1. Hacking the code : ASP.NET web application security /: ASP.NET web application security. (©2004) Other Names: Burnett, Mark (Mark M.); Foster, James C Record Type: Book Extent: 1 online resource (xxiii, 447 pages), illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
2. Investigator's guide to steganography. (2004) Other Names: Kipper, Gregory Record Type: Book Extent: 1 online resource (xix, 220 pages), illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
3. Public key infrastructure : building trusted applications and Web services /: building trusted applications and Web services. (©2004) Other Names: Vacca, John R Record Type: Book Extent: 1 online resource (xl, 404 pages), illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
4. Information security policies and procedures : a practitioner's reference /: a practitioner's reference. (©2004) Other Names: Peltier, Thomas R Record Type: Book Extent: 1 online resource (xxiii, 384 pages), illustrations, map View Content: Available online (eLD content is only available in our Reading Rooms) ↗