Logging in...
User ID
:
Password
:
Register
Forgot your PIN?
Forgot my PIN
Enter your username and a recovery link will be emailed to the email address on file at your library.
User ID
:
Log In
|
My Account
|
My Lists
|
|
Remember to clear the cache and close the browser window.
Rooms Restriction Values
All Fields
Title
Author
General Note
Keyword in Author headings
Subject
Keyword in Subject headings
ISBN
Preferred Shelf Number
Search Field
All Fields
Target Value
Limit Value
Restriction Value
Search For:
To enable accessibility mode, return to the beginning of the page and use the link in the menu bar.
Advanced Search
Home Room
Book Collection
E-Book Collection
Multimedia Collection
Thesis Collection
Transportation Engineering Collection
Periodicals Collections
Green Campus
39 Results Found
Actions:
Add to My Lists
Email
Print
Place Hold(s)
Sort By:
Relevance (Default)
Publication Date (Ascending)
Publication Date (Descending)
Title
Author
Select All
1
2
3
4
000
DEFAULT
Select a list
Temporary List
Make this your default list.
The following items were successfully added.
There was an error while adding the following items. Please try again.
One or more items could not be added because you are not logged in.
37.
The Prompt Payment Act Answer Book
The Prompt Payment Act Answer Book
by
Arnold, William, author.
https://learning.oreilly.com/library/view/~/9781567263336
https://learning.oreilly.com/library/view/~/9781567263336/?ar
https://go.oreilly.com/library-access/library/view/-/9781567263336/?ar
Format:
Electronic Resources
38.
The Antideficiency Act Answer Book
The Antideficiency Act Answer Book
by
Arnold, William, author.
https://learning.oreilly.com/library/view/~/9781567263343/?ar
https://learning.oreilly.com/library/view/~/9781567263343
https://go.oreilly.com/library-access/library/view/-/9781567263343/?ar
Format:
Electronic Resources
39.
Microsoft
Microsoft
by
Miller, Michael, author.
https://learning.oreilly.com/library/view/~/9780768695311
https://go.oreilly.com/library-access/library/view/-/9780768695311/?ar
https://learning.oreilly.com/library/view/~/9780768695311/?ar
Format:
Electronic Resources
Select All
1
2
3
4
39 Results Found
Actions:
Add to My Lists
Email
Print
Place Hold(s)
Sort By:
Relevance (Default)
Publication Date (Ascending)
Publication Date (Descending)
Title
Author
Limit Search Results
Narrowed by:
Included
Publication Date: 2009
Included
Subject: Computer networks -- Security measures.
Author
Include
Exclude
IGI Global.
(3)
Allsopp, Wil.
(2)
Arnold, William, author.
(2)
Liu, Dale.
(2)
Mason, Andrew.
(2)
Vacca, John R.
(2)
Beyah, Raheem.
(1)
Blair, Ray, 1965-
(1)
Bowen, Richard Cooper, 1971-
(1)
Campagna, Rich.
(1)
Carvey, Harlan A.
(1)
Casey, Eoghan.
(1)
Cisco Systems, Inc.
(1)
Clarke-Salt, Justin.
(1)
Coar, Ken A. L.
(1)
Cole, Eric.
(1)
Conley, James W.
(1)
Conti, Greg.
(1)
Corbett, Cherita.
(1)
Davis, Steven B.
(1)
Dhanjani, Nitesh.
(1)
Durai, Arvind.
(1)
Dwivedi, Himanshu.
(1)
Evans, Keatron.
(1)
Fry, Chris.
(1)
Hardin, Brett.
(1)
Hogg, Scott.
(1)
Iglezakis, Ioannis, 1965-
(1)
Kaczmarek, Daniel.
(1)
Kelley, Jay.
(1)
Kissell, Joe.
(1)
Knapp, Kenneth J.
(1)
Kozyris, Phaedon J. (Phaedon John)
(1)
Krutz, Ronald L., 1938-
(1)
Kumaraswamy, Subra.
(1)
Latif, Shahed.
(1)
Lindfield, Ryan.
(1)
Marty, Raffael, 1976-
(1)
Mather, Tim.
(1)
McNair, Janise.
(1)
Miller, Michael, author.
(1)
Nystrom, Martin.
(1)
Oppliger, Rolf.
(1)
Oram, Andrew.
(1)
Paquet, Catherine.
(1)
Politis, Dionysios.
(1)
Posey, Brien.
(1)
ProQuest (Firm)
(1)
Rios, Billy.
(1)
Rong, Chunming.
(1)
Safari, an O'Reilly Media Company.
(1)
Thompson, Troy.
(1)
Viega, John.
(1)
Voth, Jack B.
(1)
Vyncke, Eric.
(1)
Walker, Andy (Andy G.), 1967-
(1)
Wang, Yun.
(1)
Wayner, Peter, 1964-
(1)
Wessels, Denzil.
(1)
Whitaker, Andrew.
(1)
Çayirci, E. (Erdal)
(1)
More
View All
Fewer
Collapse All
Material Type
Include
Exclude
E-Book
(39)
Language
Include
Exclude
English
(38)
Polish
(1)
Subject
Include
Exclude
Réseaux d'ordinateurs -- Sécurité -- Mesures.
(27)
Electronic books.
(23)
Computer security.
(14)
Sécurité informatique.
(11)
COMPUTERS -- Internet -- Security.
(8)
COMPUTERS -- Networking -- Security.
(8)
COMPUTERS -- Security -- General.
(8)
Computer security -- Management.
(4)
Data protection.
(4)
Electronic books. -- local.
(4)
Information technology -- Security measures.
(4)
Computer Security
(3)
Computersicherheit
(3)
Coupe-feu (Sécurité informatique)
(3)
Firewalls (Computer security)
(3)
Protection de l'information (Informatique)
(3)
Sécurité informatique -- Gestion.
(3)
Technologie de l'information -- Sécurité -- Mesures.
(3)
BUSINESS & ECONOMICS -- Accounting -- Governmental.
(2)
Computer hackers.
(2)
Délits informatiques.
(2)
Hackers.
(2)
Informatique en nuage.
(2)
Internet -- Security measures.
(2)
Manuels.
(2)
Microsoft Windows (Computer file)
(2)
Pirates informatiques.
(2)
Rechnernetz
(2)
Routers (Computer networks)
(2)
Routeurs (Réseaux d'ordinateurs)
(2)
Sicherheitsmassnahme.
(2)
Wireless communication systems -- Security measures.
(2)
Ad hoc networks (Computer networks) -- Security measures.
(1)
Apache (Computer file : Apache Group)
(1)
Application software -- Security measures.
(1)
Architecture informatique.
(1)
Aufsatzsammlung.
(1)
CCSP
(1)
COMPUTERS -- Computer Literacy.
(1)
COMPUTERS -- Computer Science.
(1)
COMPUTERS -- Data Processing.
(1)
COMPUTERS -- Hardware -- General.
(1)
COMPUTERS -- Information Technology.
(1)
COMPUTERS -- Machine Theory.
(1)
COMPUTERS -- Reference.
(1)
Cartes de crédit -- Sécurité -- Mesures -- Normes -- Guides, manuels, etc.
(1)
Chiffrement (Informatique)
(1)
Cisco IOS.
(1)
Cisco Systems, Inc.
(1)
Cloud Computing
(1)
Cloud computing -- Security measures.
(1)
Computer crimes -- Investigation -- Methodology.
(1)
Computer crimes -- Investigation.
(1)
Computer crimes -- Social aspects.
(1)
Computer crimes.
(1)
Computer games.
(1)
Computer network protocols.
(1)
Computer networking & communications.
(1)
Computer networks -- Access control.
(1)
Computer networks -- Security measures -- Handbooks, manuals, etc.
(1)
Computer networks Security measures
(1)
Computer security -- Computer programs.
(1)
Computer security -- Testing.
(1)
Computers and IT.
(1)
Consumer protection.
(1)
Credit cards -- Security measures -- Standards -- Handbooks, manuals, etc.
(1)
Criminalité informatique -- Enquêtes -- Méthodologie.
(1)
Criminalité informatique -- Enquêtes.
(1)
Cryptographie.
(1)
Cryptography.
(1)
Cyber security threat problem
(1)
Cyberproperty
(1)
Cyberspace -- Security measures.
(1)
Data encryption (Computer science)
(1)
Data mining and modeling
(1)
Data reduction techniques for network traffic
(1)
Data reliability, validity, and quality
(1)
Datensicherung
(1)
Decision analysis in network security
(1)
Digital forensics
(1)
Electronic crime
(1)
Electronic intrusion
(1)
Electronic resource.
(1)
Forensic watermarking
(1)
GFI Software (Firm)
(1)
GFI Software (Firm) -- Handbooks, manuals, etc.
(1)
Global information assurance
(1)
Google
(1)
Google (Firm)
(1)
Google LLC
(1)
Google.
(1)
Guides et manuels.
(1)
Handbook
(1)
Handbooks and manuals.
(1)
Human factors in security
(1)
Identity theft.
(1)
Infonuagique -- Sécurité -- Mesures.
(1)
Information security management standards
(1)
Information sharing
(1)
Information visualization.
(1)
Informationssystem
(1)
Informatique.
(1)
Insider threat prevention, detection, and mitigation
(1)
Internet
(1)
Internet -- Sécurité -- Mesures.
(1)
Internet privacy
(1)
Internet telephony -- Security measures.
(1)
Internet.
(1)
Intrusion detection systems
(1)
LAW -- Forensic Science.
(1)
Local area networks (Computer networks) -- Security measures.
(1)
Mac OS.
(1)
Macintosh (Computer) -- Programming.
(1)
Managing identity fraud
(1)
Measure user behavior
(1)
Microsoft Windows (Computer file) -- Security measures.
(1)
Microsoft Windows (Computer file) / Security measures.
(1)
Models network data for association and prediction
(1)
Network data characteristics
(1)
Network security.
(1)
Network traffic and data
(1)
Onset of information terrorism
(1)
Operating systems (Computers).
(1)
Privacy implications of identity protection
(1)
Privacy laws and principles
(1)
Privacy, Right of.
(1)
Public policy drivers
(1)
Réseaux ad hoc (Réseaux d'ordinateurs) -- Sécurité -- Mesures.
(1)
Réseaux d'ordinateurs -- Sécurité -- Mesures -- Guides, manuels, etc.
(1)
Réseaux informatiques.
(1)
SPAM (Electronic mail) -- Law and legislation.
(1)
SQL (Computer program language).
(1)
Security implications for management
(1)
Security systems.
(1)
Sensor networks -- Security measures.
(1)
Serveurs Web -- Logiciels.
(1)
Software protection.
(1)
Statistical opportunity in network security
(1)
Statistical software for analyzing network data
(1)
Supervised learning techniques for network traffic classification
(1)
Surveillance
(1)
TCP/IP (Computer network protocol)
(1)
TCP/IP (Protocole de réseaux d'ordinateurs)
(1)
Technologies de l'information et de la communication.
(1)
Threat identification of an enterprise network
(1)
Téléphonie Internet -- Sécurité -- Mesures.
(1)
UNIX Shells.
(1)
Unsolicited unwanted bulk spam
(1)
Unsupervised learning techniques for network traffic classification
(1)
Visualisation de l'information.
(1)
Web servers -- Computer programs.
(1)
More
View All
Fewer
Collapse All
Shelf Location
Include
Exclude
O'reilly E-Books
(29)
Ebrary Collection
(7)
IGI Global
(3)
Library
Include
Exclude
IYTE Library
(39)
false
{sortLabel}
{alphabetical}
{relevance}
{include}
{exclude}
{facetName}
{results}
{displayName}
{count}
{error}