Search Results

You searched for: subject "Computer programming+Security measures." Remove constraint

Search Results

Cover image for Security management for data processing

Security management for data processing

Location Call # Status
Joyner - General Stacks HJ9103 .M82 1973C ✔ Available
Cover image for Google hacking for penetration testers

Google hacking for penetration testers

Location
Access Content Online
Cover image for Computer data security

Computer data security

Location Call # Status
Joyner - General Stacks HF5548.2 .K335 ✔ Available
Cover image for Systems design for data protection

Systems design for data protection

Location Call # Status
Joyner - General Stacks QA76.9.A25 W66X 1984 ✔ Available
Cover image for Mac security bible

Mac security bible

Location
Access Content Online
Cover image for Security, accuracy, and privacy in computer systems

Security, accuracy, and privacy in computer systems

Location Call # Status
Joyner - General Stacks HF5548.2.M342 ✔ Available
Cover image for Detect, protect, dis-infect

Detect, protect, dis-infect

Location
Access Content Online