Skip to content
Login
Help
العربية
Print
New Search
(More Searches)
Advanced Keyword
Title
Author
Subject
Call Number
ISBN
Author and Title
Instructor
Course
Dept.
My Library
My Library
My Account
About the library
Suggest a purchase
Comments
Help Topics
Searching
Advanced Keyword Search Tips
Saving your searches
Renewals
Fee Payment
Your session will expire automatically in
0
seconds.
Continue session
End session now
Return to Browse
Limit/Sort Search
View Bag
Empty Bag
(Search History)
Keyword: d:(employees and training and of) or d:(world and wide and web)
Keyword: d:(computer and engineering)
Keyword: d:(financial and statements)
Keyword: d:(architectural and models) or d:(architecture and simulation and methods) or d:(architecture and computer and simulation)
Keyword: d:(teaching and computer and network) or d:(computer and assisted and instruction) or d:(distance and education)
Keyword: Structuralism
Keyword: d:(counseling and data and processing) or d:(vocational and guidance and data) or d:(psychotherapy and data and processing)
Keyword: d:(software and engineering)
Keyword: Word processing
Keyword: d:(chemistry and physical and theoretical)
Keyword: Report writing -- Study and teaching
(Clear Search History)
(End Search Session)
Search history function requires JavaScript.
SearchType
Keyword
Author
Title
Subject
Call no.
Search
Limit search to available items
Add Marked to Bag
Add All On Page
Add Marked to My Lists
Subjects (1-5 of 5)
Internet -- Security measures
1
Building Internet firewalls
Zwicky, Elizabeth D
Beijing ; Cambridge [Mass.] : O'Reilly, c2000. 2000
Rating:
Request
Copies
Location
Call No.
Status
Female Library
TK5105.59 .Z85 2000
Available
2
E-commerce security : weak links, best defenses
Ghosh, Anup K
New York : John Wiley, 1998. 1998
Rating:
Request
Website
Copies
Location
Call No.
Status
Female Library
HF5548.32 .G48 1998
Available
3
Inside internet security : What hackers dont want you to know...
Crume, Jeff
Harlow (England) : Addison-Wesley , 2000 2000
Rating:
Request
Copies
Location
Call No.
Status
Female Library
TK5105.59 C78 2000
Available
Female Library
TK5105.59 C78 2000 c.2
Available
4
Laboratory manual to accompany security strategies in Web applications and social networking / David Kim ; Editor in chief Michael Johnson.
Burlington, MA Jones & Barlett Learning , 2011 2011
Rating:
Request
Copies
Location
Call No.
Status
Female Library
HM742 L23 2011
Available
Female Library
HM742 L23 2011 c.2
Available
5
Security strategies in Web applications and social networking
Harwood, Mike
Sudbury, MA : Jones & Bartlett Learning, 2011 2011
Rating:
Request
Copies
Location
Call No.
Status
Female Library
HM742 H38 2011
Available
Female Library
HM742 H38 2011 c.2
Available
Female Library
HM742 H38 2011 c.3
Available
There are additional copies/volumes of this item
Add Marked to Bag
Add All On Page
Locate in results
Resources
More Information
Return to Browse
Limit/Sort Search
View Bag
Empty Bag
(Search History)
Keyword: d:(employees and training and of) or d:(world and wide and web)
Keyword: d:(computer and engineering)
Keyword: d:(financial and statements)
Keyword: d:(architectural and models) or d:(architecture and simulation and methods) or d:(architecture and computer and simulation)
Keyword: d:(teaching and computer and network) or d:(computer and assisted and instruction) or d:(distance and education)
Keyword: Structuralism
Keyword: d:(counseling and data and processing) or d:(vocational and guidance and data) or d:(psychotherapy and data and processing)
Keyword: d:(software and engineering)
Keyword: Word processing
Keyword: d:(chemistry and physical and theoretical)
Keyword: Report writing -- Study and teaching
(Clear Search History)
(End Search Session)