Searching Books & More : "Computer security"

Operating systems (Computers) X
50 results found in Books & More
RSS
Cover images provided by Open Library

Security configuration checklists program for IT products guidance for checklists users and developers

Published: Gaithersburg, MD : U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, [2005]
Format: Electronic Resource, Remote
Retrieving Holdings Information
Cover images provided by Open Library

BIOS protection guidelines for servers (draft) recommendations of the National Institute of Standards and Technology

Published: Gaithersburg, MD : U.S. Dept. of Commerce, National Institute of Standards and Technology, [2012]
Format: Electronic Resource, Remote
Retrieving Holdings Information
Cover images provided by Open Library

A guide to kernel exploitation attacking the core

Published: Burlington, MA : Syngress, c2010
Format: Electronic Resource, Remote
Retrieving Holdings Information
Cover images provided by Open Library

Minimum security requirements for multi-user operating systems

Published: Gaithersburg, MD : U.S. Dept. of Commerce, National Institute of Standards and Technology ; Springfield, VA : For sale by National Technical Information Service, 1993
Format: Print
Retrieving Holdings Information
Cover images provided by Open Library

A Guide to understanding security modeling in trusted systems

Published: [Fort George G. Meade, MD] : National Computer Security Center, [1993]
Format: Print
Retrieving Holdings Information
Cover images provided by Open Library

Linux security

Published: San Francisco, Calif. : SYBEX, c2001
Format: Print
Retrieving Holdings Information
Cover images provided by Open Library

Linux system security : an administrator's guide to open source security tools

Published: Upper Saddle River, NJ : Prentice Hall, c2000
Format: Print
Retrieving Holdings Information
Cover images provided by Open Library

Linux system security an administrator's guide to open source security tools

Published: Upper Saddle River, NJ : Prentice Hall, c2000
Format: Electronic Resource, Remote
Retrieving Holdings Information
Cover images provided by Open Library

Real world Linux security intrusion protection, detection, and recovery

Published: Upper Saddle River, NJ : Prentice Hall, c2003
Format: Electronic Resource, Remote
Retrieving Holdings Information
Cover images provided by Open Library

Securing Linux platforms and applications

Published: Sudbury, Mass. : Jones & Bartlett Learning c2011
Format: Electronic Resource, Remote
Retrieving Holdings Information
Cover images provided by Open Library

Security guide for IBM i V6.1

Published: [United States?] : IBM, International Technical Support Organization, c2009
Format: Electronic Resource, Remote
Retrieving Holdings Information
Cover images provided by Open Library

Mac OS X security and mobility v10.6

Published: Berkeley, CA : Peachpit Press, c2010
Format: Electronic Resource, Remote
Retrieving Holdings Information
Cover images provided by Open Library

ABCs of z/OS system programming Volume 7

Published: [United States?] : IBM, International Technical Support Organization, [2008], c2006
Format: Electronic Resource, Remote
Retrieving Holdings Information
Cover images provided by Open Library

Foundations of MAC OS X Leopard security

Published: Berkley, Calif. : Apress ; New York : Distributed by Springer-Verlag, c2008
Format: Electronic Resource, Remote
Retrieving Holdings Information