|
181.
|
NET security and cryptography
by Thorsteinson, Peter | Ganesh, G. Gnana Arun. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Delhi Pearson Education 2004Availability: Items available for loan: [Call number: 005.8 THO] (1).
|
|
182.
|
Computer security fundamentals
by Easttom, Chuck. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Upper Saddle River: Prentice Hall of India, 2005Availability: Items available for loan: [Call number: 005.8 EAS] (1).
|
|
183.
|
Security in distributed computing : did you lock the door?
by Dempsey, Rob. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Jersey: Pearson Education, 1997Availability: Items available for loan: [Call number: 005.8 BRU] (1).
|
|
184.
|
Linux Patch Management : keeping Linux systems up to date
by Jang, Michael H. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Upper Saddle River: Prentice Hall, 2006Availability: Items available for loan: [Call number: 005.432 JAN] (1).
|
|
185.
|
Practical guide to trusted computing
by Challener, David. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Upper Saddle River: IBM Press, 2008Availability: Items available for loan: [Call number: 005.8 CHA] (1).
|
|
186.
|
Analyzing computer security : a threat/vulnerability/countermeasure approach
by Pfleeger, Charles P | Pfleeger, Shari Lawrence. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Upper Saddle River: Prentice Hall, 2012Availability: Items available for loan: [Call number: 005.8 PFL] (1).
|
|
187.
|
Computer security : principles and practice
by Stallings, Willam. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Jersey: Prentice Hall, 2007Availability: Items available for loan: [Call number: 005.8 STA] (1).
|
|
188.
|
Cryptography and network security : principles and practice
by Stallings, William. Edition: 5th ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Upper Saddle River: Prentice Hall, 2011Availability: Items available for loan: [Call number: 005.82 STA] (1).
|
|
189.
|
Network security essentials : applications and standards
by Stallings, William. Edition: 4th ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Prentice Hall, 2010Availability: Items available for loan: [Call number: 005.8 STA] (1).
|
|
190.
|
VMware vSphere and virtual infrastructure security : securing the virtual environment
by Haletky, Edward L. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Upper Saddle River: Prentice Hall, 2009Availability: Items available for loan: [Call number: 005.8 HAL] (1).
|
|
191.
|
Art of deception : controlling the human element of security
by Simon, William L. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Indianapolis: Wiley Publishing, 2002Availability: Items available for loan: [Call number: 005.8 MIT] (1).
|
|
192.
|
Cybersecurity and cyberwar : what everyone needs to know
by Singer, P. W | Friedman, Allan. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Oxford University Press, 2014Availability: Items available for loan: [Call number: 005.8 SIN] (1).
|
|
193.
|
CORBA Security
by Blakley, Bob. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Harlow: Addison-Wesley, 1999Availability: Items available for loan: [Call number: 005.8 BLA] (1).
|
|
194.
|
Programming Windows Security
by Brown, Keith. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Addison-Wesley, 2000Availability: Items available for loan: [Call number: 005.8 BRO] (1).
|
|
195.
|
Cryptography Decrypted
by Mel, H. X. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Addison-Wesley, 2001Availability: Items available for loan: [Call number: 005.82 MEL] (1).
|
|
196.
|
Web Security
by Stein, Lincoln D. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Addison-Wesley, 1997Availability: Items available for loan: [Call number: 005.8 STE] (1).
|
|
197.
|
Computer forensics: Incident response essentials
by Kruse, Warren G | Heiser, Jay G. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Addison-Wesley, 2002Availability: Items available for loan: [Call number: 005.8 KRU] (1).
|
|
198.
|
Effective incident response team
by Lucas, Julie | Moeller, Brain. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Addison-Wesley, 2004Availability: Items available for loan: [Call number: 005.8 LUC] (1).
|
|
199.
|
Exploiting software : how to break code
by Gary, McGraw | McGraw, Gary. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Pearson Higher Education, 2004Availability: Items available for loan: [Call number: 005.8 HOG] (1).
|
|
200.
|
Rethinking public key infrastructures and digital certificates: Building in privacy
by Brands, Stefan A. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Cambridge: The MIT Press, 2000Availability: Items available for loan: [Call number: 005.8 BRA] (2).
|