Searching Books & More : "Computer security"

Databases X
2 results found in Books & More
RSS
Cover images provided by Open Library

Common criteria & methodology for information technology security evaluation

Published: [Washington, D.C.? : Dept. of Defense, 1999]
Format: Electronic Resource, Optical disc
Retrieving Holdings Information
Cover images provided by Open Library

National Vulnerability Database automating vulnerability management security measurement and compliance checking

Published: Gaithersburg, Md. : National Institute of Standards and Technology
Format: Electronic Resource, Remote
Retrieving Holdings Information