Southville International School and Colleges
Your cart is empty.
  • Cart
  • Lists
    Public lists Eva Luna New books Lux_list list_1
    Your lists Log in to create your own lists
  • Log in to your account
  • Your cookies
  • Search history
Southville International School and Colleges
  • Advanced search
  • Recent comments
  • Most popular
  • Libraries

Log in to your account

Log in with GOOGLE


If you do not have an external account, but do have a local account, you can still log in:

  1. Home
  2. Advanced search
  3. Results of search for 'ccl=su:"Security"', page 6 of 21

Refine your search

  • Availability

    • Limit to records with available items
  • Authors

    • 3G E-learning
    • Bahadur, Gary
    • Baloch, Rafay
    • East, David
    • Gereben Schaefer, Ag...
    • Gomez-Somera, Stepha...
    • Hoop, Honey
    • Jackson, Brian A.;La...
    • Larrabee, F. Stephen
    • Libicki, Martin C.
    • Mattord, Herbert J.
    • Rogers, Russ
    • Shema, Mike
    • Stallings, William
    • Tomsho, Greg
    • Vacca, John R.
    • Whitman, Michael E.
    • Wilson, Robert S.
    • with Sharon L. Lecht...
    • Show more
    • Show less
  • Holding libraries

    • Archives
    • College Library
    • Elizalde Library
    • Luxembourg Library
    • Project Gutenberg
    • South Mansfield College
    • Southville International School Affiliated with Foreign Universities Library
    • Show more
    • Show less
  • Item types

    • Book Chapter
    • Books
    • Curriculum - Based eBooks
    • eBooks
    • PASS
    • Periodicals
    • Theses
    • Show more
    • Show less
  • Locations

    • Fiction Section
    • Filipiniana Section
    • General Circulation Section
    • Graduate Section
    • High School Section
    • Periodical Section
    • Portfolio Assessment of SISC Students Section
    • Reserve Section
    • Scholastic Reading Center Section
    • Southville Foreign University Section
    • Teachers Reference Section
    • Theses Section
    • Show more
    • Show less
  • Series

    • 24/7, science behind...
    • Asia-Pacific Social ...
    • Careers without coll...
    • Evil genius
    • Extreme careers
    • --For dummies
    • HackNotes
    • Jones & Bartlett Lea...
    • Journal of Computer ...
    • Journal of Experimen...
    • Knowledge series
    • Rich dad's advisor
    • Rich dad's advisors ...
    • Strategic and Defenc...
    • The Harvard business...
    • The Journal of Nursi...
    • Understanding blockc...
    • (Wiley corporate F &...
    • Your Guide to Boraca...
    • Your Guide to Davao ...
    • Show more
    • Show less
  • Places

    • United States
  • Topics

    • Computer networks
    • Computer networks --...
    • Computer security
    • cyber security
    • CYBER SECURITY
    • Data protection
    • Financial security
    • History
    • INFORMATION SECURITY
    • Information technolo...
    • Internet
    • Job security
    • National security
    • Penetration testing ...
    • Political Science
    • Security
    • Technology
    • Vocational guidance
    • Show more
    • Show less
  • Titles

    • Microsoft Windows (C...

Your search returned 408 results.

Not what you expected? Check for suggestions
Sort
  • First
  • Previous
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • Next
  • Last
Unhighlight Highlight
Select all Clear all
Select titles to:
Public lists
list_1
New list
Results
101.
Image from Google Jackets
Information Security: The Complete Reference: Mark Rhodes-Ousley
Material type: Text; Format: print ; Literary form: Not fiction
Publication details: 2013
Online resources:
  • Click here to access online
Availability: Items available for loan: College Library (1).
star rating
Average : 0.0 out of 5 stars
Place hold Save to lists Add to cart (remove)
102.
Image from Google Jackets
Information Security: The Complete Reference: Mark Rhodes-Ousley
Material type: Text; Format: print ; Literary form: Not fiction
Publication details: 2013
Online resources:
  • Click here to access online
Availability: Items available for loan: College Library (1).
star rating
Average : 0.0 out of 5 stars
Place hold Save to lists Add to cart (remove)
103.
Image from Google Jackets
Information Security Applications: 15th International Workshop, Wisa 2014, Jeju Island, Korea, August 25-27, 2014. Kyung-Hyune Rhee
Material type: Text; Format: print ; Literary form: Not fiction
Publication details: 2014
Online resources:
  • Click here to access online
Availability: Items available for loan: College Library (1).
star rating
Average : 0.0 out of 5 stars
Place hold Save to lists Add to cart (remove)
104.
Image from Google Jackets
PRAGMATIC Security Metrics: Applying Metametrics to Information Security: Gary Hinson and W. Krag Brotby
Material type: Text; Format: print ; Literary form: Not fiction
Publication details: 2013
Online resources:
  • Click here to access online
Availability: Items available for loan: College Library (1).
star rating
Average : 0.0 out of 5 stars
Place hold Save to lists Add to cart (remove)
105.
Image from Google Jackets
Cybersecurity Information Gathering using Kali Linux: Tim Scott
Material type: Text; Format: print ; Literary form: Not fiction
Publication details: 2016
Online resources:
  • Click here to access online
Availability: Items available for loan: College Library (1).
star rating
Average : 0.0 out of 5 stars
Place hold Save to lists Add to cart (remove)
106.
Image from Google Jackets
Locked Down: Information Security for Lawyers: Sharon D. Nelson
Material type: Text; Format: print ; Literary form: Not fiction
Publication details: 2013
Online resources:
  • Click here to access online
Availability: Items available for loan: College Library (1).
star rating
Average : 0.0 out of 5 stars
Place hold Save to lists Add to cart (remove)
107.
Image from Google Jackets
Cyber Threat: The Rise of Information Geopolitics in U.S. National Security: Chris Bronk
Material type: Text; Format: print ; Literary form: Not fiction
Publication details: 2016
Online resources:
  • Click here to access online
Availability: Items available for loan: College Library (1).
star rating
Average : 0.0 out of 5 stars
Place hold Save to lists Add to cart (remove)
108.
Image from Google Jackets
Counterterrorism and Cybersecurity: Total Information Awareness: Newton Lee
Material type: Text; Format: print ; Literary form: Not fiction
Publication details: 2013
Online resources:
  • Click here to access online
Availability: Items available for loan: College Library (1).
star rating
Average : 0.0 out of 5 stars
Place hold Save to lists Add to cart (remove)
109.
Image from Google Jackets
CISSP (ISC)2 Certified Information Systems Security Professional Official Study Guide: James M. Stewart and Mike Chapple
Material type: Text; Format: print ; Literary form: Not fiction
Publication details: 2015
Online resources:
  • Click here to access online
Availability: Items available for loan: College Library (1).
star rating
Average : 0.0 out of 5 stars
Place hold Save to lists Add to cart (remove)
110.
Image from Google Jackets
Modern Cryptography: Applied Mathematics for Encryption and Information Security: Chuck Easttom
Material type: Text; Format: print ; Literary form: Not fiction
Publication details: 2015
Online resources:
  • Click here to access online
Availability: Items available for loan: College Library (1).
star rating
Average : 0.0 out of 5 stars
Place hold Save to lists Add to cart (remove)
111.
Image from Google Jackets
Information Security Auditor: Careers in information security:
Material type: Text; Format: print ; Literary form: Not fiction
Publication details: 2016
Online resources:
  • Click here to access online
Availability: Items available for loan: College Library (1).
star rating
Average : 0.0 out of 5 stars
Place hold Save to lists Add to cart (remove)
112.
Image from Google Jackets
Don't Get Norteled: Authenticity works where information security technology has failed us: Wes Kussmaul
Material type: Text; Format: print ; Literary form: Not fiction
Publication details: 2015
Online resources:
  • Click here to access online
Availability: Items available for loan: College Library (1).
star rating
Average : 0.0 out of 5 stars
Place hold Save to lists Add to cart (remove)
113.
Image from Google Jackets
Building a PCI DSS Information Security Program: Yves B. Desharnais
Material type: Text; Format: print ; Literary form: Not fiction
Publication details: 2015
Online resources:
  • Click here to access online
Availability: Items available for loan: College Library (1).
star rating
Average : 0.0 out of 5 stars
Place hold Save to lists Add to cart (remove)
114.
Image from Google Jackets
Securing Systems: Applied Security Architecture and Threat Models: Brook S. E. Schoenfield
Material type: Text; Format: print ; Literary form: Not fiction
Publication details: 2015
Online resources:
  • Click here to access online
Availability: Items available for loan: College Library (1).
star rating
Average : 0.0 out of 5 stars
Place hold Save to lists Add to cart (remove)
115.
Image from Google Jackets
Cybersecurity: Managing Systems, Conducting Testing, and Investigating Intrusions: Thomas J. Mowbray
Material type: Text; Format: print ; Literary form: Not fiction
Publication details: 2013
Online resources:
  • Click here to access online
Availability: Items available for loan: College Library (1).
star rating
Average : 0.0 out of 5 stars
Place hold Save to lists Add to cart (remove)
116.
Image from Google Jackets
31 Days Before Your CCNA Security Exam: A Day-By-Day Review Guide for the IINS 210-260 Certification Exam Patrick Gargano
Material type: Text; Format: print ; Literary form: Not fiction
Publication details: 2016
Online resources:
  • Click here to access online
Availability: Items available for loan: College Library (1).
star rating
Average : 0.0 out of 5 stars
Place hold Save to lists Add to cart (remove)
117.
Image from Google Jackets
SSCP Systems Security Certified Practitioner All-in-One Exam Guide, 2nd Edition: Darril Gibson
Material type: Text; Format: print ; Literary form: Not fiction
Publication details: 2015
Online resources:
  • Click here to access online
Availability: Items available for loan: College Library (1).
star rating
Average : 0.0 out of 5 stars
Place hold Save to lists Add to cart (remove)
118.
Image from Google Jackets
Focus on IAM (Identity and Access Management): CSFs, metrics, checklists, best practices, and guidelines for defining IAM processes and implementing IAM solutions Kiran Kumar Pabbathi
Material type: Text; Format: print ; Literary form: Not fiction
Publication details: 2014
Online resources:
  • Click here to access online
Availability: Items available for loan: College Library (1).
star rating
Average : 0.0 out of 5 stars
Place hold Save to lists Add to cart (remove)
119.
Image from Google Jackets
Pattern and Security Requirements: Engineering-Based Establishment of Security Standards Kristian Beckers
Material type: Text; Format: print ; Literary form: Not fiction
Publication details: 2015
Online resources:
  • Click here to access online
Availability: Items available for loan: College Library (1).
star rating
Average : 0.0 out of 5 stars
Place hold Save to lists Add to cart (remove)
120.
Image from Google Jackets
Information Security and Cryptology - ICISC 2014: Jongsung Kim and Jooyoung Lee
Material type: Text; Format: print ; Literary form: Not fiction
Publication details: 2015
Online resources:
  • Click here to access online
Availability: Items available for loan: College Library (1).
star rating
Average : 0.0 out of 5 stars
Place hold Save to lists Add to cart (remove)
  • First
  • Previous
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • Next
  • Last
Not finding what you're looking for?
  • Make a purchase suggestion

SOUTHVILLE LIBRARY

Southville International School and Colleges Library

1281 Tropical Ave. Cor. Luxembourg St., BF Homes International, Las Pinas City

Tel. No. 8256374 / 252358 Loc. 117/146

Powered by Koha