Torthaí cuardaigh - "Computer networks Security measures"
-
91
-
92
Computer and information security handbook
Foilsithe / Cruthaithe 2009Also available online for University of the Philippines Diliman via ScienceDirect. Click here to access
LEABHAR -
93
Trusted platform modules why, when and how to use them
Foilsithe / Cruthaithe 2016Available for University of the Philippines Diliman College of Engineering via IET Digital Library. Click here to access
Also available remotely for University of the Philippines Diliman College of Engineering via IET Digital Library. Click here to access thru EZproxy
Electronic Resource -
94
-
95
-
96
24 deadly sins of software security programming flaws and how to fix them
Foilsithe / Cruthaithe 2009Available for University of the Philippines Diliman College of Engineering via e-Textbook Reserves under Vital Source. Click here to access
Also available remotely for University of the Philippines Diliman College of Engineering. Click here to access thru Remote Access via EZProxy
Electronic Resource -
97
-
98
-
99
24 deadly sins of software security programming flaws and how to fix them
Foilsithe / Cruthaithe 2010Available for University of the Philippines Diliman via McGraw-Hill Access Engineering. Click here to access
Also available remotely for University of the Philippines Diliman via McGraw-Hill Access Engineering. Click here to access thru EZproxy
Electronic Resource -
100


