Call Number (LC) | Title | Results |
---|---|---|
TK5105.59 .T57 1999 | Web security / | 1 |
TK5105.59 .T575 2007eb | Mechanics of user identification and authentication : fundamentals of identity management / | 1 |
TK5105.59 .T62 2004eb | Check Point Next Generation with application intelligence security administration | 1 |
TK5105.59 .T76 2010 | Practical intrusion analysis : prevention and detection for the twenty-first century / | 1 |
TK5105.59 .T78 1999 | Trust in cyberspace / | 4 |
TK5105.59 .T78 1999eb | Trust in cyberspace / | 1 |
TK5105.59.T78 1999eb | Trust in Cyberspace. | 1 |
TK5105.59 .U45 2023 | The Active Defender : Immersion in the Offensive Security Mindset / | 1 |
TK5105.59 .U52 2000f | Unclassified computer network security at selected field sites | 1 |
TK5105.59 .U55 1987i | Computer Security Act of 1987 P.L. 100-235, 101 Stat. 1724, January 8, 1988. | 1 |
TK5105.59 .U55 1988i | Computer Matching and Privacy Protection Act of 1988 P.L. 100-503, 102 Stat. 2507, October 18, 1988. | 1 |
TK5105.59 .U68 2017eb | US national cybersecurity : international politics, concepts and organization / | 2 |
TK5105.59 .U77 2022 | Using computational intelligence for the dark web and illicit behavior detection / | 1 |
TK5105.59 .U84 2022 | Cyber intelligence : actors, policies, and practices / | 1 |
TK5105.59 .U85 2015 | Frontiers of engineering : reports on leading-edge engineering from the 2015 symposium / | 1 |
TK5105.59 .U86 2013 |
UTM security with Fortinet : Mastering FortiOS / UTM security with Fortinet Mastering FortiOS / |
3 |
TK5105.59 .V32 2005eb |
Firewalls : jumpstart for network and systems administrators / Firewalls jumpstart for network and systems administrators / |
2 |
TK5105.59 .V333 2005 | Firewalls : jumpstart for network and systems administrators / | 1 |
TK5105.59 .V34 2007 | Practical Internet security / | 1 |
TK5105.59 .V34 2007eb | Practical Internet security / | 1 |