|
161.
|
Building VPNs with IPSec and MPLS
by Tan, Nam-Kee. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: McGraw-Hill, 2003Availability: Items available for loan: [Call number: 005.8 TAN] (1).
|
|
162.
|
Defending your digital assets: againts hackers, crackers, spies and theieves
by Nichols, Randall K | Ryan, Daniel J | Ryan, Julie C. H. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: McGraw-Hill, 2000Availability: Items available for loan: [Call number: 005.8 NIC] (1).
|
|
163.
|
Digital signatures
by Atreya, Mohan. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: McGraw-Hill, 2002Availability: Items available for loan: [Call number: 005.82 ATR] (1).
|
|
164.
|
Intrusion detection & prevention
by Endorf, Carl | Mellander, Jim | Schultz, Eugene. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: California: McGraw-Hill/Osborne, 2004Availability: Items available for loan: [Call number: 005.8 END] (1).
|
|
165.
|
Effective Oracle Database 10g security by design
by Knox, David. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Tata McGraw-Hill, 2004Availability: Items available for loan: [Call number: 005.8 KNO] (1).
|
|
166.
|
Hardening windows systems : bulletproof your systems before you are hacked
by Bragg, Roberta. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Tata McGraw-Hill, 2004Availability: Items available for loan: [Call number: 005.8 BRA] (1).
|
|
167.
|
Computer security lab manual
by Nestler, Vincent J. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: McGraw-Hill, 2005Availability: Items available for loan: [Call number: 005.8 NES] (1).
|
|
168.
|
Gray hat hacking : the ethical hacker's handbook
by Harris, Shon. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York McGraw-Hill 2005Availability: Items available for loan: [Call number: 005.8 HAR] (1).
|
|
169.
|
Hacking exposed : network security secrets and solutions
by McClure, Stuart. Edition: 5th ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York McGraw-Hill 2005Availability: Items available for loan: [Call number: 005.8 MCC] (1).
|
|
170.
|
Nineteen deadly sins of software security : programming flaws and how to fix them
by Howard, Michael | LeBlanc, David | Viega, John. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: McGraw-Hill/Osborne, 2005Availability: Items available for loan: [Call number: 005.8 HOW] (1).
|
|
171.
|
Computer security : 20 things every employee should know
by Rothke, Ben. Edition: 2nd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: McGraw-Hill, 2005Availability: Items available for loan: [Call number: 005.8 ROT] (1).
|
|
172.
|
Multimedia security technologies for digital rights management
by Zeng, Wenjun | Lin, Ching-Yung | Yu, Hong Heather. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Amsterdam: Academic Press, 2006Availability: Items available for loan: [Call number: 005.8 ZEN] (1).
|
|
173.
|
Digital watermarking and steganography
by Cox, Ingemar J. Edition: 2nd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Amsterdam: Morgan Kaufmann, 2008Availability: Items available for loan: [Call number: 005.8 COX] (1).
|
|
174.
|
Information assurance : dependability and security in networked systems
by Qian, Yi. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Amsterdam: Elsevier, 2008Availability: Items available for loan: [Call number: 005.8 QIA] (1).
|
|
175.
|
System assurance : beyond detecting vulnerabilities
by Mansourov, Nikolai | Campara, Djenana. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Amsterdam: Morgan Kaufmann, 2011Availability: Items available for loan: [Call number: 005.8 MAN] (1).
|
|
176.
|
Cyber attacks : protecting national infrastructure
by Amoroso, Edward G. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Burlington: Butterworth-Heinemann, 2011Availability: Items available for loan: [Call number: 363.32590046780973 AMO] (1).
|
|
177.
|
Practical intrusion detection handbook
by Proctor, Paul E. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Jersey: Prentice Hall, 2001Availability: Items available for loan: [Call number: 005.8 PRO] (1).
|
|
178.
|
Secure electronic commerce : building the infrastructure for digital signatures and encryption
by Baum, Michael S. Edition: 2nd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Jersey: Prentice Hall, 2000Availability: Items available for loan: [Call number: 658.84 FOR] (1).
|
|
179.
|
Modern cryptography: Theory and practice
by Mao, Wenbo. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Jersey: Pearson Education, 2004Availability: Items available for loan: [Call number: 005.8 MAO] (1).
|
|
180.
|
Applied algebra: Codes, ciphers and discrete algorithms
by Hardy, Darel W | Walker, Carol L. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Jersey: Pearson Education, 2003Availability: Items available for loan: [Call number: 003.54 HAR] (2).
|