781. Information security architecture : an integrated approach to security in the organization /: an integrated approach to security in the organization. (©2001) Other Names: Tudor, Jan Killmeyer Record Type: Book Extent: 1 online resource (xvi, 368 pages), illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
782. Cloud computing security : foundations and challenges /: foundations and challenges. (2017) Editors: Vacca, John R, 1947- Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗
783. Insider computer fraud : an in-depth framework for detecting and defending against insider IT attacks /: an in-depth framework for detecting and defending against insider IT attacks. (©2008) Other Names: Brancik, Kenneth C Record Type: Book Extent: 1 online resource (xxxiii, 470 pages), illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
784. Malware forensics : investigating and analyzing malicious code /: investigating and analyzing malicious code. (©2008) Other Names: Aquilina, James M; Casey, Eoghan; Malin, Cameron H Record Type: Book Extent: 1 online resource (xxxvi, 676 pages), illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
785. Securing HP NonStop servers in an open systems world : TCP/IP, OSS, & SQL /: TCP/IP, OSS, & SQL. (©2006) Other Names: XYPRO Technology Corporation. Record Type: Book Extent: 1 online resource (lxviii, 932 pages), illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
786. Implementing NetScaler VPX : leverage the features of NetScaler VPX to optimize and deploy responsive web services and applications on multiple virtualization platforms /: leverage the features of NetScaler VPX to optimize and deploy responsive web services and applications on multiple virtualization platforms. (2014) Authors: Sandbu, Marius Other Names: Dhali, Maruf Ahmed cover designer. Record Type: Book Extent: 1 online resource (136 pages), illustrations (some color) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
787. Cyber security essentials. (©2011) Other Names: Graham, James (James J.); Howard, Richard, 1959-; Olson, Ryan, 1981- Record Type: Book Extent: 1 online resource (xv, 325 pages), illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
788. Information security policy development for compliance. (2013) Authors: Williams, Barry L Record Type: Book Extent: 1 online resource (1 volume) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
789. Official (ISC)2 guide to the CSSLP. (©2011) Other Names: Paul, Mano Record Type: Book Extent: 1 online resource (xxiv, 548 pages), illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
790. Zabbix network monitoring essentials : your one-stop solution to efficient network monitoring with zabbix /: your one-stop solution to efficient network monitoring with zabbix. (2015) Authors: Vacche, Andrea Dalle; Lee, Stefano Kewan Record Type: Book Extent: 1 online resource (178 pages), illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗