|
81.
|
Computer and information security handbook
by Vacca, John R. Edition: 2nd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Amsterdam: Morgan Kaufmann, 2013Availability: Items available for loan: [Call number: 005.8 VAC ] (1).
|
|
82.
|
Secure electronic commerce : building the infrastructure for digital signatures and encryption
by Baum, Michael S. Edition: 2nd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Jersey: Prentice Hall, 2000Availability: Items available for loan: [Call number: 658.84 FOR] (1).
|
|
83.
|
Counter hack reloaded : a step-by-step guide to computer attacks and effective defenses
by Skoudis, Ed | Liston, Tom. Edition: 2nd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Upper Saddle River: Prentice Hall, 2006Availability: Items available for loan: [Call number: 005.8 SKO] (1).
|
|
84.
|
Computer security fundamentals
by Easttom, Chuck. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Upper Saddle River: Prentice Hall of India, 2005Availability: Items available for loan: [Call number: 005.8 EAS] (1).
|
|
85.
|
SELinux by example : understanding security enhanced Linux
by Mayer, Frank | Caplan, David | MacMillan, Karl. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Upper Saddle River: Prentice Hall, 2007Availability: Items available for loan: [Call number: 005.8 MAY] (1).
|
|
86.
|
Exploiting online games : cheating massively distributed systems
by Hoglund, Greg | McGraw, Gary. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Upper Saddle River: Addison-Wesley, 2008Availability: Items available for loan: [Call number: 005.8 HOG] (1).
|
|
87.
|
Cryptography and network security : principles and practice
by Stallings, William. Edition: 5th ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Upper Saddle River: Prentice Hall, 2011Availability: Items available for loan: [Call number: 005.82 STA] (1).
|
|
88.
|
Network security essentials : applications and standards
by Stallings, William. Edition: 4th ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Prentice Hall, 2010Availability: Items available for loan: [Call number: 005.8 STA] (1).
|
|
89.
|
Cybersecurity and cyberwar : what everyone needs to know
by Singer, P. W | Friedman, Allan. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Oxford University Press, 2014Availability: Items available for loan: [Call number: 005.8 SIN] (1).
|
|
90.
|
SSL and TLS : designing and building secure systems
by Rescorla, Eric. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Addison-Wesley, 2000Availability: Items available for loan: [Call number: 005.8 RES] (1).
|
|
91.
|
Essential Check Point FireWall-1 : an installation, configuration, and troubleshooting guide
by Welch-Abernathy, Dameon | Welch-Abernathy, Dameon D. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston Addison-Wesley 2002Availability: Items available for loan: [Call number: 005.8 WEL] (1).
|
|
92.
|
Computer forensics: Incident response essentials
by Kruse, Warren G | Heiser, Jay G. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Addison-Wesley, 2002Availability: Items available for loan: [Call number: 005.8 KRU] (1).
|
|
93.
|
Rethinking public key infrastructures and digital certificates: Building in privacy
by Brands, Stefan A. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Cambridge: The MIT Press, 2000Availability: Items available for loan: [Call number: 005.8 BRA] (2).
|
|
94.
|
Protocol : how control exists after decentralization
by Galloway, Alexander R. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Cambridge: MIT Press, 2004Availability: Items available for loan: [Call number: 005.8 GAL] (1).
|
|
95.
|
Trust and risk in Internet commerce
by Camp, L. Jean. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Cambridge: The MIT Press, 2001Availability: Items available for loan: [Call number: 005.8 CAM] (1).
|
|
96.
|
Executive guide to information security : threats, challenges, and solutions
by Egan, Mark | Mather, Tim. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Indianapolis: Addison-Wesley, 2005Availability: Items available for loan: [Call number: 005.8 EGA] (1).
|
|
97.
|
Art of software security testing : identifying software security flaws
by Wysopal, Chris. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Upper Saddle River: Addison-Wesley, 2007Availability: Items available for loan: [Call number: 005.8 WYS] (1).
|
|
98.
|
How to break Web software : functional and security testing of Web applications and Web services
by Andrews, Mike | Whittaker, James A. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Upper Saddle River: Addison-Wesley, 2006Availability: Items available for loan: [Call number: 005.14 AND] (2).
|
|
99.
|
Craft of system security
by Smith, Sean | Marchesini, John. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Jersey: Addison-Wesley, 2008Availability: Items available for loan: [Call number: 005.8 SMI] (1).
|
|
100.
|
Fuzzing : brute force vulnerabilty discovery
by Sutton, Michael | Amini, Pedram | Greene, Adam. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Jersey: Addison-Wesley, 2007Availability: Items available for loan: [Call number: 005.8 SUT] (1).
|