|
21.
|
.NET developer's guide to windows security
by Brown, Keith. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Addison-Wesley, 2004Availability: Items available for loan: [Call number: 005.8 BRO] (1).
|
|
22.
|
Introduction to computer security
by Bishop, Matt. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Addison-Wesley, 2004Availability: Items available for loan: [Call number: 005.8 BIS] (1).
|
|
23.
|
Rootkits : subverting the windows kernel
by Hoglund, Greg | Butler, James. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Jersey: Addison-Wesley, 2005Availability: Items available for loan: [Call number: 005.8 HOG] (1).
|
|
24.
|
Secure coding in C and C++
by Seacord, Robert C. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Jersey: Addison-Wesley, 2005Availability: Items available for loan: [Call number: 005.8 SEA] (1).
|
|
25.
|
Brute force : cracking the data encryption standard
by Curtin, Matt. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Copernicus Books, 2005Availability: Items available for loan: [Call number: 005.82 CUR] (1).
|
|
26.
|
Intrusion detection and correlation : challenges and solutions
by Kruegel, Christopher | Valeur, Fredrik | Vigna, Giovanni. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2005Availability: Items available for loan: [Call number: 005.8 KRU] (1).
|
|
27.
|
Trusted computing platforms : design and applications
by Smith, Sean W. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2005Availability: Items available for loan: [Call number: 005.8 SMI] (1).
|
|
28.
|
Computer Security in the 21st Century
by Shieh, S. P | Lee, D. T | Tygar, J. D. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2005Availability: Items available for loan: [Call number: 005.8 LEE] (1).
|
|
29.
|
Multimedia encryption and watermarking
by Furht, Borko | Muharemagic, Edin | Socek, Daniel. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2005Availability: Items available for loan: [Call number: 005.8 FUR] (1).
|
|
30.
|
Hop integrity in the Internet
by Huang, Chin-Tser | Gouda, Mohamed G. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2005Availability: Items available for loan: [Call number: 005.8 HUA] (1).
|
|
31.
|
Understanding intrusion detection through visualization
by Axelsson, Stefan. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2005Availability: Items available for loan: [Call number: 005.8 AXE] (1).
|
|
32.
|
Security in fixed and wireless networks : an introduction to securing data communications
by Schafer, Gunter. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Harlow: John Wiley & Sons, 2003Availability: Items available for loan: [Call number: 005.8 SCH] (1).
|
|
33.
|
Building open source network security tools : components and techniques
by Schiffman, Mike D. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Indiana: Wiley Publishing, 2003Availability: Items available for loan: [Call number: 005.8 SCH] (1).
|
|
34.
|
Computer security handbook
by Bosworth, Seymour | Kabay, M. E. Edition: 4th ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: John Wiley & Sons, 2002Availability: Items available for loan: [Call number: 005.8 BOS] (1).
|
|
35.
|
Load Balancing Servers, Firewalls and Caches
by Kopparapu, Chandra. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: John Wiley & Sons, 2001Availability: Items available for loan: [Call number: 005.8 KOP] (1).
|
|
36.
|
Cryptography, information theory, and error-correction : a handbook for the twenty first century
by Bruen, Aiden A | Forcinito, Mario A. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Jersey: John Wiley & Sons, 2005Availability: Items available for loan: [Call number: 005.8 BRU] (1).
|
|
37.
|
Information security : principles and practice
by Stamp, Mark. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Jersey: Wiley-Interscience, 2005Availability: Items available for loan: [Call number: 005.8 STA] (1).
|
|
38.
|
Phishing and countermeasures : understanding the increasing problem of electronic identity theft
by Jakobsson, Markus | Myers, Steven. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Hoboken: John Wiley & Sons, 2007Availability: Items available for loan: [Call number: 364.163 JAK] (1).
|
|
39.
|
Computer security
by Gollmann, Dieter. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Chichester: John Wiley & Sons, 1999Availability: Items available for loan: [Call number: 005.8 GOL] (2).
|
|
40.
|
Basic methods of cryptography
by Gee, Steve | Lubbe, J. C. A. van der. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Cambridge: Cambridge University Press, 1998Availability: Items available for loan: [Call number: 005.82 LUB] (1).
|