Showing
181 - 200
results of
440
for search '
'
Skip to content
Library Home
Start Over
Research Databases
E-Journals
Course Reserves
Library Home
Login to library account
English
Deutsch
Español
Français
Italiano
日本語
Nederlands
Português
Português (Brasil)
中文(简体)
中文(繁體)
Türkçe
עברית
Gaeilge
Cymraeg
Ελληνικά
Català
Euskara
Русский
Čeština
Suomi
Svenska
polski
Dansk
slovenščina
اللغة العربية
বাংলা
Galego
Tiếng Việt
Hrvatski
हिंदी
Հայերէն
Українська
Language
Library Catalog
All Fields
Title
Author
Subject
Call Number
ISBN/ISSN
Tag
Find
Advanced Search
|
Browse
|
Search Tips
Page will reload when a filter is removed.
Applied Filters:
Library of Congress Call Number:
Remove Filter
T - Technology
Other:
Remove Filter
*-*
Suggested Topics:
Remove Filter
Security measures
Page will reload when a filter is removed.
Show filters (3)
Library of Congress Call Number:
Remove Filter
T - Technology
Other:
Remove Filter
*-*
Suggested Topics:
Remove Filter
Security measures
Search Results | College of the Holy Cross
Suggested Topics within your search.
Suggested Topics within your search.
Security measures
Computer networks
228
COMPUTERS
115
General
114
Computer security
103
Security
98
Internet
97
Networking
84
Internet of things
46
TECHNOLOGY & ENGINEERING
34
Prevention
27
Safety measures
25
Data encryption (Computer science)
22
Data protection
21
Wireless communication systems
19
Computer crimes
17
BUSINESS & ECONOMICS
16
Artificial intelligence
14
Hardware
14
Cryptography
13
Information Technology
13
Computers
12
Management
12
POLITICAL SCIENCE
12
Computer Science
11
Mechanical
11
Nuclear facilities
11
Computer network protocols
10
Machine Theory
10
Machine learning
10
Showing
181 - 200
results of
440
for search '
'
, query time: 0.05s
Narrow Search
Sort
Relevance
Newest
Oldest
Call Number
Author
Title
Select all entries on the page
Email
Export
Print
Save
Select result number 181
181
Visual cryptography and secret image sharing edited by Stelvio Cimato, Ching-Nung Yang.
Published 2012
Click for online access
eBook
Save to List
Saved in:
Select result number 182
182
Radio frequency identification system security : RFIDsec '11 Asia Workshop proceedings edited by Tieyan Li [and others].
Published 2011
Click for online access
eBook
Save to List
Saved in:
Select result number 183
183
The web application hacker's handbook : finding and exploiting security flaws Dafydd Stuttard, Marcus Pinto.
by
Stuttard, Dafydd, 1972-
Published 2011
Click for online access
eBook
Save to List
Saved in:
Select result number 184
184
CMS security handbook : the comprehensive guide for WordPress, Joomla!, Drupal, and Plone Tom Canavan ; technical editor, David A. Chapa.
by
Canavan, Tom
Published 2011
Click for online access
eBook
Save to List
Saved in:
Select result number 185
185
Intrusion Detection : a Machine Learning Approach.
by
Tsai, Jeffrey J. P.
Published 2011
Click for online access
eBook
Save to List
Saved in:
Select result number 186
186
Risk and Safety Analysis of Nuclear Systems John C. Lee, Norman J. McCormick.
by
Lee, John C., 1941-
,
McCormick, Norman J.
Published 2011
Click for online access
eBook
Save to List
Saved in:
Select result number 187
187
IBM WebSphere Application Server v7.0 security Omar Siliceo ; reviewers, Domenico Cantatore, Ty Lim, Jose Mariano Ruiz Martin.
by
Siliceo, Omar
Published 2011
Click for online access
eBook
Save to List
Saved in:
Select result number 188
188
Use of risk analysis in computer-aided persuasion edited by Ekrem Duman and Amir F. Atiya.
Published 2011
Click for online access
eBook
Save to List
Saved in:
Select result number 189
189
Security and emergency planning for water and wastewater utilities Stanley States.
by
States, Stanley
Published 2010
Click for online access
eBook
Save to List
Saved in:
Select result number 190
190
Selecting disinfectants in a security-conscious environment.
Published 2009
Click for online access
eBook
Save to List
Saved in:
Select result number 191
191
Wireless sensor network security edited by Javier Lopez and Jianying Zhou.
Published 2008
Click for online access
eBook
Save to List
Saved in:
Select result number 192
192
Radio frequency identification system security : RFIDsec'10 Asia Workshop proceedings edited by Yingjiu Li and Jianying Zhou.
Published 2010
Click for online access
eBook
Save to List
Saved in:
Select result number 193
193
WiMAX security and quality of service : an end-to-end perspective edited by Seok-Yee Tang, Peter Müller, and Hamid Sharif.
Published 2010
Click for online access
eBook
Save to List
Saved in:
Select result number 194
194
Network security evaluation : using the NSA IEM Ed Fuller.
by
Fuller, Ed
Published 2005
Click for online access
eBook
Save to List
Saved in:
Select result number 195
195
A secure portal : using WebSphere Portal V5 and Tivoli Access Manager V4.1 Michele Galic [and others].
Published 2003
Click for online access
eBook
Save to List
Saved in:
Select result number 196
196
Computational models of risks to infrastructure [edited by] Dejan Skanata, Daniel M. Byrd.
Published 2007
Click for online access
eBook
Save to List
Saved in:
Select result number 197
197
Build your own security lab : a field guide for network testing Michael Gregg.
by
Gregg, Michael (Michael C.)
Published 2008
Click for online access
eBook
Save to List
Saved in:
Select result number 198
198
Beginning Drupal Jacob Redding.
by
Redding, Jacob (Jacob E.)
Published 2010
Click for online access
eBook
Save to List
Saved in:
Select result number 199
199
Silence on the wire : a field guide to passive reconnaissance and indirect attacks Michal Zalewski.
by
Zalewski, Michal
Published 2005
Click for online access
eBook
Save to List
Saved in:
Select result number 200
200
The future of the Internet and how to stop it Jonathan Zittrain.
by
Zittrain, Jonathan (Jonathan L.), 1969-
Published 2008
Click for online access
eBook
Save to List
Saved in:
Select all entries on the page
Email
Export
Print
Save
[1]
Prev
5
6
7
8
9
10
11
12
13
14
15
Next
[22]
Search Tools:
Get RSS Feed
Email this Search
Save Search
Back
Narrow Search
Page will reload when a filter is selected or excluded.
Year of Publication
From:
To:
Format
eBook
431 results
431
Electronic
10 results
10
Book
8 results
8
Conference Proceeding
1 results
1
Government Document
1 results
1
Video
1 results
1
Location
Online
432 results
432
Science
8 results
8
Language
English
434 results
434
French
4 results
4
German
2 results
2
Chinese
1 results
1
Spanish
1 results
1
Library of Congress Call Number
T - Technology
Genre
Conference papers and proceedings
74 results
74
Congresses
74 results
74
Actes de congrès
52 results
52
proceedings (reports)
52 results
52
Electronic books
31 results
31
Handbooks and manuals
7 results
7
Handbooks, manuals, etc
6 results
6
Guides et manuels
4 results
4
handbooks
4 results
4
Study guides
3 results
3
Encyclopedias
1 results
1
Encyclopédies
1 results
1
Examinations
1 results
1
Examinations, questions, etc
1 results
1
Festschriften
1 results
1
Films de formation
1 results
1
Guides de l'étudiant
1 results
1
Instructional films
1 results
1
Inventories
1 results
1
Popular works
1 results
1
Prevention
1 results
1
encyclopedias
1 results
1
examination study guides
1 results
1
see all…
Database
Ebook Central
287 results
287
Springer Ebooks
96 results
96
MIT Ebooks
3 results
3
Academic Video Online
1 results
1
Oxford Scholarship Online
1 results
1
Record Source
eResources
432 results
432
FOLIO
8 results
8