741. Solving cyber risk : protecting your company and society /: protecting your company and society. (2018) Authors: Coburn, Andrew (Andrew W.); Leverett, Eireann, 1975-; Woo, G Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗
742. Microsoft Forefront UAG 2010 administrator's handbook : take full command of Microsoft Forefront Unified Access Gateway to secure your business applications and provide dynamic remote access with DirectAccess /: take full command of Microsoft Forefront Unified Access Gateway to secure your business applications and provide dynamic remote access with DirectAccess. (2011) Other Names: Ben-Ari, Erez; Dolev, Ran Record Type: Book Extent: 1 online resource (viii, 461 pages), color illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
743. Hacking the code : ASP.NET web application security /: ASP.NET web application security. (©2004) Other Names: Burnett, Mark (Mark M.); Foster, James C Record Type: Book Extent: 1 online resource (xxiii, 447 pages), illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
744. Least privilege security for Windows 7, Vista, and XP : secure desktops for regulatory compliance and business agility /: secure desktops for regulatory compliance and business agility. (2010) Other Names: Smith, Russell Record Type: Book Extent: 1 online resource (xi, 436 pages), illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
745. Mechanics of user identification and authentication : fundamentals of identity management /: fundamentals of identity management. (©2007) Other Names: Todorov, Dobromir Record Type: Book Extent: 1 online resource (xxv, 728 pages), illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
746. Hacken für Dummies. (2017) Authors: Beaver, Kevin Other Names: Franken, Gerhard translator.; (Translator) Schmidt, Jutta translator. Record Type: Book Extent: 1 online resource, illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
747. Securing E-Business applications and communications. (©2001) Other Names: Held, Jonathan S; Bowers, John R Record Type: Book Extent: 1 online resource (x, 347 pages), illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
748. Getting started with FortiGate simplify and protect your network using the FortiGate network security applicance /: simplify and protect your network using the FortiGate network security applicance. (2013) Other Names: Fabbri, Rosato; Volpe, Fabrizio Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗
749. Risk analysis and security countermeasure selection. (©2010) Other Names: Norman, Thomas L Record Type: Book Extent: 1 online resource (xxv, 396 pages), illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
750. Computer forensics with FTK : enhance your computer forensics knowledge through illustrations, tips, tricks, and practical real-world scenarios /: enhance your computer forensics knowledge through illustrations, tips, tricks, and practical real-world scenarios. (2014) Other Names: Carbone, Fernando Record Type: Book Extent: 1 online resource (1 volume), illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗