Cyber security policy guidebook / Jennifer L. Bayuk ... [et al.].
Contributor(s): Bayuk, Jennifer L.
Material type:![materialTypeLabel](/opac-tmpl/lib/famfamfam/BK.png)
Current location | Call number | Status | Date due | Barcode |
---|---|---|---|---|
Main Campus Book Shelves | QA 76.9 .A25 C923 (Browse shelf) | Available | 201312170007 |
Browsing Main Campus Shelves , Shelving location: Book Shelves Close shelf browser
QA76.9 .A25 C447H 2002 Hack attacks revealed : a complete reference for UNIX, Windows, and Linux with custom security toolkit / | QA76.9 .A25 C447H 2002 Hack attacks denied : a complete guide to network lockdown for UNIX, Windows, and Linux / | QA76.9 .A25 C667 Contemporary cryptoloty : the science of information integrity | QA 76.9 .A25 C923 Cyber security policy guidebook / | QA76.9.A25 D384P Protecting games : a security handbook for game developers and publishers / | QA76.9 .A25 D444P Principles of information systems security : | QA76.9 .A25 D534 Digital signatures / |
Includes bibliographical references and index
There are no comments for this item.