|
321.
|
Best damn firewall book period
by Shinder, Thomas W. Edition: 2nd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Rockland: Syngress, 2007Availability: Items available for loan: [Call number: 005.8 SHI] (1).
|
|
322.
|
Next generation SSH2 implementation : securing data in motion
by Liu, Dale. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Burlington: Syngress Publishing, 2009Availability: Items available for loan: [Call number: 005.8 LIU] (1).
|
|
323.
|
Professional penetration testing : creating and operating a formal hacking lab
by Wilhelm, Thomas | Kanclirz, Jan. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Burlington: Syngress, 2010Availability: Items available for loan: [Call number: 005.8068 WIL] (2).
|
|
324.
|
Securing the cloud : cloud computer security techniques and tactics
by Winkler, Vic. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Waltham: Syngress, 2011Availability: Items available for loan: [Call number: 005.8 WIN] (1).
|
|
325.
|
Web application obfuscation
by Heiderich, Mario. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Burlington: Syngress, 2011Availability: Items available for loan: [Call number: 005.8 HEI] (1).
|
|
326.
|
Unofficial guide to ethical hacking
by Fadia, Ankit. Edition: 2nd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Thomson Course Technology, 2005Availability: Items available for loan: [Call number: 005.8 FAD] (1).
|
|
327.
|
Network intrusion alert : an ethical hacking guide to intrusion detection
by Fadia, Ankit | Zacharia, Manu. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Thomson Course Technology, 2008Availability: Items available for loan: [Call number: 005.8 FAD] (1).
|
|
328.
|
Securing Web services : practical usage of standards and specifications
by Periorellis, Panos. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Hershey: Information Science Reference, 2008Availability: Items available for loan: [Call number: 005.8 PER] (1).
|
|
329.
|
Software and systems safety : specification and verification
by Broy, Manfred | Hoare, Tony | Leuxner, Christian | NATO Advanced Study Institute on Software and Systems Safety: Specification and Verification. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Amsterdam: IOS Press, 2011Availability: Items available for loan: [Call number: 005.8 BRO] (1).
|
|
330.
|
Formal models and techniques for analyzing security protocols
by Cortier, Veronique | Kremer, Steve. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Amsterdam: IOS Press, 2011Availability: Items available for loan: [Call number: 005.82 COR] (1).
|
|
331.
|
Information Assurance
by Blyth, Andrew. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer-Verlag, 2001Availability: Items available for loan: [Call number: 005.8 BLY] (1).
|
|
332.
|
Intrusion detection : a machine learning approach
by Yu, Zhenwei | Tsai, Jeffrey J. P. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: London: Imperial College Press, 2011Availability: Items available for loan: [Call number: 005.8 YUZ] (1).
|
|
333.
|
Information warfare
by Ventre, Daniel. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Jersey: John Wiley & Sons, 2009Availability: Items available for loan: [Call number: 355.343 VEN] (1).
|
|
334.
|
Cloud computing : assessing the risks
by Carstensen, Jared | Golden, Bernard | Morgenthal, J. P. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Emeryville: IT Governance Publishing, 2012Availability: Items available for loan: [Call number: 004.6782 CAR] (1).
|
|
335.
|
Fundamentals of secure computer systems
by Tjaden, Brett C. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Wilsonville: Franklin Beedle & Associates, 2004Availability: Items available for loan: [Call number: 005.8 TJA] (1).
|
|
336.
|
Timing channels in cryptography : a micro-architectural perspective
by Rebeiro, Chester. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Cham: Springer, 2015Availability: Items available for loan: [Call number: 005.7 REB] (1).
|
|
337.
|
Composition of Secure Multi-Party Protocols : Comprehensive Study
by Lindell, Yehuda. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer-Verlag, 2003Availability: Items available for loan: [Call number: 004 LIN] (1).
|
|
338.
|
Construction and analysis of safe, secure, and interoperable smart devices : international workshop,CASSIS 2004, Marseille, France, March 10-14, 2004 ; revised selected papers
by Burdy, Lilian | Barthe, Gilles | Huisman, Marieke | Huisman, Marieke. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2005Availability: Items available for loan: [Call number: 004 BAR] (1).
|
|
339.
|
Grid computing security
by Chakrabarti, Anirban. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Berlin: Springer, 2007Availability: Items available for loan: [Call number: 005.8 CHA] (1).
|
|
340.
|
Introduction to cryptography : principles and applications
by Delfs, Hans | Knebl, Helmut. Edition: 2nd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Berlin: Springer, 2007Availability: Items available for loan: [Call number: 005.82 DEL] (1).
|