Showing
1 - 20
results of
246
for search '
'
Skip to content
Library Home
Start Over
Research Databases
E-Journals
Course Reserves
Library Home
Login to library account
English
Deutsch
Español
Français
Italiano
日本語
Nederlands
Português
Português (Brasil)
中文(简体)
中文(繁體)
Türkçe
עברית
Gaeilge
Cymraeg
Ελληνικά
Català
Euskara
Русский
Čeština
Suomi
Svenska
polski
Dansk
slovenščina
اللغة العربية
বাংলা
Galego
Tiếng Việt
Hrvatski
हिंदी
Հայերէն
Українська
Language
Library Catalog
All Fields
Title
Author
Subject
Call Number
ISBN/ISSN
Tag
Find
Advanced Search
|
Browse
|
Search Tips
Page will reload when a filter is removed.
Applied Filters:
Suggested Topics:
Remove Filter
General
AND
Remove Filter
COMPUTERS
AND
Remove Filter
Security
Page will reload when a filter is removed.
Show filters (3)
Suggested Topics:
Remove Filter
General
AND
Remove Filter
COMPUTERS
AND
Remove Filter
Security
Search Results | College of the Holy Cross
Suggested Topics within your search.
Suggested Topics within your search.
COMPUTERS
General
Security
Networking
182
Internet
173
Security measures
162
Computer security
142
Computer networks
125
Data protection
26
Access control
22
Penetration testing (Computer security)
20
Computers
17
Prevention
17
Computer crimes
14
Information technology
13
Management
11
Hackers
10
Business enterprises
8
Certification
8
Electronic data processing personnel
8
Examinations
8
Firewalls (Computer security)
8
Online Safety & Privacy
8
Cyberterrorism
7
Computer networking & communications
6
Computersicherheit
6
Data encryption (Computer science)
6
Hacking
6
Information Technology
6
Privacy, Right of
6
Showing
1 - 20
results of
246
for search '
'
, query time: 0.05s
Narrow Search
Sort
Relevance
Newest
Oldest
Call Number
Author
Title
Select all entries on the page
Email
Export
Print
Save
Select result number 1
1
Designing and building enterprise DMZs technical editor, Ido Dubrawsky ; authors, C. Tate Baumrucker [and others].
Published 2006
Click for online access
eBook
Save to List
Saved in:
Select result number 2
2
Sockets, shellcode, porting & coding : reverse engineering exploits and tool coding for security professionals James C. Foster with Mike Price.
by
Foster, James C.
,
Price, Mike (Mike Morgan)
Published 2005
Click for online access
eBook
Save to List
Saved in:
Select result number 3
3
Security+ study guide & DVD training system [Michael Cross [and others].
Published 2007
Click for online access
eBook
Save to List
Saved in:
Select result number 4
4
Open source fuzzing tools.
by
Rathaus, Noam
Published 2007
Click for online access
eBook
Save to List
Saved in:
Select result number 5
5
Integrated security systems design : concepts, specifications, and implementation Thomas Norman.
by
Norman, Thomas L.
Published 2007
Click for online access
eBook
Save to List
Saved in:
Select result number 6
6
Zen and the art of information security Ira Winkler.
by
Winkler, Ira
Published 2007
Click for online access
eBook
Save to List
Saved in:
Select result number 7
7
Finding and fixing vulnerabilities in information systems : the vulnerability assessment & mitigation methodology Philip S. Anton [and others] ; prepared for the Defense Advanced Research Projects Agency.
Published 2003
Click for online access
eBook
Save to List
Saved in:
Select result number 8
8
Mission-critical network planning Matthew Liotine.
by
Liotine, Matthew
Published 2003
Click for online access
eBook
Save to List
Saved in:
Select result number 9
9
Defense and detection strategies against Internet worms Jose Nazario.
by
Nazario, Jose
Published 2004
Click for online access
eBook
Save to List
Saved in:
Select result number 10
10
Snort 2.0 intrusion detection Jay Beale, James C. Foster ; Jeffrey Posluns, technical advisor ; Brian Caswell, technical editor.
by
Beale, Jay
Published 2003
Click for online access
eBook
Save to List
Saved in:
Select result number 11
11
Role-based access control David F. Ferraiolo, D. Richard Kuhn, Ramaswamy Chandramouli.
by
Ferraiolo, David
Published 2003
Click for online access
eBook
Save to List
Saved in:
Select result number 12
12
Techniques and applications of digital watermarking and content protection Michael Arnold, Martin Schmucker, Stephen D. Wolthusen.
by
Arnold, Michael (Michael Konrad), 1964-
Published 2003
Click for online access
eBook
Save to List
Saved in:
Select result number 13
13
The best damn firewall book period Anne Carasik-Henmi, technical editor ; Thomas W. Shinder [and others].
Published 2003
Click for online access
eBook
Save to List
Saved in:
Select result number 14
14
Secure communicating systems : design, analysis, and implementation Michael R.A. Huth.
by
Huth, Michael, 1962-
Published 2001
Click for online access
eBook
Save to List
Saved in:
Select result number 15
15
Bluetooth security Christian Gehrmann, Joakim Persson, Ben Smeets.
by
Gehrmann, Christian
Published 2004
Click for online access
eBook
Save to List
Saved in:
Select result number 16
16
Cyber adversary characterization : auditing the hacker mind Tom Parker [and 4 others].
Published 2004
Click for online access
eBook
Save to List
Saved in:
Select result number 17
17
Configuring NetScreen firewalls Rob Cameron [and others].
Published 2005
Click for online access
eBook
Save to List
Saved in:
Select result number 18
18
Programmer's ultimate security deskref James C. Foster, Stephen C. Foster.
by
Foster, James C.
Published 2004
Click for online access
eBook
Save to List
Saved in:
Select result number 19
19
Privacy protection and computer forensics Michael A. Caloyannides.
by
Caloyannides, Michael A.
Published 2004
Click for online access
eBook
Save to List
Saved in:
Select result number 20
20
Outsourcing information security C. Warren Axelrod.
by
Axelrod, C. Warren
Published 2004
Click for online access
eBook
Save to List
Saved in:
Select all entries on the page
Email
Export
Print
Save
1
2
3
4
5
6
7
8
9
10
11
Next
[13]
Search Tools:
Get RSS Feed
Email this Search
Save Search
Back
Narrow Search
Page will reload when a filter is selected or excluded.
Year of Publication
From:
To:
Format
eBook
246 results
246
Location
Online
246 results
246
Language
English
246 results
246
Spanish
1 results
1
Library of Congress Call Number
Q - Science
143 results
143
T - Technology
88 results
88
H - Social Science
13 results
13
U - Military Science
2 results
2
Genre
Conference papers and proceedings
18 results
18
Congresses
16 results
16
Study guides
10 results
10
Handbooks and manuals
8 results
8
Electronic books
6 results
6
Guides et manuels
6 results
6
handbooks
6 results
6
Handbooks, manuals, etc
5 results
5
Guides de l'étudiant
4 results
4
examination study guides
4 results
4
Case studies
2 results
2
Actes de congrès
1 results
1
Aufsatzsammlung
1 results
1
Dictionaries
1 results
1
Examinations
1 results
1
Examinations, questions, etc
1 results
1
Popular works
1 results
1
Security measures
1 results
1
proceedings (reports)
1 results
1
see all…
Database
Ebook Central
244 results
244
MIT Ebooks
2 results
2
Springer Ebooks
1 results
1
Record Source
eResources
246 results
246