-
191
-
192
Handbook of database security applications and trends
Foilsithe / Cruthaithe 2008Available for University of the Philippines System via SpringerLink. Click here to access
Also available remotely for University of the Philippines System via SpringerLink. Click here to access thru EZproxy
Electronic Resource -
193
-
194
Building an effective information security policy architecture
Foilsithe / Cruthaithe 2008Table of contents only
LEABHAR -
195
Multimedia communication security recent advances
Foilsithe / Cruthaithe 2008Table of contents only
LEABHAR -
196
-
197
-
198
-
199
Security of e-systems and computer networks
Foilsithe / Cruthaithe 2007Table of contents only
LEABHAR -
200


