|
201.
|
Executive guide to information security : threats, challenges, and solutions
by Egan, Mark | Mather, Tim. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Indianapolis: Addison-Wesley, 2005Availability: Items available for loan: [Call number: 005.8 EGA] (1).
|
|
202.
|
Art of software security testing : identifying software security flaws
by Wysopal, Chris. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Upper Saddle River: Addison-Wesley, 2007Availability: Items available for loan: [Call number: 005.8 WYS] (1).
|
|
203.
|
Software security : building security in
by McGraw, Gary. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Jersey: Addison-Wesley, 2006Availability: Items available for loan: [Call number: 005.8 MCG] (2).
|
|
204.
|
Secure programming with static analysis
by Chess, Brian. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Jersey: Addison-Wesley, 2007Availability: Items available for loan: [Call number: 005.8 CHE] (2).
|
|
205.
|
Craft of system security
by Smith, Sean | Marchesini, John. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Jersey: Addison-Wesley, 2008Availability: Items available for loan: [Call number: 005.8 SMI] (1).
|
|
206.
|
Fuzzing : brute force vulnerabilty discovery
by Sutton, Michael | Amini, Pedram | Greene, Adam. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Jersey: Addison-Wesley, 2007Availability: Items available for loan: [Call number: 005.8 SUT] (1).
|
|
207.
|
Chained exploits : advanced hacking attacks from start to finish
by Whitaker, Andrew | Evans, Keatron | Voth, Jack B. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Upper Saddle River: Addison-Wesley, 2009Availability: Items available for loan: [Call number: 005.8 WHI] (1).
|
|
208.
|
Crimeware : understanding new attacks and defenses
by Jakobsson, Markus | Ramzan, Zulfikar. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Addison-Wesley, 2008Availability: Items available for loan: [Call number: 005.8 JAK] (1).
|
|
209.
|
New school of information security
by Shostack, Adam | Stewart, Andrew. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Upper Saddle River: Addison-Wesley, 2008Availability: Items available for loan: [Call number: 658.478 SHO] (1).
|
|
210.
|
Introduction to computer security
by Goodrich, Michael T | Roberto, Tamassia. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Pearson Education, 2011Availability: Items available for loan: [Call number: 005.8 GOO] (1).
|
|
211.
|
Surreptitious software : obfuscation, watermarking, and tamperproofing for software protection
by Collberg, Christian | Nagra, Jasvir. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Jersey: Addison-Wesley, 2010Availability: Items available for loan: [Call number: 005.8 COL] (1).
|
|
212.
|
Global initiatives to secure cyberspace : an emerging landscape
by Portnoy, Michael | Goodman, Seymour E. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2009Availability: Items available for loan: [Call number: 005.8 POR] (1).
|
|
213.
|
Managing cyber threats : issues, approaches, and challenges
by Kumar, Vipin | Lazarevic, Aleksandar | Srivastava, Jaideep. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2005Availability: Items available for loan: [Call number: 305.8 KUM] (1).
|
|
214.
|
Classical introduction to cryptography : applications for communications security
by Vaudenay, Serge. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2006Availability: Items available for loan: [Call number: 005.8 VAU] (1).
|
|
215.
|
Data warehousing and data mining techniques for cyber security
by Singhal, Anoop. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2007Availability: Items available for loan: [Call number: 006.312 SIN] (1).
|
|
216.
|
Digital signatures
by Katz, Jonathan. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2010Availability: Items available for loan: [Call number: 005.82 KAT] (1).
|
|
217.
|
Classical introduction to cryptography exercise book
by Baigneres, Thomas. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2006Availability: Items available for loan: [Call number: 005.8 BAI] (1).
|
|
218.
|
Electronic postage systems : technology, security, economics
by Bleumer, Gerrit. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2007Availability: Items available for loan: [Call number: 383.0285 BLE] (1).
|
|
219.
|
Malware detection
by Mihai, Christodorescu. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2007Availability: Items available for loan: [Call number: 005.8 CHR] (1).
|
|
220.
|
Privacy-respecting intrusion detection
by Flegel, Ulrich. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2007Availability: Items available for loan: [Call number: 005.8 FLE] (1).
|