My Library

     
Limit search to available items
Save marked records Save all on page Save to List
SUBJECTS (1-30 of 30)
Computers Access Control
1


 
 
Attribute-Based Encryption And Access Control Huang, Dijiang, author.
Boca Raton, FL : CRC Press, [2020]
Loan Availability:  1 copy available at Online

E-BOOK
2


 
 
Computer Security Handbook Bosworth, Seymour.
New York : John Wiley & Sons, 2012.
Loan Availability:  No copies currently available for loan. Try e-Resource if held.

E-BOOK
3


 
 
Contemporary Identity And Access Management Architectures : Emerging Research And Opportunities Ng, Alex Chi Keung, 1957- author.
Hershey, PA : IGI Global / Business Science Reference, [2018]
Loan Availability:  No copies currently available for loan. Try e-Resource if held.

E-BOOK
4


 
 
Critical Information Infrastructures : Resilience And Protection Hyslop, Maitland.
New York : Springer, c2007.
Loan Availability:  1 copy available at GIP Main
ITEM LOCATION CALL NO. STATUS
 GIP Main  005.8 H999C 2007    AVAILABLE

PRINT ITEM
5


 
 
The Domains Of Identity : A Framework For Understanding Identity Systems In Contemporary Society Young, Kaliya, author.
London : Anthem Press, 2020.
Loan Availability:  1 copy available at Online

E-BOOK
6


 
 
Firewalls 24 Seven Strebe, Matthew.
San Francisco : Sybex, c2002.
Loan Availability:  1 copy available at GIP Main
ITEM LOCATION CALL NO. STATUS
 GIP Main  005.8 S914F 2002    AVAILABLE

PRINT ITEM
7


 
 
Internet And Intranet Security Oppliger, Rolf.
Boston, MA : Artech House, 2002.
Loan Availability:  1 copy available at GIP Main
ITEM LOCATION CALL NO. STATUS
 GIP Main  005.8 O62.I 2002    AVAILABLE

PRINT ITEM
8


 
 
Journal Of Computer Security.
Netherlands : IOS Press
Loan Availability:  1 copy available at Online
 

E-RESOURCE
9


 
 
Linux Firewalls : Attack Detection And Response With Iptables, Psad, And Fwsnort Rash, Michael.
San Francisco : No Starch Press, c2007.
Loan Availability:  1 copy available at GIP Main
ITEM LOCATION CALL NO. STATUS
 GIP Main  005.4469 L761 RAS 2007    AVAILABLE

PRINT ITEM
10


 
 
Mechanics Of User Identification And Authentication : Fundamentals Of Identity Management Todorov, Dobromir.
Boca Raton : Auerbach Publications, c2007.
Loan Availability:  1 copy available at GIP Main
ITEM LOCATION CALL NO. STATUS
 GIP Main  005.8 T639M 2007    AVAILABLE

PRINT ITEM
11


 
 
The Myths Of Security : What The Computer Security Industry Doesn't Want You To Know Viega, John.
North Sebastopol, Calif. : O'Reilly, c2009.
Loan Availability:  2 copies available at GIP Main and SMB Main
ITEM LOCATION CALL NO. STATUS
 GIP Main  005.8 V656M 2009    AVAILABLE
 SMB Main  005.8 V671m    AVAILABLE

PRINT ITEM
12


 
 
The Net Delusion : The Dark Side Of Internet Freedom Morozov, Evgeny.
New York : Public Affairs, c2011.
Loan Availability:  1 copy available at GIP Main
ITEM LOCATION CALL NO. STATUS
 GIP Main  303.4833 M871N 2011    AVAILABLE

PRINT ITEM
13


 
 
Network Security : Private Communication In A Public World Kaufman, Charlie.
Englewood Cliffs, New Jersey : PTR Prentice Hall, c1995.
Loan Availability:  1 copy available at GIP Main
ITEM LOCATION CALL NO. STATUS
 GIP Main  005.8 KAU    AVAILABLE

PRINT ITEM
14


 
 
PGP : Pretty Good Privacy Garfinkel, Simson.
Sebastopol, CA: O'Reilly & Associates, c1995.
Loan Availability:  1 copy available at MTH Main
ITEM LOCATION CALL NO. STATUS
 MTH Main  005.82 G18p    AVAILABLE

PRINT ITEM
15


 
 
Professional Rootkits Vieler, Ric.
Indianapolis, Ind. : Wiley ; Chichester : John Wiley [distributor], c2007.
Loan Availability:  1 copy available at GIP Main
ITEM LOCATION CALL NO. STATUS
 GIP Main  005.4469 W765 VIE 2007    AVAILABLE

PRINT ITEM
16


 
 
Red Hat Linux Firewalls McCarty, Bill, 1953-
Indianapolis, IN : Wiley Publishing, c2003.
Loan Availability:  1 copy available at GIP Main
ITEM LOCATION CALL NO. STATUS
 GIP Main  005.8 M123R 2003    AVAILABLE

PRINT ITEM
17


 
 
Secure Your Network For Free : Using Nmap, Wireshark, Snort, Nessus, And MRTG Seagren, Eric.
Rockland, Minn. : Syngress, c2007.
Loan Availability:  1 copy available at GIP Main
ITEM LOCATION CALL NO. STATUS
 GIP Main  005.8 S438S 2007    AVAILABLE

PRINT ITEM
Computers Access Control China
18


 
 
Cyber-Nationalism In China : Challenging Western Media Portrayals Of Internet Censorship In China Jiang, Ying, author.
Adelaide : The University of Adelaide Press, 2012.
Loan Availability:  1 copy available at Online

E-BOOK
Computers Access Control Congresses
19


 
 
Coding And Cryptography International Workshop, WCC 2005, Bergen, Norway, March 14-18, 2005. Revised Ytrehus, Øyvind.
Berlin, Heidelberg : Springer Berlin Heidelberg, 2006.
Loan Availability:  1 copy available at Online

E-BOOK
Computers Access Control Economic Aspects Congresses
20


 
 
Economics Of Information Security And Privacy
New York : Springer, c2010.
Loan Availability:  1 copy available at GIP Main
ITEM LOCATION CALL NO. STATUS
 GIP Main  005.8 M824E 2010    AVAILABLE

PRINT ITEM
Computers Access Control Evaluation
21


 
 
Rapid Identification Of Rootkit Infections Using Data Mining Lobo, Desmond.
2010.
Loan Availability:  2 copies available at MTH Closed Access and MTH Quarto
ITEM LOCATION CALL NO. STATUS
 MTH Closed Access  005.8 L786r    LIB USE ONLY
 MTH Quarto  005.8 L786r    AVAILABLE

MANUSCRIPT
Computers Access Control Examinations Study Guides
22


 
 
The Official (ISC)² CISSP CBK Reference Warsinske, John, author.
Hoboken, NJ : Sybex, 2019.
Loan Availability:  1 copy available at Online

E-BOOK
Computers Access Control Handbooks Manuals Etc
23


 
 
An Information Security Handbook Hunter, John M. D., 1940-
London ; New York : Springer, 2001.
Loan Availability:  1 copy available at GIP Main
ITEM LOCATION CALL NO. STATUS
 GIP Main  005.8 H945.I 2001    AVAILABLE

PRINT ITEM
Computers Access Control International Cooperation Periodicals
24


 
 
I-Ways : Digest Of The Global Information Infrastructure Commission.
Washington, D.C. : Transnational Data Reporting Service, [1995-2009]
Loan Availability:  1 copy available at Online

E-RESOURCE
25


 
 
Journal Of E-Governance.
Amsterdam, Netherlands : IOS Press
Loan Availability:  1 copy available at Online

E-RESOURCE
Computers Access Control Passwords
26


 
 
Perfect Passwords : Selection, Protection, Authentication Burnett, Mark
Rockland : Syngress Publishing, 2005.
Loan Availability:  No copies currently available for loan. Try e-Resource if held.

E-BOOK
Computers Access Control Periodicals
27


 
 
ACM SIGSAC Review.
[New York] : ACM Press.
Loan Availability:  1 copy available at Online

E-RESOURCE
28


 
 
Computer Fraud And Security.

Loan Availability:  1 copy available at Online

E-RESOURCE
29


 
 
Computer Fraud And Security Bulletin.
Amsterdam ; New York : Elsevier Science, -2007.
Loan Availability:  1 copy available at Online
 

E-RESOURCE
30


 
 
Cryptography And Communications : Discrete Structures, Boolean Functions And Sequences.
Norwell, MA : Springer, [2009-]
Loan Availability:  1 copy available at Online

E-RESOURCE
Save marked records Save all on page
Locate in results