Search Results
Showing 1 - 10 of 503 results
Search Results
Privileged access management
| Location | Call # | Status |
|---|---|---|
| Joyner - General Stacks | QA76.9.A25 R37 2025 | ✔ Available |
The SRI hierarchical development methodology (HDM) and its application to the development of secure software
| Location | Call # | Status |
|---|---|---|
| Joyner - Fed Docs Stacks | C 13.10:500-67 | ✔ Available |
Information assurance and security technologies for risk assessment and threat management
| Location | Call # | Status |
|---|---|---|
| Joyner - General Stacks | HD49 .I54 2012 | ✔ Available |
Secure data deletion
| Location | Call # | Status |
|---|---|---|
| Joyner - General Stacks | QA76.9 .D3 R4223 2016 | ✔ Available |