|
141.
|
Web security for network and system administrators
by Mackey, David. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Course Technology, 2003Availability: Items available for loan: [Call number: 005.8 MAC] (4).
|
|
142.
|
Lab manual for Security+ guide to network security fundamentals
by Cretaro, Paul. Edition: 2nd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Thomson Course Technology, 2005Availability: Items available for loan: [Call number: 005.8 CRE] (2).
|
|
143.
|
Understanding PKI: Concepts, standards and deployment considerations
by Adams, Carlisle | Lloyd, Steve. Edition: 2nd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Addison-Wesley, 2003Availability: Items available for loan: [Call number: 005.8 ADA] (1).
|
|
144.
|
Microsoft windows security resource kit
by Smith, Ben | Komar, Brian | Smith, Ben. Edition: 2nd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Redmond: Microsoft Press, 2005Availability: Items available for loan: [Call number: 005.8 SMI] (2).
|
|
145.
|
Information security : contemporary cases
by Wright, Marie A. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Massachusetts: Jones & Bartlett, 2007Availability: Items available for loan: [Call number: 005.8 WRI] (1).
|
|
146.
|
Computer security : protecting digital resources
by Newman, Robert C. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Sudbury: Jones & Bartlett, 2010Availability: Items available for loan: [Call number: 005.8 NEW] (1).
|
|
147.
|
Introduction to security and network forensics
by Buchanan, William J. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton: Auerbach Publications, 2011Availability: Items available for loan: [Call number: 005.8 BUC] (1).
|
|
148.
|
Security in wireless mesh networks
by Zhang, Yan. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton: CRC Press, 2009Availability: Items available for loan: [Call number: 005.8 ZHA] (1).
|
|
149.
|
Trusted computing
by Mitchell, Chris. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: London: Institution of Electrical Engineers, 2005Availability: Items available for loan: [Call number: 005.8 MIT] (1).
|
|
150.
|
Web application security : a beginner's guide
by Sullivan, Bryan | Liu, Vincent. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Tata McGraw-Hill, 2012Availability: Items available for loan: [Call number: 006.78 SUL] (1).
|
|
151.
|
Cyberspace security and defence : research issues
by Kowalik, Janusz S | Gorski, Janusz | Sachenko, Anatoly. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Dordrecht: Springer, 2005Availability: Items available for loan: [Call number: 005.8 KOW] (1).
|
|
152.
|
Ethical hacking guide to corporate security
by Fadia, Ankit. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Delhi: MacMillan India, 2004Availability: Items available for loan: [Call number: 005.8 FAD] (1).
|
|
153.
|
802.1X port-based authentification
by Brown, Edwin Lyle. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton: Auerbach Publications, 2007Availability: Items available for loan: [Call number: 005.8 BRO] (1).
|
|
154.
|
Mechanics of user identification and authentication : fundamentals of identity management
by Todorov, Dobromir. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton: Auerbach Publications, 2007Availability: Items available for loan: [Call number: 005.8 TOD] (1).
|
|
155.
|
Handbook of financial cryptography and security
by Rosenberg, Burton. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton: CRC Press, 2011Availability: Items available for loan: [Call number: 332.178 ROS] (1).
|
|
156.
|
Multidiciplinary introduction to information security
by Mjolsnes, Stig F. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton: CRC Press, 2012Availability: Items available for loan: [Call number: 005.8 MJO] (1).
|
|
157.
|
Architecting secure software systems
by Talukder, Asoke K | Chaitanya, Manish. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton: CRC Press, 2009Availability: Items available for loan: [Call number: 005.8 TAL] (1).
|
|
158.
|
Security in an IPv6 environment
by Minoli, Daniel | Kouns, Jake. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton: Auerbach Publications, 2009Availability: Items available for loan: [Call number: 005.8 MIN] (1).
|
|
159.
|
Security and policy priven computing
by Liu, Lei. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton: CRC Press, 2011Availability: Items available for loan: [Call number: 005.8 LIU] (1).
|
|
160.
|
Insider threats in cyber security
by Probst, Christian W. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2010Availability: Items available for loan: [Call number: 005.8 PRO] (1).
|