901. Getting Started with Citrix XenApp 6.5 : Design and Implement Citrix Farms Based on XenApp 6.5 /: Design and Implement Citrix Farms Based on XenApp 6.5. ([2012]) Other Names: Musumeci, Guillermo Record Type: Book Extent: 1 online resource (ix, 454 pages), illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
902. Internet security : a jumpstart for systems administrators and IT managers /: a jumpstart for systems administrators and IT managers. (©2003) Other Names: Speed, Tim; Ellis, Juanita Record Type: Book Extent: 1 online resource, illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
903. User-Centred and Context-Aware Identity Management in Mobile Ad-Hoc Networks. (2013) Other Names: Arabo, Abdullahi Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗
904. Security for wireless sensor networks using identity-based cryptography. (©2013) Other Names: Patil, Harsh Kupwade; Szygenda, Stephen A Record Type: Book Extent: 1 online resource (xix, 204 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
905. The state of the art in intrusion prevention and detection. ([2014]) Authors: Pathan, Al-Sakib Khan Editors: Pathan, Al-Sakib Khan Record Type: Book Extent: 1 online resource (xvii, 496 pages), illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
906. Public key infrastructure : building trusted applications and Web services /: building trusted applications and Web services. (©2004) Other Names: Vacca, John R Record Type: Book Extent: 1 online resource (xl, 404 pages), illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
907. Trustworthy cloud computing. ([2016]) Authors: Safonov, V. O (Vladimir Olegovich) Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗
908. Cultural property security : protecting museums, historic sites, archives, and libraries /: protecting museums, historic sites, archives, and libraries. ([2013]) Other Names: Benny, Daniel J Record Type: Book Extent: 1 online resource (xx, 211 pages), illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
909. Instant Java password and authentication security : a practical, hands-on guide to securing Java application passwords with hashing techniques /: a practical, hands-on guide to securing Java application passwords with hashing techniques. (2013) Other Names: Mayoral, Fernando Record Type: Book Extent: 1 online resource, color illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
910. Snort : IDS and IPS toolkit /: IDS and IPS toolkit. (©2007) Other Names: Beale, Jay; Baker, Andrew R; Esler, Joel Record Type: Book Extent: 1 online resource (xxxiv, 730 pages), illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗