Your search returned 136 results.

Sort
Results
81.
Windows registry forensics : advanced digital forensic analysis of the Windows registry. by
Material type: Text Text; Literary form: Not fiction
Publication details: Burlington : Elsevier Science, 2011
Availability: Items available for loan: MAIN (2)Call number: HV8079 .C65 C373 2011, ...

82.
E-Business / Gary Schneider by
Edition: 10th ed.
Material type: Text Text; Literary form: Fiction
Publication details: Australia: Cengage Learning, 2013
Availability: Items available for loan: MAIN (2)Call number: HF5548.32 .S284 2013, ...

83.
Security+ guide to network security fundamentals / Mark Ciampa. by
Edition: 3rd ed.
Material type: Text Text; Literary form: Fiction
Publication details: Boston: Course Technology, 2009
Availability: Items available for loan: MAIN (2)Call number: TK5105.59 .C52 2009, ...

84.
Security+ guide to network security fundamentals / Mark Ciampa. by
Edition:
Material type: Text Text; Literary form: Fiction
Publication details: Boston: Course Technology, 2012
Availability: Items available for loan: MAIN (3)Call number: TK5105.59 .C52 2012, ...

85.
Windows forensic analysis toolkit advanced analysis techniques for Windows 7 by
Edition: 3rd ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Waltham, MA : Syngress, c2012
Availability: Items available for loan: MAIN (2)Call number: HV8079.C65 C3726 2012, ...

86.
Computer networks : a systems approach / Larry L. Peterson and Bruce S. Davie. by
Edition: 5th ed., international student ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Burlington, MA : Morgan Kaufmann, c2012
Availability: Items available for loan: MAIN (2)Call number: TK5105.5 .P479 2012, ...

87.
Computer networks : a top-down approach / Behrouz A. Forouzan and Firouz Mosharraf by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New York, NY : McGraw-Hill, c2012
Availability: Items available for loan: MAIN (1)Call number: TK5105.5 .F577 2012.

88.
Network+ guide to networks / Tamara Dean. by
Edition: 5th ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Boston, Mass. : Course TechnologyCengage Learning ; c2010
Availability: Items available for loan: MAIN (2)Call number: TK5105.5 .D38257 2010, ...

89.
Enhanced Network+ guide to networks / Tamara Dean. by
Edition: Enhanced ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Boston, Mass. : Thomson/Course Technology, c2003
Availability: Items available for loan: MAIN (1)Call number: TK5105.5 .D3825 2003.

90.
Mobile and wireless network security and privacy / edited by S. Kami Makki ... [et al.]. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New York, NY : Springer, c2009
Availability: Items available for loan: MAIN (2)Call number: TK5102.85 .M618 2009, ...

91.
92.
Network security bible / Eric Cole, Ronald Krutz, James W. Conley by
Edition: 2nd ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Indianapolis, IN : Wiley Pub., c2009
Availability: Not available: MAIN: Checked out (1).

93.
Securing the cloud : cloud computer security techniques and tactics / Vic J.R. Winkler. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Waltham, MA : Syngress/Elsevier, 2011
Availability: Items available for loan: MAIN (2)Call number: QA76.585 .W56 2011, ...

94.
Concepts in enterprise resource planning / Ellen Monk, Bret Wagner. by
Edition: 4th ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Mason, OH : Course Technology, 2013
Availability: Items available for loan: MAIN (2)Call number: HD30.28 .M644 2013, ...

95.
CISSP study guide / Eric Conrad, Seth Misenar, Joshua Feldman. by
Edition: 2nd ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: waltham, MA : Syngress/Elsevier, c2012
Availability: Items available for loan: MAIN (1)Call number: QA76.3 .C497 2012.

96.
Counter hack reloaded : a step-by-step guide to computer attacks and effective defenses / Ed Skoudis with Tom Liston. by Series: Radia Perlman series in computer networking and security
Edition: 2nd ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Upper Saddle River, NJ : Prentice Hall Professional Technical Reference, c2006
Availability: Items available for loan: MAIN (2)Call number: TK5105.59 .S57 2006, ...

97.
Open process frameworks : patterns for the adaptive e-enterprise : with a case study in contract labor management / David A. Marca ; foreword by Walter Bender. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Hoboken, NJ : Wiley-Interscience, c2005
Availability: Items available for loan: MAIN (2)Call number: HF5548.32 .M368 2005, ...

98.
Hacking exposed 7 : network security secrets & solutions / Stuart Mcclure, Joel Scambray, George Kurtz. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New York : McGraw-Hill, [2012]
Availability: Items available for loan: MAIN (2)Call number: TK5105.59 .M48 2012, ...

99.
system center 2012 configuration manager mastering the fundamentals / Kent Agerlund. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Indianapolis, IN : Wiley Pub., Inc., 2012
Availability: Items available for loan: MAIN (2)Call number: TK5105.5 .A34 2012, ...

100.
E-business and e-commerce management : strategy, implementation and practice / Dave Chaffey. by
Edition: 4th ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Harlow, England ; New York : FT Prentice Hall, 2009
Availability: Items available for loan: MAIN (1)Call number: HF5548.32 .C472 2009.

Pages