|
581.
|
Hands on ethical hacking and network defense
by Simpson, Michael T. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Australia: Thomson Course technology, 2006Availability: Items available for loan: [Call number: 005.8 SIM] (2).
|
|
582.
|
Understanding PKI: Concepts, standards and deployment considerations
by Adams, Carlisle | Lloyd, Steve. Edition: 2nd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Addison-Wesley, 2003Availability: Items available for loan: [Call number: 005.8 ADA] (1).
|
|
583.
|
Maximum security
by Anonymous. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Techmedia, 1998Availability: Items available for loan: [Call number: 005.8 ANO] (2).
|
|
584.
|
Information Science
by Luenberger, David G. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Princeton: Princeton University Press, 2006Availability: Items available for loan: [Call number: 004 LUE] (1).
|
|
585.
|
Electronic elections : the perils and promises of digital democracy
by Alvarez, Michael R | Hall, Thad E. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Jersey: Princeton University Press, 2010Availability: Items available for loan: [Call number: 324.65 ALV] (1).
|
|
586.
|
Writing secure code
by Howard, Michael | LeBlanc, David. Edition: 2nd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Washington: Microsoft Press, 2002Availability: Items available for loan: [Call number: 005.8 HOW] (2).
|
|
587.
|
Microsoft windows security resource kit
by Smith, Ben | Komar, Brian | Smith, Ben. Edition: 2nd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Redmond: Microsoft Press, 2005Availability: Items available for loan: [Call number: 005.8 SMI] (2).
|
|
588.
|
Security development lifecycle
by Howard, Michael | Lipner, Steve. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Washington: Microsoft Press, 2006Availability: Items available for loan: [Call number: 005.8 HOW] (2).
|
|
589.
|
Investigative data mining for security and criminal detection
by Mena, Jesus. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Amsterdam: Butterworth-Heinemann, 2003Availability: Items available for loan: [Call number: 005.8 MEN] (1).
|
|
590.
|
Optimizing and Testing WLANs : proven techniques for maximum performance
by Alexander, Tom. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Amsterdam: Elsevier, 2007Availability: Items available for loan: [Call number: 004.68 ALE] (1).
|
|
591.
|
Unorganised Sector
by Jhabvala, Renana. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Sage Publications, 2000Availability: Items available for loan: [Call number: 362 JHA] (1).
|
|
592.
|
Internet security : hacking, counterhacking, and society
by Himma, Kenneth Einar. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Massachusetts: Jones & Bartlett, 2007Availability: Items available for loan: [Call number: 005.8 HIM] (1).
|
|
593.
|
Principles of modern operating systems
by Schlesinger, Richard | Garrido, Jose M. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Sudbury: Jones & Bartlett, 2008Availability: Items available for loan: [Call number: 005.43 GAR] (2).
|
|
594.
|
Information security : contemporary cases
by Wright, Marie A. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Massachusetts: Jones & Bartlett, 2007Availability: Items available for loan: [Call number: 005.8 WRI] (1).
|
|
595.
|
Concepts in Computing
by Hoganson, Kenneth E | Hoganson, Kenneth E. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Sudbury: Jones & Bartlett, 2008Availability: Items available for loan: [Call number: 004 HOG] (1).
|
|
596.
|
Computer security : protecting digital resources
by Newman, Robert C. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Sudbury: Jones & Bartlett, 2010Availability: Items available for loan: [Call number: 005.8 NEW] (1).
|
|
597.
|
Wireless security : end to end
by Carter, Brian | Shumway, Russell. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Indianapolis: Wiley Publishing, 2002Availability: Items available for loan: [Call number: 005.8 CAR] (1).
|
|
598.
|
Reversing : secrets of reverse engineering
by Eilam, Eldad. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Wiley, 2005Availability: Items available for loan: [Call number: 005.1 EIL] (1).
|
|
599.
|
Beginning cryptography with Java
by Hook, David. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Wiley-India, 2005Availability: Items available for loan: [Call number: 005.8 HOO] (1).
|
|
600.
|
Rescued by SQL
by Brockwood, Ted. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Australia: Onword Press, 2002Availability: Items available for loan: [Call number: 005.74 BRO] (1).
|