441. Cybersecurity and cyberwar : what everyone needs to know

by Singer, P. W | Friedman, Allan.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Oxford University Press, 2014Availability: Items available for loan: [Call number: 005.8 SIN] (1).
442. Bits and atoms : information and communication technology in areas of limited statehood

by Livingston, Steven.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Oxford: Oxford University Press, 2014Availability: Items available for loan: [Call number: 320.014 LIV] (1).
443. CORBA Security

by Blakley, Bob.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Harlow: Addison-Wesley, 1999Availability: Items available for loan: [Call number: 005.8 BLA] (1).
444. Distributed Operating Systems and Algorithms

by Chow, Randy.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Delhi: Addison-Wesley, 1998Availability: Items available for loan: [Call number: 005.43 CHO] (1).
445. Programming Windows Security

by Brown, Keith.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Addison-Wesley, 2000Availability: Items available for loan: [Call number: 005.8 BRO] (1).
446. SSL and TLS : designing and building secure systems

by Rescorla, Eric.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Addison-Wesley, 2000Availability: Items available for loan: [Call number: 005.8 RES] (1).
447. Cryptography Decrypted

by Mel, H. X.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Addison-Wesley, 2001Availability: Items available for loan: [Call number: 005.82 MEL] (1).
448. Web Security

by Stein, Lincoln D.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Addison-Wesley, 1997Availability: Items available for loan: [Call number: 005.8 STE] (1).
449. Linux and UNIX shell programming

by Tansley | Tansley, David.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: London: Addison-Wesley, 2000Availability: Items available for loan: [Call number: 005.422 TAN] (1).
450. Essential Check Point FireWall-1 : an installation, configuration, and troubleshooting guide

by Welch-Abernathy, Dameon | Welch-Abernathy, Dameon D.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston Addison-Wesley 2002Availability: Items available for loan: [Call number: 005.8 WEL] (1).
451. Computer forensics: Incident response essentials

by Kruse, Warren G | Heiser, Jay G.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Addison-Wesley, 2002Availability: Items available for loan: [Call number: 005.8 KRU] (1).
452. Effective incident response team

by Lucas, Julie | Moeller, Brain.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Addison-Wesley, 2004Availability: Items available for loan: [Call number: 005.8 LUC] (1).
453. Exploiting software : how to break code

by Gary, McGraw | McGraw, Gary.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Pearson Higher Education, 2004Availability: Items available for loan: [Call number: 005.8 HOG] (1).
454. Communication Networks : a first course

by Walrand, Jean.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Tata McGraw-Hill, 1998Availability: Items available for loan: [Call number: 004.6 WAL] (1).
455. Management information systems : solving business problems with information technology

by Post, Gerald V | Anderson, David L.

Edition: 3rd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Tata McGraw-Hill, 2003Availability: Items available for loan: [Call number: 658.4 POS] (2).
456. Surveillance or security? : the risks posed by new wiretapping technologies

by Landau, Susan.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Cambridge: MIT Press, 2011Availability: Items available for loan: [Call number: 363.252 LAN] (1).
457. Arguments that count : physics, computing, and missile defense, 1949-2012

by Slayton, Rebecca.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Cambridge: MIT Press, 2013Availability: Items available for loan: [Call number: 358.1740973 SLA] (1).
458. Rethinking public key infrastructures and digital certificates: Building in privacy

by Brands, Stefan A.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Cambridge: The MIT Press, 2000Availability: Items available for loan: [Call number: 005.8 BRA] (2).
459. Protocol : how control exists after decentralization

by Galloway, Alexander R.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Cambridge: MIT Press, 2004Availability: Items available for loan: [Call number: 005.8 GAL] (1).
460. Trust and risk in Internet commerce

by Camp, L. Jean.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Cambridge: The MIT Press, 2001Availability: Items available for loan: [Call number: 005.8 CAM] (1).

Powered by Koha