&#160;CP 014590<br/>Edition&#160;2nd ed.<br/>Publisher&#160;Wiley Publishing,<br/>Publication Date&#160;2008<br/>ISBN&#160;9780555041413<br/> Trustworthy computing analytical and quantitative engineering evaluation ent://SD_ILS/0/SD_ILS:589277 2024-05-21T20:20:20Z 2024-05-21T20:20:20Z by&#160;Sahinoglu, M.<br/>Author&#160;Sahinoglu, M.<br/>Format:&#160;Computer file<br/>Call Number&#160;CP 015619<br/>Publisher&#160;John Wiley &amp; Sons,<br/>Publication Date&#160;2007<br/> How to break Web software functional and security testing of Web applications and Web services ent://SD_ILS/0/SD_ILS:565489 2024-05-21T20:20:20Z 2024-05-21T20:20:20Z by&#160;Andrews, Mike<br/>Author&#160;Andrews, Mike,&#160;Whittaker, James A., 1965-<br/>Format:&#160;Computer file<br/>Call Number&#160;CP 8182<br/>Publisher&#160;Addison-Wesley,<br/>Publication Date&#160;2006<br/>ISBN&#160;9780321369444<br/> CISA - Certified Information Systems Auditor study guide ent://SD_ILS/0/SD_ILS:566296 2024-05-21T20:20:20Z 2024-05-21T20:20:20Z by&#160;Cannon, David L.<br/>Author&#160;Cannon, David L.,&#160;Bergmann, Timonthy S.,&#160;Pamplin, Brady<br/>Format:&#160;Computer file<br/>Call Number&#160;CP 4534<br/>Publisher&#160;Wiley Pub.,<br/>Publication Date&#160;2006<br/>ISBN&#160;9780782144383<br/> Trusted platform module basics using TPM in embedded systems ent://SD_ILS/0/SD_ILS:570930 2024-05-21T20:20:20Z 2024-05-21T20:20:20Z by&#160;Kinney, Steven<br/>Author&#160;Kinney, Steven<br/>Format:&#160;Computer file<br/>Call Number&#160;CP 8937<br/>Publisher&#160;Newnes,<br/>Publication Date&#160;2006<br/>ISBN&#160;9780750679602&#160;9780750679527<br/> Sun Certified Security Administrator for Solaris 9 &amp; 10 study guide ent://SD_ILS/0/SD_ILS:568176 2024-05-21T20:20:20Z 2024-05-21T20:20:20Z by&#160;Chirillo, John, 1970-<br/>Author&#160;Chirillo, John, 1970-,&#160;Danielyan, Edgar<br/>Format:&#160;Computer file<br/>Call Number&#160;CP 8579<br/>Publisher&#160;McGraw-Hill,<br/>Publication Date&#160;2005<br/>ISBN&#160;9780072254259<br/> Advanced guide to linux networking and security ent://SD_ILS/0/SD_ILS:570246 2024-05-21T20:20:20Z 2024-05-21T20:20:20Z by&#160;Sawicki, Ed<br/>Author&#160;Sawicki, Ed,&#160;Well, Nicholas<br/>Format:&#160;Computer file<br/>Call Number&#160;CP 7219 v.3<br/>Publisher&#160;Course Technology,<br/>Publication Date&#160;2005<br/>ISBN&#160;9781418835392<br/> Guide to linux networking and security ent://SD_ILS/0/SD_ILS:592614 2024-05-21T20:20:20Z 2024-05-21T20:20:20Z by&#160;Wells, Nicholas<br/>Author&#160;Wells, Nicholas<br/>Format:&#160;Computer file<br/>Call Number&#160;CP 2287 v.1<br/>Publisher&#160;Thomson/Course Technology,<br/>Publication Date&#160;2003<br/>ISBN&#160;9780619000943<br/> Web security, for network and system administrators ent://SD_ILS/0/SD_ILS:611363 2024-05-21T20:20:20Z 2024-05-21T20:20:20Z by&#160;Mackey, David<br/>Author&#160;Mackey, David<br/>Format:&#160;Computer file<br/>Call Number&#160;CP 6428 v.2<br/>Publisher&#160;Course Technology,<br/>Publication Date&#160;2003<br/>ISBN&#160;9780619064952<br/> Unix system security tools ent://SD_ILS/0/SD_ILS:567618 2024-05-21T20:20:20Z 2024-05-21T20:20:20Z by&#160;Ross, Seth T.<br/>Author&#160;Ross, Seth T.<br/>Format:&#160;Computer file<br/>Call Number&#160;CP 1201<br/>Publisher&#160;MCGraw Hill,<br/>Publication Date&#160;2000<br/>ISBN&#160;9780079137883<br/> ICTE 2013 : Proceedings of the Fourth International Conference on Transportation Engineering : October 19-20, 2013, Chengdu, China ent://SD_ILS/0/SD_ILS:833360 2024-05-21T20:20:20Z 2024-05-21T20:20:20Z by&#160;Peng, Qiyuan, editor<br/>Author&#160;Peng, Qiyuan, editor,&#160;Wang, Kelvin C.P., editor<br/>Format:&#160;Electronic Resources<br/>Call Number&#160;CP 034948<br/>ISBN&#160;9780784413159<br/>