Return to home page
Searching: Bluffton library catalog
Some OPAL libraries remain closed or are operating at reduced service levels. Materials from those libraries may not be requestable; requested items may take longer to arrive. Note that pickup procedures may differ between libraries. Please contact your library for new procedures, specific requests, or other assistance.
     
Limit to items not checked out
Nearby SUBJECTS are:
   « Prev Next »
Save Marked Save All
    Year Entries
Computer scientists -- Political activity -- United States -- History. : Arguments that count : physics, computing, and missile defense, 1949-2012 / Rebecca Slayton.  2013 1
Computer scientists -- Salaries, etc. : 2015 data science salary survey : tools, trends, what pays (and what doesn't) for data professionals / John King & Roger Magoulas.  2015 1
Computer scientists -- Supply and demand -- United States. : Culturally responsive strategies for reforming STEM higher education : turning the TIDES on inequity / edited by Kelly M. Mack, Association of American Colleges and Universities, USA, Kate Winter, Independent Consultant and Evaluator, USA, Melissa Soto, University of California, USA.  2019 1
Computer scientists -- United States -- Biography.   2
Computer security.   1267
Computer security -- Access control. : The design of Rijndael : the Advanced Encryption Standard (AES) / Joan Daemen, Vincent Rijmen.  2020 1
Computer security -- Asia. : Access contested : security, identity, and resistance in Asian cyberspace information revolution and global politics / edited by Ronald Deibert [and 3 others].  2012 1
Computer security -- Auditing.   3
Computer security -- Auditing -- Vocational guidance. : Information security auditor / Wendy Goucher.  2016 1
Computer security -- Bibliography. : Open source bibliography [electronic resource].  1997 1
Computer security -- Case studies.   6
Computer security -- China.   3
Computer security -- China -- Congresses. : China internet development report 2018 : Blue Book of World Internet Conference / Chinese Academy of Cyberspace Studies.  2020 1
Computer security -- Computer programs.   6
Computer security -- Computer simulation. : Multilevel modeling of secure systems in QoP-ML / author, Bogdan Ksiezopolski.  2015 1
Computer security -- Congresses.   1104
Computer security -- Data processing. : Big data analytics with applications in insider threat detection / Bhavani Thuraisingham, Mohammad Mehedy Masud, Pallabi Parveen, Latifur Khan.  2018 1
Computer security -- Data processing -- Congresses. : Intelligence and security informatics : international workshop, WISI 2006, Singapore, April 9, 2006 : proceedings / Hsinchun Chen [and others] (eds.).  2006 1
Computer security -- Decision making. : Data analytics and decision support for cybersecurity : trends, methodologies and applications / Ivan Palomares Carrascosa, Harsha Kumara Kalutarage, Yan Huang, editors.  2017 1
Computer security -- Dictionaries.   4
Computer security -- Dictionaries -- Polyglot. : Elsevier's dictionary of information security in English, German, French and Russian / compiled by G. Manoilov and B. Radichkova.  2007 1
Computer security -- Economic aspects. : Managing information risk and the economics of security / edited by M. Eric Johnson.  2008 1
Computer security -- Economic aspects -- Congresses. : Economics of information security and privacy III / Bruce Schneier, editor.  2013 1
Computer security -- Economic aspects -- Risk management. : Financial cybersecurity risk management : leadership perspectives and guidance for systems and institutions / Paul Rohmeyer and Jennifer L. Bayuk ; foreword by Dr. Larry Ponemon.  2019 1
Computer security -- Encyclopedias. : Encyclopedia of cryptography and security / Henk C.A. van Tilborg, Sushil Jajodia (eds.).  2011 1
Computer security equipment industry. : The new school of information security / Adam Shostack and Andrew Stewart.  2008 1
Computer security equipment industry -- Directories. : Enterprise directory and security implementation guide : designing and implementing directories in your organization / Charles Carrington [and others].  2002 1
Computer security equipment industry -- Vocational guidance. : Breaking into information security : crafting a custom career path to get the job you really want / Josh More, Anthony J. Stieber, Chris Liu ; technical editor, Beth Friedman.  2016 1
Computer security -- Europe, Northern. : Digitalisation and human security : a multi-disciplinary approach to cybersecurity in the European High North / Mirva Salminen, Gerald Zojer, Kamrul Hossain, editors.  2020 1
Computer security -- European Union countries.   2
Computer security -- European Union countries -- Congresses. : Trustworthy eternal systems via evolving software, data and knowledge : second international workshop, EternalS 2012, Montpellier, France, August 28, 2012, revised selected papers / Alessandro Moschitti, Riccardo Scandariato (eds.).  2012 1
Computer security -- European Union countries -- Handbooks, manuals, etc.   2
Computer security -- Evaluation.   11
Computer security -- Evaluation -- Methodology.   3
Computer security -- Examinations.   4
Computer security -- Examinations -- Practice. : Professional penetration testing : creating and operating a formal hacking lab / by Thomas Wilhelm.  2010 1
Computer security -- Examinations, questions, etc.   4
Computer security -- Examinations -- Study guides.   165
Computer security -- Fiction.   8
Computer security -- France. : Cybersecurity in France / Philippe Baumard.  2017 1
Computer security -- Germany. : Cybersecurity in Germany / Martin Schallbruch, Isabel Skierka.  2018 1
Computer security -- Government policy.   7
Computer security -- Government policy -- United States.   7
Computer security -- Graphic methods -- Congresses.   5
Computer security -- Handbooks, manuals, etc.   24
Computer security -- Hungary -- Management. : Critical infrastructure protection research : results of the first critical infrastructure protection research project in Hungary / Laszlo Nadai, Jozsef Padanyi, editors.  2016 1
Computer security -- India.   2
Computer security -- India -- Case studies. : Managing information security on a shoestring budget / Varadharajan Sridhar and Bharat Bhasker.  2003 1
Computer security -- Information technology.   3
Computer security -- International cooperation -- Congresses.   4
Save Marked Save All
   « Prev Next »

If you experience difficulty accessing or navigating this content, please contact the OPAL Support Team