|
Title |
Authors/Editors |
Publisher |
Type |
Copies |
|
Electronic Communications System: Fundamentals Through Advanced, Fifth Edition
|
|
Pearson |
Books |
1 |
|
Electronics Technology Fundamentals: Conventional Flow Version (3rd Edition)
|
|
Pearson |
Books |
1 |
|
Virtualization for Security: Including Sandboxing, Disaster Recovery, High Availability, Forensic Analysis, and Honeypotting
|
|
Syngress |
Books |
1 |
|
Applied Cryptography and Network Security: 6th International Conference, ACNS 2008, New York, NY, USA, June 3-6, 2008, Proceedings (Lecture Notes in Computer Science)
|
|
Springer |
Books |
1 |
|
Intelligence and Security Informatics: IEEE ISI 2008 International Workshops: PAISI, PACCF and SOCO 2008, Taipei, Taiwan, June 17, 2008, Proceedings (Lecture Notes in Computer Science)
|
|
Springer |
Books |
1 |
|
Googling Security: How Much Does Google Know About You?
|
|
Addison-Wesley Professional |
Books |
1 |
|
Crimeware: Understanding New Attacks and Defenses
|
|
Addison-Wesley Professional |
Books |
1 |
|
Software Security Engineering: A Guide for Project Managers
|
|
Addison-Wesley Professional |
Books |
1 |
|
Applied Security Visualization
|
|
Addison-Wesley Professional |
Books |
1 |
|
Internet Alley: High Technology in Tysons Corner, 1945-2005 (Lemelson Center Studies in Invention and Innovation series)
|
|
The MIT Press |
Books |
1 |