Torthaí cuardaigh - "Computer network security"
-
111
Trusted platform modules why, when and how to use them
Foilsithe / Cruthaithe 2016Available for University of the Philippines Diliman College of Engineering via IET Digital Library. Click here to access
Also available remotely for University of the Philippines Diliman College of Engineering via IET Digital Library. Click here to access thru EZproxy
Electronic Resource -
112
-
113
-
114
24 deadly sins of software security programming flaws and how to fix them
Foilsithe / Cruthaithe 2009Available for University of the Philippines Diliman College of Engineering via e-Textbook Reserves under Vital Source. Click here to access
Also available remotely for University of the Philippines Diliman College of Engineering. Click here to access thru Remote Access via EZProxy
Electronic Resource -
115
-
116
-
117
24 deadly sins of software security programming flaws and how to fix them
Foilsithe / Cruthaithe 2010Available for University of the Philippines Diliman via McGraw-Hill Access Engineering. Click here to access
Also available remotely for University of the Philippines Diliman via McGraw-Hill Access Engineering. Click here to access thru EZproxy
Electronic Resource -
118
-
119
E-policy how to develop computer-E-mail and internet guidelines to protect your company and its assets.
Foilsithe / Cruthaithe 1999LEABHAR -
120
Network performance and security testing and analyzing using open source and low-cost tools
Foilsithe / Cruthaithe 2016LEABHAR


