161. Secrets and lies: Digital security in a networked world

by Schneier, Bruce.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: John Wiley & Sons, 2000Availability: Items available for loan: [Call number: 005.8 SCH] (1).
162. Planning for PKI: Best practices guide for deploying public key infrastructure

by Housley, Russ | Polk, Tim.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: John Wiley & Sons, 2001Availability: Items available for loan: [Call number: 005.8 HOU] (1).
163. Hiding in plain sight : steganography and the art of covert communication

by Cole, Eric.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Indianapolis: John Wiley & Sons, 2003Availability: Items available for loan: [Call number: 005.8 COL] (2).
164. Computer Networking : Internet protocols in action

by Matthews, Jeanna.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Hoboken: John Wiley & Sons, 2005Availability: Items available for loan: [Call number: 004.62 MAT] (2).
165. Network security : current status and future directions

by Serpanos, Dimitrios N | Douligeris, Christos.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Hoboken: John Wiley & Sons, 2007Availability: Items available for loan: [Call number: 005.8 DOU] (1).
166. Security and cooperation in wireless networks : thwarting malicious and selfish behavior in the age of ubiquitous computing

by Buttyan, Levente | Hubaux, Jean-Pierre.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Cambridge: Cambridge University Press, 2008Availability: Items available for loan: [Call number: 005.8 BUT] (1).
167. Security and quality of service in ad hoc wireless networks

by Mishra, Amitabh.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Cambridge: Cambridge University Press, 2008Availability: Items available for loan: [Call number: 621.3821 MIS] (1).
168. Digital identity management : technological, business, and social implications

by Birch, David G. W.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Aldershot: Gower, 2007Availability: Items available for loan: [Call number: 658.478 BIR] (1).
169. Security monitoring

by Fry, Chris | Nystrom, Martin.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Sebastopol: O'Reilly, 2009Availability: Items available for loan: [Call number: 005.8 FRY] (1).
170. Web security for network and system administrators

by Mackey, David.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Course Technology, 2003Availability: Items available for loan: [Call number: 005.8 MAC] (4).
171. Lab manual for Security+ guide to network security fundamentals

by Cretaro, Paul.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Thomson Course Technology, 2005Availability: Items available for loan: [Call number: 005.8 CRE] (2).
172. Understanding PKI: Concepts, standards and deployment considerations

by Adams, Carlisle | Lloyd, Steve.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Addison-Wesley, 2003Availability: Items available for loan: [Call number: 005.8 ADA] (1).
173. Microsoft windows security resource kit

by Smith, Ben | Komar, Brian | Smith, Ben.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Redmond: Microsoft Press, 2005Availability: Items available for loan: [Call number: 005.8 SMI] (2).
174. Information security : contemporary cases

by Wright, Marie A.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Massachusetts: Jones & Bartlett, 2007Availability: Items available for loan: [Call number: 005.8 WRI] (1).
175. Computer security : protecting digital resources

by Newman, Robert C.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Sudbury: Jones & Bartlett, 2010Availability: Items available for loan: [Call number: 005.8 NEW] (1).
176. Introduction to security and network forensics

by Buchanan, William J.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton: Auerbach Publications, 2011Availability: Items available for loan: [Call number: 005.8 BUC] (1).
177. Security in wireless mesh networks

by Zhang, Yan.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton: CRC Press, 2009Availability: Items available for loan: [Call number: 005.8 ZHA] (1).
178. Trusted computing

by Mitchell, Chris.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: London: Institution of Electrical Engineers, 2005Availability: Items available for loan: [Call number: 005.8 MIT] (1).
179. Web application security : a beginner's guide

by Sullivan, Bryan | Liu, Vincent.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Tata McGraw-Hill, 2012Availability: Items available for loan: [Call number: 006.78 SUL] (1).
180. Data Communications and Networking

by Forouzan, Behrouz A.

Edition: 5th ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: McGraw-Hill Education India, 2013Availability: Items available for loan: [Call number: 004.6 FOR] (2).

Powered by Koha