1,568 results Skip to content
VuFind
Advanced
  • 0 items (Full)
  • Your Account
  • Log Out
  • Login
  • Language
    • English
    • Deutsch
    • Español
    • Français
    • Italiano
    • 日本語
    • Nederlands
    • Português
    • Português (Brasil)
    • 中文(简体)
    • 中文(繁體)
    • Türkçe
    • עברית
    • Gaeilge
    • Cymraeg
    • Ελληνικά
    • Català
    • Euskara
    • Русский
    • čeština
    • Suomi
    • Svenska
    • polski
    • Dansk
    • slovenščina
    • اللغة العربية
    • বাংলা
Advanced
  • Search:
Showing 1 - 20 of 1,568 for search: '', query time: 0.10s
Good security practices for electronic commerce, including electronic data interchange
Published: U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 1993
Description: vii, 58 pages : illustrations ; 28 cm.
Located: Loading...
Call Number: Loading...
Microfilm Loading...
 Place Hold
Save to List
Saved in:
Cover Image
Information resources security handbook
by United States. Department of Veterans Affairs. Office of Information Resources Management.
Published: Dept. of Veterans Affairs, Office of Information Resources Management, 1991
Description: 1 volume (various pagings) ; 28 cm.
Located: Loading...
Call Number: Loading...
Book Loading...
 Place Hold
Save to List
Saved in:
Cover Image
Computer security : hearing before the Subcommittee on Technology and Competitiveness of the Committee on Science, Space, and Technology, U.S. House of Representatives, One Hundred...
by United States. Congress. House. Committee on Science, Space, and Technology. Subcommittee on Technology and Competitiveness.
Published: U.S. G.P.O. : For sale by the U.S. G.P.O., Supt. of Docs., Congressional Sales Office, 1991
Description: iii, 157 pages ; 24 cm.
Located: Loading...
Call Number: Loading...
Book Loading...
 Place Hold
Save to List
Saved in:
Cover Image
Information security : dictionary of concepts, standards and terms
by Longley, Dennis.
Published: Stockton Press, 1992
Description: x, 620 pages : illustrations ; 24 cm.
Located: Loading...
Call Number: Loading...
Book Loading...
 Place Hold
Save to List
Saved in:
Cover Image
A statistical test suite for random and pseudorandom number generators for cryptographic applications
Published: U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology ; For sale by the Supt. of Docs., U.S. G.P.O., 2000
Description: x, 152 pages : illustrations ; 28 cm.
Located: Loading...
Call Number: Loading...
Microfilm Loading...
 Place Hold
Save to List
Saved in:
Cover Image
Hacker cracker : a journey from the mean streets of Brooklyn to the frontiers of cyberspace
1st ed.
by Nuwere, Ejovi.
Published: W. Morrow, 2002
Description: x, 258 pages ; 24 cm.
Located: Loading...
Call Number: Loading...
Book Loading...
 Place Hold
Save to List
Saved in:
Cover Image
Guidelines to federal organizations on security assurance and acquisition/use of tested/evaluated products recommendations of the National Institute of Standards and Technology
by Roback, Edward.
Published: U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 2000
Description: 1 volume (various pagings) ; 28 cm.
Located: Loading...
Call Number: Loading...
Microfilm Loading...
Save to List
Saved in:
Cover Image
Information hiding techniques for steganography and digital watermarking
Published: Artech House, 2000
Description: xviii, 220 pages : illustrations ; 24 cm.
Located: Loading...
Call Number: Loading...
Book Loading...
 Place Hold
Save to List
Saved in:
Cover Image
Mobile agent security
by Jansen, Wayne A.
Published: U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 1999
Description: v, 39 pages : illustrations ; 28 cm.
Located: Loading...
Call Number: Loading...
Get full text
Microfilm
 Place Hold
Save to List
Saved in:
Cover Image
Secrets and lies : digital security in a networked world
by Schneier, Bruce, 1963-
Published: Wiley, 2000
Description: xv, 412 pages : illustrations ; 24 cm.
Located: Loading...
Call Number: Loading...
Table of Contents
Publisher description
Book
 Place Hold
Save to List
Saved in:
Cover Image
Enhancing computer security : what tools work best : hearing before the Subcommittee on Government Management, Information, and Technology of the Committee on Government Reform, Ho...
by United States. Congress. House. Committee on Government Reform. Subcommittee on Government Management, Information, and Technology.
Published: U.S. G.P.O. : For sale by the U.S. G.P.O., Supt. of Docs., [Congressional Sales Office], 2001
Description: iii, 84 pages : illustrations ; 24 cm.
Located: Loading...
Call Number: Loading...
Book Loading...
Save to List
Saved in:
Cover Image
PC disaster and recovery
by Chase, Kate.
Published: Sybex, 2003
Description: xviii, 491 pages : illustrations ; 23 cm.
Located: Loading...
Call Number: Loading...
Book Loading...
 Place Hold
Save to List
Saved in:
Cover Image
Network security bible
by Cole, Eric.
Published: Wiley Pub., 2005
Description: xxxiv, 660 pages : illustrations ; 24 cm.
Located: Loading...
Call Number: Loading...
Book Loading...
Save to List
Saved in:
Cover Image
PC magazine fighting spyware, viruses, and malware
by Tittel, Ed.
Published: Wiley Pub., 2005
Description: xv, 367 pages : illustrations ; 24 cm.
Located: Loading...
Call Number: Loading...
Book Loading...
Save to List
Saved in:
Cover Image
Cryptography, information theory, and error-correction : a handbook for the 21st century
by Bruen, Aiden A., 1941-
Published: Wiley-Interscience, 2005
Description: xxiii, 468 pages : illustrations ; 26 cm.
Located: Loading...
Call Number: Loading...
Book Loading...
Save to List
Saved in:
Cover Image
Computer forensics : incident response essentials
by Kruse, Warren G.
Published: Addison-Wesley : Lucent Technologies, 2002
Description: xiii, 398 : illustrations ; 24 cm.
Located: Loading...
Call Number: Loading...
Book Loading...
 Place Hold
Save to List
Saved in:
Cover Image
Information security : policy, processes, and practices
Published: M.E. Sharpe, 2008
Description: ix, 286 pages : illustrations ; 26 cm.
Located: Loading...
Call Number: Loading...
Book Loading...
 Place Hold
Save to List
Saved in:
Cover Image
Biometrics, computer security systems and artificial intelligence applications
Published: Springer, 2006
Description: 1 online resource (xi, 342 pages) : illustrations.
Located: Loading...
Call Number: Loading...
eBook Loading...
Save to List
Saved in:
Cover Image
Computational intelligence in information assurance and security
Published: Springer, 2007
Description: 1 online resource (xx, 254 pages) : illustrations.
Located: Loading...
Call Number: Loading...
eBook Loading...
Save to List
Saved in:
Cover Image
Computer security in the 21st century
Published: Springer, 2005
Description: 1 online resource (xi, 268 pages) : illustrations.
Located: Loading...
Call Number: Loading...
eBook Loading...
Save to List
Saved in:
Cover Image
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • Next »
  • [79]

In Prospector

Request items from other Prospector libraries to be delivered to your local library for pickup.
Search Tools: Get RSS Feed — Email this Search — Save Search

Narrow Search

Remove Filters
Call Number: Q - Science Subject: Computer security
Institution
1,568 Colorado Mesa University see all ...
Collection
1,516 Electronic Access 29 Main Books 3rd Floor 17 Gov Pub Microfiche 4 Storage Gov Pub 1 Gov Pub Electronic 1 Juv Coll 2nd Floor more ... 1 Spec Coll 3rd Floor see all ... less ...
Format
1,479 eBook 43 Book 38 Electronic 8 Microfilm see all ...
Subject
Computer security 477 Data encryption (Computer science) 427 Computer networks Security measures 256 Data protection 115 Cryptography 112 Computer science more ... 86 Artificial intelligence 84 Computers Access control 83 Internet Security measures 57 Computer networks Access control 53 Computer networks 44 Software engineering 37 Application software 33 Data mining 27 Management information systems 26 Computational intelligence 22 Cloud computing Security measures 22 Computers and civilization 22 Database management 21 Big data 20 Computer crimes 19 Algorithms 18 Cloud computing 18 Computers 18 Database security 18 Information technology 18 Machine learning 17 Information technology Security measures 17 User-centered system design 16 Internet of things see all ... less ...
Author
1,351 SpringerLink (Online service) 109 ScienceDirect (Online service) 39 European Symposium on Research in Computer Security 24 CRYPTO (Conference) 24 SAFECOMP (Conference) 21 EUROCRYPT (Conference) more ... 20 International Conference on the Theory and Application of Cryptology and Information Security 19 Yung, Moti 18 FC (Conference) 18 ISC (Conference : Information security) 17 ACISP (Conference) 17 ICISC (Conference) 17 ICISS (Conference) 16 Garcia-Alfaro, Joaquin, 16 International Workshop on Security 16 International Workshop on Security Protocols 16 Yung, Moti, 15 CRYPTO (Conference) Santa Barbara, Calif.) 15 ICICS (Conference) 15 Inscrypt (Conference) 15 ProvSec (Conference) 14 WISA (Workshop : Information security) 13 Bertino, Elisa, 13 EBSCOhost 13 FDSE (Conference) 13 ICISC (Conference) Seoul, Korea) 13 National Institute of Standards and Technology (U.S.) 13 SSS (Symposium) 12 DPM (Workshop) 12 Dang, Tran Khanh, see all ... less ...
Language
1,568 English 4 German 1 Chinese 1 Russian see all ...
Genre
1,079 Conference papers and proceedings 42 Electronic books 34 Computer software 16 Dictionaries 13 Handbooks and manuals 9 Festschriften more ... 8 Technical reports 3 Statistics 2 Congresses 1 Autobiographies 1 Bibliographies 1 Biographies 1 CMU author 1 Case studies 1 Encyclopedias 1 Literature see all ... less ...
Literary Form
1,568 Non fiction see all ...
Era
1 1955- 1 active 6th century B.C. see all ...
Region
18 United States 2 Europe 1 China 1 European Union countries 1 France 1 Germany more ... 1 India 1 Israel 1 Japan 1 Malaysia 1 Nigeria 1 Pacific Area see all ... less ...
Call Number
Q - Science see all ...
Year of Publication

Search Options

  • Search History
  • Advanced Search

Find More

  • Browse the Catalog
  • Course Reserves

Need Help?

  • Search Tips
  • Ask a Librarian
Loading...