|
21.
|
Art of software security testing : identifying software security flaws
by Wysopal, Chris. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Upper Saddle River: Addison-Wesley, 2007Availability: Items available for loan: [Call number: 005.8 WYS] (1).
|
|
22.
|
Software security : building security in
by McGraw, Gary. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Jersey: Addison-Wesley, 2006Availability: Items available for loan: [Call number: 005.8 MCG] (2).
|
|
23.
|
Secure programming with static analysis
by Chess, Brian. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Jersey: Addison-Wesley, 2007Availability: Items available for loan: [Call number: 005.8 CHE] (2).
|
|
24.
|
Craft of system security
by Smith, Sean | Marchesini, John. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Jersey: Addison-Wesley, 2008Availability: Items available for loan: [Call number: 005.8 SMI] (1).
|
|
25.
|
Fuzzing : brute force vulnerabilty discovery
by Sutton, Michael | Amini, Pedram | Greene, Adam. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Jersey: Addison-Wesley, 2007Availability: Items available for loan: [Call number: 005.8 SUT] (1).
|
|
26.
|
Chained exploits : advanced hacking attacks from start to finish
by Whitaker, Andrew | Evans, Keatron | Voth, Jack B. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Upper Saddle River: Addison-Wesley, 2009Availability: Items available for loan: [Call number: 005.8 WHI] (1).
|
|
27.
|
Crimeware : understanding new attacks and defenses
by Jakobsson, Markus | Ramzan, Zulfikar. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Addison-Wesley, 2008Availability: Items available for loan: [Call number: 005.8 JAK] (1).
|
|
28.
|
New school of information security
by Shostack, Adam | Stewart, Andrew. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Upper Saddle River: Addison-Wesley, 2008Availability: Items available for loan: [Call number: 658.478 SHO] (1).
|
|
29.
|
Surreptitious software : obfuscation, watermarking, and tamperproofing for software protection
by Collberg, Christian | Nagra, Jasvir. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Jersey: Addison-Wesley, 2010Availability: Items available for loan: [Call number: 005.8 COL] (1).
|
|
30.
|
Understanding PKI: Concepts, standards and deployment considerations
by Adams, Carlisle | Lloyd, Steve. Edition: 2nd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Addison-Wesley, 2003Availability: Items available for loan: [Call number: 005.8 ADA] (1).
|
|
31.
|
Forensic discovery
by Venema, Wietse | Farmer, Dan. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Addison-Wesley, 2004Availability: Items available for loan: [Call number: 005.8 FAR] (1).
|
|
32.
|
Building secure software: How to avoid security problems the right way
by Viega, John | McGaw, Gary. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Addison-Wesley, 2001Availability: Items available for loan: [Call number: 005.1 VIE] (1).
|
|
33.
|
CERT guide to system and network security practices
by Allen, Julia H. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Addison-Wesley, 2001Availability: Items available for loan: [Call number: 005.8 ALL] (1).
|
|
34.
|
Cybersecurity myths and misconceptions : avoiding the hazards and pitfalls that derail us
by Spafford, Eugene H | Metcalf, Leigh | Dykstra, Josiah. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston : Addison Wesley, 2023Availability: Items available for loan: [Call number: 005.8 SPA] (1).
|