1. Information security risk analysis. (2005) Other Names: Peltier, Thomas R Record Type: Book Extent: 1 online resource, illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
2. Public key infrastructure : building trusted applications and Web services /: building trusted applications and Web services. (©2004) Other Names: Vacca, John R Record Type: Book Extent: 1 online resource (xl, 404 pages), illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
3. Information security : design, implementation, measurement, and compliance /: design, implementation, measurement, and compliance. (©2007) Other Names: Layton, Timothy P Record Type: Book Extent: 1 online resource (222 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
4. Designing and implementing Linux firewalls and QoS using netfilter, iproute2, NAT, and L7-filter : learn how to secure your system and implement QoS using real-world scenarios for networks of all sizes /: learn how to secure your system and implement QoS using real-world scenarios for networks of all sizes. (2006) Other Names: Gheorghe, Lucian Record Type: Book Extent: 1 online resource (288 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗