|
121.
|
Hardening windows systems : bulletproof your systems before you are hacked
by Bragg, Roberta. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Tata McGraw-Hill, 2004Availability: Items available for loan: [Call number: 005.8 BRA] (1).
|
|
122.
|
Hacking exposed Cisco networks : Cisco security secrets & solutions
by Vladimirov, Andrew A. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Tata McGraw-Hill, 2006Availability: Items available for loan: [Call number: 005.8 VLA] (1).
|
|
123.
|
Hacking exposed : network security secrets and solutions
by McClure, Stuart. Edition: 5th ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York McGraw-Hill 2005Availability: Items available for loan: [Call number: 005.8 MCC] (1).
|
|
124.
|
Data communications and network security
by Carr, Houston H | Snyder, Charles A. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: McGraw-Hill, 2007Availability: Items available for loan: [Call number: 005.8 CAR] (1).
|
|
125.
|
Multimedia security technologies for digital rights management
by Zeng, Wenjun | Lin, Ching-Yung | Yu, Hong Heather. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Amsterdam: Academic Press, 2006Availability: Items available for loan: [Call number: 005.8 ZEN] (1).
|
|
126.
|
Information assurance : dependability and security in networked systems
by Qian, Yi. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Amsterdam: Elsevier, 2008Availability: Items available for loan: [Call number: 005.8 QIA] (1).
|
|
127.
|
Computer and information security handbook
by Vacca, John R. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Amsterdam: Elsevier, 2009Availability: Items available for loan: [Call number: 005.8 VAC] (1).
|
|
128.
|
Disappearing cryptography : information hiding, steganography and watermarking
by Wayner, Peter. Edition: 3rd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Amsterdam: Morgan Kaufmann, 2009Availability: Items available for loan: [Call number: 005.82 WAY] (1).
|
|
129.
|
Computer and information security handbook
by Vacca, John R. Edition: 2nd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Amsterdam: Morgan Kaufmann, 2013Availability: Items available for loan: [Call number: 005.8 VAC ] (1).
|
|
130.
|
Secure electronic commerce : building the infrastructure for digital signatures and encryption
by Baum, Michael S. Edition: 2nd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Jersey: Prentice Hall, 2000Availability: Items available for loan: [Call number: 658.84 FOR] (1).
|
|
131.
|
Counter hack reloaded : a step-by-step guide to computer attacks and effective defenses
by Skoudis, Ed | Liston, Tom. Edition: 2nd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Upper Saddle River: Prentice Hall, 2006Availability: Items available for loan: [Call number: 005.8 SKO] (1).
|
|
132.
|
Computer security fundamentals
by Easttom, Chuck. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Upper Saddle River: Prentice Hall of India, 2005Availability: Items available for loan: [Call number: 005.8 EAS] (1).
|
|
133.
|
Security in distributed computing : did you lock the door?
by Dempsey, Rob. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Jersey: Pearson Education, 1997Availability: Items available for loan: [Call number: 005.8 BRU] (1).
|
|
134.
|
SELinux by example : understanding security enhanced Linux
by Mayer, Frank | Caplan, David | MacMillan, Karl. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Upper Saddle River: Prentice Hall, 2007Availability: Items available for loan: [Call number: 005.8 MAY] (1).
|
|
135.
|
Exploiting online games : cheating massively distributed systems
by Hoglund, Greg | McGraw, Gary. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Upper Saddle River: Addison-Wesley, 2008Availability: Items available for loan: [Call number: 005.8 HOG] (1).
|
|
136.
|
Computer security : principles and practice
by Stallings, Willam. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Jersey: Prentice Hall, 2007Availability: Items available for loan: [Call number: 005.8 STA] (1).
|
|
137.
|
Cryptography and network security : principles and practice
by Stallings, William. Edition: 5th ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Upper Saddle River: Prentice Hall, 2011Availability: Items available for loan: [Call number: 005.82 STA] (1).
|
|
138.
|
Network security essentials : applications and standards
by Stallings, William. Edition: 4th ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Prentice Hall, 2010Availability: Items available for loan: [Call number: 005.8 STA] (1).
|
|
139.
|
VMware vSphere and virtual infrastructure security : securing the virtual environment
by Haletky, Edward L. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Upper Saddle River: Prentice Hall, 2009Availability: Items available for loan: [Call number: 005.8 HAL] (1).
|
|
140.
|
Cybersecurity and cyberwar : what everyone needs to know
by Singer, P. W | Friedman, Allan. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Oxford University Press, 2014Availability: Items available for loan: [Call number: 005.8 SIN] (1).
|