Skip to content
VuFind
Advanced
Advanced
  • Search: "Computers -- Access control --"
Suggested Topics... within your search.
Computers -- 7 Access control 5 Computer security 5
Security measures 5 Access control -- 3 Computer networks -- 2
more ...
Internet -- 2 Common Language Runtime (Computer science) 1 Computer -- 1
Computer network -- 1 Cryptography -- 1 Data encryption (Computer science) 1
Data protection 1 Electronic data processing departments -- 1 Firewalls (Computer security) 1
Intranets (Computer networks) -- 1 Operating systems (Computers) 1 Passwords 1
Rootkits (Computer software) 1 Security measures -- 1 Standards 1
Virtual computer systems -- 1 less ...
Showing 1 - 8 of 8 for search: '"Computers -- Access control --"', query time: 0.13s
Cover Image
User's guide to cryptography and standards
by Dent, Alexander W
Published 2005
Subjects: '; “...Computers -- Access control -- Standards...”
Call Number: Loading...
Located: Loading...
Loading...
Preview
Preview
Preview
Show QR Code

Cover Image
Essential computer security : everyone's guide to e-mail, Internet, and wireless security
by Bradley, Tony
Published 2006
Subjects: '; “...Computers -- Access control -- Passwords...”
Call Number: Loading...
Located: Loading...
Loading...
Preview
Preview
Preview
Show QR Code

Cover Image
Linux firewalls
by Ziegler, Robert L
Published 2002
Subjects: '; “...Computers -- Access control...”
Call Number: Loading...
Located: Loading...
Loading...
Preview
Preview
Preview
Show QR Code

Cover Image
Internet and Intranet security management : risks and solutions
by Janczewski, Lech
Published 2000
Subjects: '; “...Computers -- Access control...”
Call Number: Loading...
Located: Loading...
Loading...
Preview
Preview
Preview
Show QR Code

Cover Image
Outsouring information security
by Axelrod, C. Warren
Published 2004
Subjects: '; “...Computers -- Access control -- United States...”
Call Number: Loading...
Located: Loading...
Loading...
Preview
Preview
Preview
Show QR Code

Cover Image
Network security : private communication in a public world
Subjects: '; “...Computers -- Access control...”
Call Number: Loading...
Located: Loading...
Get full text
Preview
Preview
Preview
Show QR Code

Cover Image
Managed code rootkits : hooking into runtime environments
by Metula, Erez
Published 2011
Subjects: '; “...Computers -- Access control...”
Call Number: Loading...
Located: Loading...
Loading...
Preview
Preview
Preview
Show QR Code

Cover Image
Elements of computer security
by Salomon, David
Published 2010
Subjects: '; “...Computer -- Access control...”
Call Number: Loading...
Located: Loading...
Loading...
Preview
Preview
Preview
Show QR Code

Search Tools: Get RSS Feed

Narrow Search

Library
7 Bestari Jaya 1 Shah Alam
Collection
8 Book
Item Category
6 OPEN SHELF 1 EBOOK 1 REFERENCE
Faculty
8 Communication, Visual Art & Computing, Faculty
Program
2 Computer Science (Network Security and Digital Forensic), Degree
Call Number
7 Q - Science 1 T - Technology
Author
1 Axelrod, C. Warren 1 Bradley, Tony 1 Dent, Alexander W 1 Janczewski, Lech 1 Metula, Erez 1 Salomon, David more ... 1 Ziegler, Robert L less ...
Year of Publication

Search Options

  • Advanced Search

Need Help?

  • Search Tips

Loading...