Search again

Found: 5  Titles

Order by :    Show:   Per Page
image
Cloud management and security /
Author
Abbadi, Imad M.
Published
John Wiley & Sons Inc.,
Call Number
QA76.585 A122 2014
Location
Nong Khai Campus Library

image
Insider computer fraud : an in-depth framework for detecting and defending against insider IT attacks /
Author
Brancik, Kenneth C.
Published
Auerbach Publications,
Call Number
QA76.9.A25 B816
Location
Central Library

image

image
Software security : building security in /
Author
McGraw, Gary,
Published
Addison-Wesley,
Call Number
QA76.9.A25 M478 2006
Location
Central Library
Engineering Library

image
SQL injection attacks and defense
Author
Clarke, Justin.
Published
Syngress,

Search Tools: Get RSS Feed
Style Switcher
Theme Colors

Layout Styles