121. Executive guide to information security : threats, challenges, and solutions

by Egan, Mark | Mather, Tim.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Indianapolis: Addison-Wesley, 2005Availability: Items available for loan: [Call number: 005.8 EGA] (1).
122. Art of software security testing : identifying software security flaws

by Wysopal, Chris.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Upper Saddle River: Addison-Wesley, 2007Availability: Items available for loan: [Call number: 005.8 WYS] (1).
123. How to break Web software : functional and security testing of Web applications and Web services

by Andrews, Mike | Whittaker, James A.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Upper Saddle River: Addison-Wesley, 2006Availability: Items available for loan: [Call number: 005.14 AND] (2).
124. Craft of system security

by Smith, Sean | Marchesini, John.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Jersey: Addison-Wesley, 2008Availability: Items available for loan: [Call number: 005.8 SMI] (1).
125. Fuzzing : brute force vulnerabilty discovery

by Sutton, Michael | Amini, Pedram | Greene, Adam.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Jersey: Addison-Wesley, 2007Availability: Items available for loan: [Call number: 005.8 SUT] (1).
126. Chained exploits : advanced hacking attacks from start to finish

by Whitaker, Andrew | Evans, Keatron | Voth, Jack B.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Upper Saddle River: Addison-Wesley, 2009Availability: Items available for loan: [Call number: 005.8 WHI] (1).
127. Access control systems : security, identity management and trust models

by Benantar, Messaoud.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2006Availability: Items available for loan: [Call number: 005.8 BEN] (1).
128. Global initiatives to secure cyberspace : an emerging landscape

by Portnoy, Michael | Goodman, Seymour E.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2009Availability: Items available for loan: [Call number: 005.8 POR] (1).
129. Wireless networks : multiuser detection in cross-layer design

by Mandayam, Narayan B | Comaniciu, Cristina | Poor, H. Vincent.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2005Availability: Items available for loan: [Call number: 621.3821 COM] (1).
130. Managing cyber threats : issues, approaches, and challenges

by Kumar, Vipin | Lazarevic, Aleksandar | Srivastava, Jaideep.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2005Availability: Items available for loan: [Call number: 305.8 KUM] (1).
131. Wireless network security

by Xiao, Yang | Du, Ding-Zhu | Shen, Xuemin.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2007Availability: Items available for loan: [Call number: 621.3821 XIO] (1).
132. Computer viruses and malware

by Aycock, John.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2006Availability: Items available for loan: [Call number: 005.84 AYC] (1).
133. Malware detection

by Mihai, Christodorescu.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2007Availability: Items available for loan: [Call number: 005.8 CHR] (1).
134. Privacy-respecting intrusion detection

by Flegel, Ulrich.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2007Availability: Items available for loan: [Call number: 005.8 FLE] (1).
135. Practical Internet security

by Vacca, John R.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2007Availability: Items available for loan: [Call number: 005.8 VAC] (1).
136. Handbook of database security : applications and trends

by Jajodia, Sushil | Gertz, Michael.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2008Availability: Items available for loan: [Call number: 005.8 GER] (1).
137. Cryptanalytic attacks on RSA

by Yan, Song Y.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2008Availability: Items available for loan: [Call number: 005.82 YAN] (1).
138. Botnet detection : countering the largest security threat

by Lee, Wenke | Dagon, David | Wang, Cliff.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2008Availability: Items available for loan: [Call number: 005.8 LEE] (1).
139. Network-aware security for group communications

by Sun, Yan | Liu, K. J. R | Trappe, Wade.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2008Availability: Items available for loan: [Call number: 005.8 SUN] (1).
140. New approaches for security, privacy and trust in complex environments

by Venter, Hein | IFIP TC11 International Information Security Conference.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2007Availability: Items available for loan: [Call number: 005.8 VEN] (1).

Powered by Koha