Your search returned 1226 results.

Not what you expected? Check for suggestions
|
Develop and deploy a secure portal solution using WebSphere Portal V5 and Tivoli Access Manager V5.1 [electronic resource] / [John Ganci ... et al.].

by Ganci, John | International Business Machines Corporation. International Technical Support Organization | ebrary, Inc.

Edition: 1st ed.Publisher: Research Triangle Park, NC : IBM, International Technical Support Organization, 2004Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan: [Call number: 005.8] (1).
Secure production deployment of B2B solutions using WebSphere business integration connect [electronic resource] / Geert Van de Putte ... [et al.].

by Putte, Geert van de [aut] | ebrary, Inc.

Edition: 1st ed.Publisher: Research Triangle Park, N.C. : IBM Corp., International Technical Support Organization, c2005Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan: [Call number: 658.8/04/0285] (1).
Deployment guide series [electronic resource] : IBM Tivoli Security Compliance Manager / Axel Buecker, Hendrik H. Fulda, Dieter Riexinger.

by Bucker, Axel | Fulda, Hendrik H | Riexinger, Dieter | International Business Machines Corporation. International Technical Support Organization | ebrary, Inc.

Edition: 1st ed.Publisher: Austin, TX : IBM International Technical Support Organization, 2005Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan: [Call number: 005.8] (1).
Multilevel security and DB2 row-level security revealed [electronic resource] / [Chris Rayns ... et al.].

by Rayns, Chris | International Business Machines Corporation. International Technical Support Organization | ebrary, Inc.

Edition: 1st ed.Publisher: San Jose, CA : IBM, International Technical Support Organization, c2005Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan: [Call number: 005.8] (1).
Integrated identity management using IBM Tivoli security solutions [electronic resource] / [Axel Bücker ... et al.].

by Bucker, Axel | Bucker, Axel | International Business Machines Corporation. International Technical Support Organization | ebrary, Inc.

Edition: 1st ed.Publisher: Austin, TX : IBM, International Technical Support Organization, c2004Online access: An electronic book accessible through the World Wide Web; click to view Availability: No items available
A secure portal [electronic resource] : using WebSphere Portal V5 and Tivoli Access Manager V4.1 / Michele Galic ... [et al.].

by Galic, Michele | International Business Machines Corporation. International Technical Support Organization | ebrary, Inc.

Edition: 1st ed.Publisher: Research Triangle Park, NC : IBM, International Technical Support Organization, c2003Online access: An electronic book accessible through the World Wide Web; click to view Availability: No items available
Review of disability evaluation study design [electronic resource] : third interim report / Gooloo S. Wunderlich and William D. Kalsbeek, editors.

by Wunderlich, Gooloo S | Kalsbeek, William D, 1946- | ebrary, Inc.

Publisher: Washington, D.C. : National Academy Press, 1999Other title: Review of the disability evaluation study design.Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan: [Call number: 616.07/5/072073] (1).
The viability of human security [electronic resource] / Monica den Boer and Jaap de Wilde (eds.).

by Boer, Monica den | Wilde, Jaap de | ebrary, Inc.

Publisher: Amsterdam : Amsterdam University Press, c2008Online access: An electronic book accessible through the World Wide Web; click to view Availability: No items available
Practical VoIP Security [electronic resource] / Thomas Porter, et al.

by Porter, Thomas | ebrary, Inc.

Publisher: Rockland, MA : Syngress Publishing, c2006Online access: An electronic book accessible through the World Wide Web; click to view Availability: No items available
Secure computer and network systems [electronic resource] : modeling, analysis and design / Nong Ye.

by Ye, Nong | ebrary, Inc.

Publisher: Chichester, England ; Hoboken, NJ : J. Wiley, c2008Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan: [Call number: 005.8] (1).
Cybersecurity today and tomorrow [electronic resource] : pay now or pay later / Computer Science and Telecommunications Board, Division of Engineering and Physical Sciences, National Research Council.

by ebrary, Inc.

Publisher: Washington, D.C. : National Academy Press, c2002Other title: Cyber security today and tomorrow.Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan: [Call number: 005.8] (1).
Supply chain security [electronic resource] : international practices and innovations in moving goods safely and efficiently / edited by Andrew R. Thomas.

by Thomas, Andrew R | ebrary, Inc.

Publisher: Santa Barbara, Calif. : Praeger, c2010Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for reference: Taylor's Library-TU [Call number: 658.7] (1).
Construction site security / Michael J. Arata.

by Arata, Michael J.

Publisher: New York : McGraw-Hill, c2006Availability: Items available for loan: Taylor's Library-TU [Call number: 690.0684 ARA] (1).
19 deadly sins of software security : programming flaws and how to fix them / Michael Howard, David LeBlanc and John Viega

by Howard, Michael, 1965- | LeBlanc, David, 1960- | Viega, John.

Publisher: Emeryville, California : McGraw-Hill/Osborne, c2005Other title: Nineteen deadly sins of software security..Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 HOW] (1).
Security and human rights / edited by Benjamin J. Goold and Liora Lazarus.

by Goold, B. J. (Benjamin Jervis), 1970- | Lazarus, Liora.

Publisher: Oxford ; Portland, Or. : Hart Pub., 2007Availability: Items available for loan: Taylor's Library-TU [Call number: 341.48 SEC] (1).
Cryptography and network security / Behrouz A. Forouzan.

by Forouzan, Behrouz A.

Publisher: Boston : McGraw Hill, 2008Availability: Items available for loan: Taylor's Library-TU [Call number: 005.82 FOR] (1).
The changing rules on the use of force in international law / Tarcisio Gazzini

by Gazzini, Tarcisio.

Publisher: Huntingdon [i.e. Huntington], N.Y. : Manchester, UK : Juris ; Manchester University Press, c2005Availability: Items available for loan: Taylor's Library-TU [Call number: 341.6 GAZ] (2).
A crisis of global institutions? : multilateralism and international security / Edward Newman.

by Newman, Edward, 1970-.

Publisher: Abingdon, Oxon : Routledge, 2007Availability: Items available for loan: Taylor's Library-TU [Call number: 355.033 NEW] (1).
Algorithms, architectures and information systems security [electronic resource] / editors, Bhargab B. Bhattacharya ... [et al.].

by Bhattacharya, Bhargab B | ebrary, Inc | International Conference on Information Systems Security (2nd : 2006 : Calcutta, India) | International Conference on Computing: Theory and Applications (2007 : Calcutta, India).

Publisher: New Jersey : World Scientific, c2009Online access: An electronic book accessible through the World Wide Web; click to view Availability: No items available
Fuzzing for software security testing and quality assurance [electronic resource] / Ari Takanen, Jared DeMott, Charlie Miller.

by Takanen, Ari | Demott, Jared D | Miller, Charles, 1951- | ebrary, Inc.

Publisher: Boston : Artech House, c2008Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan: [Call number: 005.8] (1).