801. Defense against the black arts : how hackers do what they do and how to protect against it /: how hackers do what they do and how to protect against it. (©2012) Other Names: Varsalone, Jesse; McFadden, Matthew; Morrissey, Sean Record Type: Book Extent: 1 online resource (xvi, 396 pages), illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
802. How to secure and audit Oracle 10g and 11g. (©2009) Other Names: Ben-Natan, Ron Record Type: Book Extent: 1 online resource (xv, 454 pages), illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
803. Breaking into information security : crafting a custom career path to get the job you really want /: crafting a custom career path to get the job you really want. (2016) Authors: More, Josh; Stieber, Anthony J; Liu, Chris Editors: Friedman, Beth Record Type: Book Extent: 1 online resource (265 pages), illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
804. Windows forensic analysis DVD toolkit 2E. (©2009) Other Names: Carvey, Harlan A; Casey, Eoghan Record Type: Book Extent: 1 online resource (xxiv, 482 pages), illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
805. Architecting secure software systems. (2008) Other Names: Talukder, Asoke K; Chaitanya, Manish Record Type: Book Extent: 1 online resource (1 volume) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
806. IT governance : an international guide to data security and ISO27001/ISO27002 /: an international guide to data security and ISO27001/ISO27002. (2015) Authors: Calder, Alan, 1957-; Watkins, Steve, 1970- Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗
807. How to cheat at securing SQL server 2005. (©2007) Other Names: Blum, Timothy; Horninger, Mark Record Type: Book Extent: 1 online resource (xvii, 400 pages), illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
808. Database and applications security : integrating information security and data management /: integrating information security and data management. (2005) Other Names: Thuraisingham, Bhavani M Record Type: Book Extent: 1 online resource (xxxvi, 619 pages), illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
809. Machine learning forensics for law enforcement, security, and intelligence. (©2011) Other Names: Mena, Jesus Record Type: Book Extent: 1 online resource (xii, 337 pages), illustrations, maps View Content: Available online (eLD content is only available in our Reading Rooms) ↗
810. A practical guide to security engineering and information assurance. (©2002) Other Names: Herrmann, Debra S Record Type: Book Extent: 1 online resource (xiii, 393 pages), illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗