Logging in...
User ID
:
Password
:
Register
Forgot your PIN?
Forgot my PIN
Enter your username and a recovery link will be emailed to the email address on file at your library.
User ID
:
Log In
|
My Account
|
My Lists
|
|
Remember to clear the cache and close the browser window.
Rooms Restriction Values
All Fields
Title
Author
General Note
Keyword in Author headings
Subject
Keyword in Subject headings
ISBN
Preferred Shelf Number
Search Field
All Fields
Target Value
Limit Value
Restriction Value
Search For:
To enable accessibility mode, return to the beginning of the page and use the link in the menu bar.
Advanced Search
Home Room
Book Collection
E-Book Collection
Multimedia Collection
Thesis Collection
Transportation Engineering Collection
Periodicals Collections
Green Campus
39 Results Found
Actions:
Add to My Lists
Email
Print
Place Hold(s)
Sort By:
Relevance (Default)
Publication Date (Ascending)
Publication Date (Descending)
Title
Author
Select All
1
2
3
4
000
DEFAULT
Select a list
Temporary List
Make this your default list.
The following items were successfully added.
There was an error while adding the following items. Please try again.
One or more items could not be added because you are not logged in.
37.
Simple steps to data encryption : a practical guide to secure computing
Simple steps to data encryption : a practical guide to secure computing
by
Loshin, Peter.
https://learning.oreilly.com/library/view/~/9780124114838
https://go.oreilly.com/library-access/library/view/-/9780124114838/?ar
https://learning.oreilly.com/library/view/~/9780124114838/?ar
Format:
Electronic Resources
38.
Android security essentials LiveLessons : (sneak peek video training)
Android security essentials LiveLessons : (sneak peek video training)
by
Nolan, Godfrey.
https://learning.oreilly.com/videos/~/9780133829266/?ar
https://go.oreilly.com/library-access/library/view/-/9780133829266/?ar
Format:
Electronic Resources
39.
Introduction to computer and network security : navigating shades of gray
Introduction to computer and network security : navigating shades of gray
by
Brooks, R. R. (Richard R.)
https://go.oreilly.com/library-access/library/view/-/9781482214123/?ar
https://learning.oreilly.com/library/view/~/9781482214123
https://learning.oreilly.com/library/view/~/9781482214123/?ar
Format:
Electronic Resources
Select All
1
2
3
4
39 Results Found
Actions:
Add to My Lists
Email
Print
Place Hold(s)
Sort By:
Relevance (Default)
Publication Date (Ascending)
Publication Date (Descending)
Title
Author
Limit Search Results
Narrowed by:
Included
Publication Date: 2013
Included
Subject: Sécurité informatique.
Author
Include
Exclude
Loshin, Peter.
(2)
Seacord, Robert C.
(2)
Bahi, Jacques Mohcine, author.
(1)
Barnett, Ryan C.
(1)
Bathurst, Robert.
(1)
Beaver, Kevin, author.
(1)
Bierer, Doug.
(1)
Brooks, R. R. (Richard R.)
(1)
Brotby, W. Krag.
(1)
Calder, Alan, 1957- author.
(1)
Chuvakin, Anton A.
(1)
Cowen, David.
(1)
Diogenes, Yuri.
(1)
Doherty, Eamon P.
(1)
Elisan, Christopher C.
(1)
Engebretson, Patrick.
(1)
Fabbri, Rosato.
(1)
Ghassemlouei, Alijohn.
(1)
Guyeux, Christophe, author.
(1)
Harkins, Malcolm.
(1)
Hinson, Gary.
(1)
Hosmer, Chet.
(1)
Hypponen, Mikko.
(1)
International Business Machines Corporation. International Technical Support Organization.
(1)
Johnson, Leighton, author.
(1)
Kabay, Michel E.
(1)
Lakhani, Aamir.
(1)
Lakshmiraghavan, Badrinarayanan.
(1)
Laykin, Erik.
(1)
Messier, Ric.
(1)
Moskowitz, Jeremy.
(1)
Moulder, Patricia.
(1)
Muniz, Joseph.
(1)
Nolan, Godfrey.
(1)
O'Connor, T. J.
(1)
Parziale, Lydia.
(1)
Phillips, Christopher.
(1)
Radvanovsky, Robert.
(1)
Raggo, Michael T.
(1)
Rhodes-Ousley, Mark.
(1)
Rogers, Russ.
(1)
Rountree, Derrick.
(1)
Savage, Michelle.
(1)
Schmidt, Kevin J.
(1)
Shinder, Debra Littlejohn.
(1)
Shinder, Thomas W.
(1)
Spendolini, Scott.
(1)
Volpe, Fabrizio.
(1)
Watkins, Steve G.
(1)
Woody, Aaron.
(1)
Yang, Christopher C.
(1)
More
View All
Fewer
Collapse All
Material Type
Include
Exclude
E-Book
(39)
Language
Include
Exclude
English
(39)
Subject
Include
Exclude
Computer security.
(39)
Computer Security
(15)
Electronic books.
(12)
COMPUTERS -- Security -- General.
(11)
Computer networks -- Security measures.
(10)
Réseaux d'ordinateurs -- Sécurité -- Mesures.
(10)
COMPUTERS -- Internet -- Security.
(6)
COMPUTERS -- Networking -- Security.
(6)
Computer crimes -- Investigation.
(6)
Criminalité informatique -- Enquêtes.
(6)
Data protection.
(5)
Protection de l'information (Informatique)
(5)
Computer crimes -- Prevention.
(4)
Criminalistique.
(3)
Forensic Sciences
(3)
Forensic sciences.
(3)
Hackers.
(3)
Operating systems (Computers)
(3)
Pirates informatiques.
(3)
Systèmes d'exploitation (Ordinateurs)
(3)
forensic science.
(3)
operating systems.
(3)
Business enterprises -- Computer networks -- Security measures.
(2)
C (Computer program language)
(2)
C (Langage de programmation)
(2)
COMPUTERS -- Security -- Cryptography.
(2)
Chiffrement (Informatique)
(2)
Computer Science.
(2)
Computer science.
(2)
Computers -- Access control.
(2)
Data encryption (Computer science)
(2)
Engineering & Applied Sciences.
(2)
LAW -- Forensic Science.
(2)
Ordinateurs -- Accès -- Contrôle.
(2)
APIs (interfaces)
(1)
Active server pages.
(1)
Android (Electronic resource)
(1)
Anonymität
(1)
Apple (Ordinateurs)
(1)
Apple computer.
(1)
Application program interfaces (Computer software)
(1)
Application software -- Development -- Computer programs.
(1)
Business -- Data processing.
(1)
C++ (Computer program language)
(1)
C++ (Langage de programmation)
(1)
COMPUTERS -- General.
(1)
COMPUTERS -- Programming Languages -- C♯
(1)
COMPUTERS -- Programming Languages -- Java.
(1)
COMPUTERS -- Programming Languages -- Pascal.
(1)
COMPUTERS -- Security -- Networking.
(1)
COMPUTERS -- Web -- Web Services & APIs.
(1)
COMPUTERS/Internet -- Security.
(1)
COMPUTERS/Networking -- Security.
(1)
COMPUTERS/Security -- General.
(1)
Cell phones.
(1)
Chaos.
(1)
Chaotic behavior in systems.
(1)
Commerce électronique.
(1)
Computer architecture.
(1)
Computer crimes.
(1)
Computer networks -- Access control.
(1)
Computer science
(1)
Computer security -- Standards.
(1)
Computer security -- Terminology.
(1)
Computer software -- Testing.
(1)
Computers / Computer Engineering.
(1)
Corporations -- Corrupt practices.
(1)
Criminalité informatique.
(1)
Cyberspace -- Security measures.
(1)
Datensicherung
(1)
Directory services (Computer network technology)
(1)
Dynamics.
(1)
Dynamique.
(1)
Délits informatiques.
(1)
Electronic commerce.
(1)
Electronic information resources -- Access control.
(1)
Fraud investigation.
(1)
Fraude -- Enquêtes.
(1)
Gestion -- Informatique.
(1)
Information technology -- Security measures.
(1)
Interfaces de programmation d'applications.
(1)
Internet
(1)
Internet.
(1)
Linux.
(1)
Logiciels -- Gestion de configurations.
(1)
Logiciels d'application -- Développement -- Logiciels.
(1)
Logiciels malveillants.
(1)
Logiciels.
(1)
MATHEMATICS -- Advanced.
(1)
MATHEMATICS -- Differential Equations.
(1)
Mac OS.
(1)
Malware (Computer software)
(1)
Management -- Data processing.
(1)
Microsoft Windows (Computer file)
(1)
Microsoft Windows server.
(1)
Oracle Application express.
(1)
Ordinateurs -- Architecture.
(1)
PHP (Computer program language)
(1)
PHP (Langage de programmation)
(1)
PayPal (Firm)
(1)
Penetration testing (Computer security)
(1)
Python
(1)
Python (Computer program language)
(1)
Python (Langage de programmation)
(1)
Rootkits (Computer software)
(1)
Services d'annuaires (Technologie des réseaux)
(1)
Sites Web -- Évaluation.
(1)
Sociétés -- Pratiques déloyales.
(1)
Software configuration management.
(1)
Sources d'information électroniques -- Accès -- Contrôle.
(1)
Systèmes d'exploitation.
(1)
Sécurité informatique -- Normes.
(1)
Sécurité informatique -- Terminologie.
(1)
Technologie de l'information -- Sécurité -- Mesures.
(1)
Technologies de l'information et de la communication.
(1)
Terminology.
(1)
Tests d'intrusion.
(1)
Transmission sans fil -- Sécurité -- Mesures.
(1)
Trousses administrateur pirate.
(1)
Web sites -- Evaluation.
(1)
Web sites -- Testing.
(1)
Wireless communication systems -- Security measures.
(1)
computers.
(1)
kinetics (dynamics)
(1)
z/OS.
(1)
z/VM.
(1)
More
View All
Fewer
Collapse All
Shelf Location
Include
Exclude
O'reilly E-Books
(39)
Library
Include
Exclude
IYTE Library
(39)
false
{sortLabel}
{alphabetical}
{relevance}
{include}
{exclude}
{facetName}
{results}
{displayName}
{count}
{error}