|
101.
|
Endpoint security / Mark Kadrich. by Kadrich, Mark S. Series: Endpoint securityEdition: 1st ed.Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: Indianapolis : Addison Wesley Professional, c2007Availability: Items available for loan: APU LibraryCall number: QA76.9.A25 K33 2007 c.1 (1).
|
|
102.
|
|
|
103.
|
|
|
104.
|
|
|
105.
|
Information system audit and assurance / D.P. Dube, V. P. Gulati. by Dube, D. P | Gulati, V. P. (Ved Prakash). Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: New Delhi : Tata McGraw-Hill Pub. Co., c2005Availability: Items available for loan: APU LibraryCall number: T58.64 .D83 2005 c.1 (2).
|
|
106.
|
Communications and networking an introduction / John Cowley. by Cowley, John, 1947 August 17- | Ohio Library and Information Network. Series: Undergraduate topics in computer scienceEdition: 2nd ed.Source: SpringerLinkSource: OhioLINK electronic book center (Online)Material type: Text; Format:
available online
; Literary form:
Not fiction
Publication details: London ; New York : Springer, c2012Availability: Items available for loan: APU LibraryCall number: TK5105.5 .C69 2012 c.1 (2). Items available for reference: APU Library ProcessingCall number: TK5105.5 .C69 2012 c.3 (1).
|
|
107.
|
|
|
108.
|
|
|
109.
|
|
|
110.
|
IT audit, control, and security / Robert Moeller. by Moeller, Robert R. Material type: Text; Format:
electronic
available online
; Literary form:
Not fiction
Publication details: Hoboken, N.J. : Wiley, c2010Availability: Items available for loan: APU LibraryCall number: QA76.9.A93 M64 2010 c.1 (2).
|
|
111.
|
|
|
112.
|
Management of information security / Michael E. Whitman, Herbert J. Mattord. by Whitman, Michael E, 1964- | Mattord, Herbert J. Edition: 2nd ed.Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: Boston, Mass. : Thomson Course Technology, c2008Availability: Items available for reference: APU Library ProcessingCall number: TK5105.59 .W45 2008 c.1 (1). :
|
|
113.
|
|
|
114.
|
|
|
115.
|
Computer forensics : a pocket guide / Nathan Clarke. by Clarke, Nathan. Source: Safari books online.Material type: Text; Format:
available online
; Literary form:
Not fiction
Publication details: Ely : IT Governance Pub., 2010Availability: Items available for loan: APU LibraryCall number: QA76.9.A25 C53 2010 c.1 (1).
|
|
116.
|
|
|
117.
|
Business data networks and security / Raymond R. Panko, Julia L. Panko. by Panko, Raymond R | Panko, Julia L | Panko, R. R. Business data networks and telecommunications. Edition: 10th global ed.Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: Essex : Pearson Education, c2015Availability: Items available for loan: APU LibraryCall number: HD30.37 .P36 2015 c.1 (2).
|
|
118.
|
Cryptography and network security : principles and practice / William Stallings. by Stallings, William. Edition: 6th ed.Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: Boston : Prentice Hall, c2014Availability: Items available for loan: APU LibraryCall number: TK5105.59 .S73 2014 c.1 (1). Items available for reference: APU Library ProcessingCall number: TK5105.59 .S73 2014 c.2 (1).
|
|
119.
|
|
|
120.
|
Computer and information security handbook / John R. Vacca. by Vacca, John R. Edition: 2nd edition.Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: Amsterdam : Morgan Kaufman, c2013Availability: Items available for loan: APU LibraryCall number: QA76.9.A25 V33 2013 c.1 (1).
|