|
261.
|
Essential cybersecurity science : build, test, and evaluate secure systems
by Dykstra, Josiah. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Sebastopol: O'Reilly Media, 2016Availability: Items available for loan: [Call number: 005.8 DYK] (1).
|
|
262.
|
Secure messaging with PGP and S/MIME
by Oppliger, Rolf. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Artech House, 2000Availability: Items available for loan: [Call number: 005.8 OPP] (1).
|
|
263.
|
Security technologies for the world wide web
by Oppliger, Rolf. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Artech House, 2002Availability: Items available for loan: [Call number: 005.8 OPP] (1).
|
|
264.
|
Introduction to network security
by Krawetz, Neal. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Charles River Media, 2006Availability: Items available for loan: [Call number: 005.8 KRA] (2).
|
|
265.
|
Scalable and Secure Internet Services and Architecture
by Xu, Cheng zhong. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton: Chapman & Hall/CRC, 2005Availability: Items available for loan: [Call number: 004.678 XUC] (1).
|
|
266.
|
Wireless sensor network security
by Zhou, Jianying | Lopez, Javier. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Amsterdam: IOS Press, 2008Availability: Items available for loan: [Call number: 681.2 LOP] (1).
|
|
267.
|
Aspects of network and information security
by Kranakis, Evangelos | Haroutunian, Evgueni A | Shahbazian, E | NATO Advanced Study Institute on Network Security and Intrusion Detection. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Amsterdam: IOS Press, 2008Availability: Items available for loan: [Call number: 005.8 KRA] (1).
|
|
268.
|
Network security architectures
by Convery, Sean | Cisco Systems, Inc. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Indianapolis: Cisco Press, 2004Availability: Items available for loan: [Call number: 005.8 CON] (1).
|
|
269.
|
Securing the borderless network : security for the web 2.0 world
by Gillis, Tom. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Indianapolis: Cisco Press, 2010Availability: Items available for loan: [Call number: 005.8 GIL] (1).
|
|
270.
|
Security data visualization : graphical techniques for network analysis
by Conti, Greg. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: San Francisco: No Starch Press, 2007Availability: Items available for loan: [Call number: 005.8 CON] (1).
|
|
271.
|
Security for mobile networks and platforms
by Aissi, Selim | Dabbous, Nora | Prasad, Anand R. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Artech House, 2006Availability: Items available for loan: [Call number: 621.384 AIS] (1).
|
|
272.
|
SSL and TLS : theory and practice
by Oppliger, Rolf. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Artech House, 2009Availability: Items available for loan: [Call number: 005.8 OPP] (1).
|
|
273.
|
How to own a shadow : the chase for Knuth
by Long, Johnny | Mullen, Timothy M | Russell, Ryan. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Rockland: Syngress, 2007Availability: Items available for loan: [Call number: 813.6 LON] (1).
|
|
274.
|
XSS attacks : cross site scripting exploits and defense
by Grossman, Jeremiah. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Burlington: Syngress, 2007Availability: Items available for loan: [Call number: 005.6 GRO] (1).
|
|
275.
|
Web application vunerabilities : detect, exploit, prevent
by Cross, Michael. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Burlington: Syngress Publishing, 2007Availability: Items available for loan: [Call number: 005.8 CRO] (2).
|
|
276.
|
Next generation SSH2 implementation : securing data in motion
by Liu, Dale. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Burlington: Syngress Publishing, 2009Availability: Items available for loan: [Call number: 005.8 LIU] (1).
|
|
277.
|
Network and system security
by Vacca, John R. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Burlington: Syngress, 2010Availability: Items available for loan: [Call number: 005.8 VAC] (1).
|
|
278.
|
Securing the cloud : cloud computer security techniques and tactics
by Winkler, Vic. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Waltham: Syngress, 2011Availability: Items available for loan: [Call number: 005.8 WIN] (1).
|
|
279.
|
Cyber warfare : techniques, tactics and tools for security practitioners
by Andress, Jason | Winterfeld, Steve. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Waltham: Syngress, 2011Availability: Items available for loan: [Call number: 355.343 AND] (1).
|
|
280.
|
Hacking mobile phones
by Fadia, Ankit. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Thomson Course Technology, 2006Availability: Items available for loan: [Call number: 384.53 FAD] (1).
|