Showing
141 - 160
results of
440
for search '
'
Skip to content
Library Home
Start Over
Research Databases
E-Journals
Course Reserves
Library Home
Login to library account
English
Deutsch
Español
Français
Italiano
日本語
Nederlands
Português
Português (Brasil)
中文(简体)
中文(繁體)
Türkçe
עברית
Gaeilge
Cymraeg
Ελληνικά
Català
Euskara
Русский
Čeština
Suomi
Svenska
polski
Dansk
slovenščina
اللغة العربية
বাংলা
Galego
Tiếng Việt
Hrvatski
हिंदी
Հայերէն
Українська
Language
Library Catalog
All Fields
Title
Author
Subject
Call Number
ISBN/ISSN
Tag
Find
Advanced Search
|
Browse
|
Search Tips
Page will reload when a filter is removed.
Applied Filters:
Library of Congress Call Number:
Remove Filter
T - Technology
Other:
Remove Filter
*-*
Suggested Topics:
Remove Filter
Security measures
Page will reload when a filter is removed.
Show filters (3)
Library of Congress Call Number:
Remove Filter
T - Technology
Other:
Remove Filter
*-*
Suggested Topics:
Remove Filter
Security measures
Search Results | College of the Holy Cross
Suggested Topics within your search.
Suggested Topics within your search.
Security measures
Computer networks
228
COMPUTERS
115
General
114
Computer security
103
Security
98
Internet
97
Networking
84
Internet of things
46
TECHNOLOGY & ENGINEERING
34
Prevention
27
Safety measures
25
Data encryption (Computer science)
22
Data protection
21
Wireless communication systems
19
Computer crimes
17
BUSINESS & ECONOMICS
16
Artificial intelligence
14
Hardware
14
Cryptography
13
Information Technology
13
Computers
12
Management
12
POLITICAL SCIENCE
12
Computer Science
11
Mechanical
11
Nuclear facilities
11
Computer network protocols
10
Machine Theory
10
Machine learning
10
Showing
141 - 160
results of
440
for search '
'
, query time: 0.05s
Narrow Search
Sort
Relevance
Newest
Oldest
Call Number
Author
Title
Select all entries on the page
Email
Export
Print
Save
Select result number 141
141
Disaster recovery planning for communications and critical infrastructure Leo A. Wrobel, Sharon M. Wrobel.
by
Wrobel, Leo A. (Leo Anthony)
Published 2009
Click for online access
eBook
Save to List
Saved in:
Select result number 142
142
Firewall policies and VPN configurations Anne Henmi, technical editor ; Mark Lucas, Abhishek Singh, Chris Cantrell.
Published 2006
Click for online access
eBook
Save to List
Saved in:
Select result number 143
143
PGP & GPG : email for the practical paranoid by Michael W. Lucas.
by
Lucas, Michael W. (Michael Warren), 1967-
Published 2006
Click for online access
eBook
Save to List
Saved in:
Select result number 144
144
Assessment of the Bureau of Reclamation's security program Committee on the Assessment of the Bureau of Reclamation's Security Program, Board on Infrastructure and the Constructed Environment, Division on Engineering and Physical Sciences, National Research Council of the National Academies.
Published 2008
Click for online access
eBook
Save to List
Saved in:
Select result number 145
145
Issues in online security editor G.E. Gorman.
Published 2007
Click for online access
eBook
Save to List
Saved in:
Select result number 146
146
Security in ad hoc and sensor networks Raheem Beyah, Janise McNair, Cherita Corbett.
by
Beyah, Raheem (Raheem A.), 1976-
Published 2010
Click for online access
eBook
Save to List
Saved in:
Select result number 147
147
Adaptive security management architecture James S. Tiller.
by
Tiller, James S.
Published 2011
Click for online access
eBook
Save to List
Saved in:
Select result number 148
148
Transportation systems reliability and safety B.S. Dhillon.
by
Dhillon, B. S. (Balbir S.), 1947-
Published 2011
Click for online access
eBook
Save to List
Saved in:
Select result number 149
149
From problem toward solution : wireless sensor networks security Zhen Jiang and Yi Pan, editors.
Published 2009
Click for online access
eBook
Save to List
Saved in:
Select result number 150
150
Implementing SSL/TLS using cryptography and PKI Joshua Davies.
by
Davies, Joshua A. (Joshua Aaron)
Published 2011
Click for online access
eBook
Save to List
Saved in:
Select result number 151
151
Cloud security : a comprehensive guide to secure cloud computing Ronald L. Krutz, Russell Dean Vines.
by
Krutz, Ronald L., 1938-
Published 2010
Click for online access
eBook
Save to List
Saved in:
Select result number 152
152
IT audit, control, and security Robert Moeller.
by
Moeller, Robert R.
Published 2010
Click for online access
eBook
Save to List
Saved in:
Select result number 153
153
The Practicality of Pulsed Fast Neutron Transmission Spectroscopy for Aviation Security.
Published 1999
Click for online access
eBook
Save to List
Saved in:
Select result number 154
154
Identity Management : Concepts, Technologies, and Systems.
by
Bertino, Elisa
Published 2011
Click for online access
eBook
Save to List
Saved in:
Select result number 155
155
Official (ISC)2 guide to the CAP CBK Patrick D. Howard.
by
Howard, Patrick D.
Published 2012
Click for online access
eBook
Save to List
Saved in:
Select result number 156
156
Microsoft forefront identity manager 2010 R2 handbook : a complete handbook on FIM 2010 R2 covering both identity and certificate management Kent Nordström.
by
Nordström, Kent
Published 2012
Click for online access
eBook
Save to List
Saved in:
Select result number 157
157
Photonic sensing : principles and applications for safety and security monitoring George Xiao, Wojtek J. Bock.
by
Xiao, George
Published 2012
Click for online access
eBook
Save to List
Saved in:
Select result number 158
158
WebSphere Application Server for z/OS V5 and J2EE 1.3 security handbook Steve Allison [and others].
Published 2005
Click for online access
eBook
Save to List
Saved in:
Select result number 159
159
The death of the internet edited by Markus Jakobsson.
Published 2012
Click for online access
eBook
Save to List
Saved in:
Select result number 160
160
Hospitality security : managing security in today's hotel, lodging, entertainment, and tourism environment Darrell Clifton.
by
Clifton, Darrell
Published 2012
Click for online access
eBook
Save to List
Saved in:
Select all entries on the page
Email
Export
Print
Save
[1]
Prev
3
4
5
6
7
8
9
10
11
12
13
Next
[22]
Search Tools:
Get RSS Feed
Email this Search
Save Search
Back
Narrow Search
Page will reload when a filter is selected or excluded.
Year of Publication
From:
To:
Format
eBook
431 results
431
Electronic
10 results
10
Book
8 results
8
Conference Proceeding
1 results
1
Government Document
1 results
1
Video
1 results
1
Location
Online
432 results
432
Science
8 results
8
Language
English
434 results
434
French
4 results
4
German
2 results
2
Chinese
1 results
1
Spanish
1 results
1
Library of Congress Call Number
T - Technology
Genre
Conference papers and proceedings
74 results
74
Congresses
74 results
74
Actes de congrès
52 results
52
proceedings (reports)
52 results
52
Electronic books
31 results
31
Handbooks and manuals
7 results
7
Handbooks, manuals, etc
6 results
6
Guides et manuels
4 results
4
handbooks
4 results
4
Study guides
3 results
3
Encyclopedias
1 results
1
Encyclopédies
1 results
1
Examinations
1 results
1
Examinations, questions, etc
1 results
1
Festschriften
1 results
1
Films de formation
1 results
1
Guides de l'étudiant
1 results
1
Instructional films
1 results
1
Inventories
1 results
1
Popular works
1 results
1
Prevention
1 results
1
encyclopedias
1 results
1
examination study guides
1 results
1
see all…
Database
Ebook Central
287 results
287
Springer Ebooks
96 results
96
MIT Ebooks
3 results
3
Academic Video Online
1 results
1
Oxford Scholarship Online
1 results
1
Record Source
eResources
432 results
432
FOLIO
8 results
8