581. Hands on ethical hacking and network defense

by Simpson, Michael T.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Australia: Thomson Course technology, 2006Availability: Items available for loan: [Call number: 005.8 SIM] (2).
582. Understanding PKI: Concepts, standards and deployment considerations

by Adams, Carlisle | Lloyd, Steve.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Addison-Wesley, 2003Availability: Items available for loan: [Call number: 005.8 ADA] (1).
583. Maximum security

by Anonymous.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Techmedia, 1998Availability: Items available for loan: [Call number: 005.8 ANO] (2).
584. Information Science

by Luenberger, David G.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Princeton: Princeton University Press, 2006Availability: Items available for loan: [Call number: 004 LUE] (1).
585. Electronic elections : the perils and promises of digital democracy

by Alvarez, Michael R | Hall, Thad E.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Jersey: Princeton University Press, 2010Availability: Items available for loan: [Call number: 324.65 ALV] (1).
586. Writing secure code

by Howard, Michael | LeBlanc, David.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Washington: Microsoft Press, 2002Availability: Items available for loan: [Call number: 005.8 HOW] (2).
587. Microsoft windows security resource kit

by Smith, Ben | Komar, Brian | Smith, Ben.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Redmond: Microsoft Press, 2005Availability: Items available for loan: [Call number: 005.8 SMI] (2).
588. Security development lifecycle

by Howard, Michael | Lipner, Steve.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Washington: Microsoft Press, 2006Availability: Items available for loan: [Call number: 005.8 HOW] (2).
589. Investigative data mining for security and criminal detection

by Mena, Jesus.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Amsterdam: Butterworth-Heinemann, 2003Availability: Items available for loan: [Call number: 005.8 MEN] (1).
590. Optimizing and Testing WLANs : proven techniques for maximum performance

by Alexander, Tom.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Amsterdam: Elsevier, 2007Availability: Items available for loan: [Call number: 004.68 ALE] (1).
591. Unorganised Sector

by Jhabvala, Renana.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Sage Publications, 2000Availability: Items available for loan: [Call number: 362 JHA] (1).
592. Internet security : hacking, counterhacking, and society

by Himma, Kenneth Einar.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Massachusetts: Jones & Bartlett, 2007Availability: Items available for loan: [Call number: 005.8 HIM] (1).
593. Principles of modern operating systems

by Schlesinger, Richard | Garrido, Jose M.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Sudbury: Jones & Bartlett, 2008Availability: Items available for loan: [Call number: 005.43 GAR] (2).
594. Information security : contemporary cases

by Wright, Marie A.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Massachusetts: Jones & Bartlett, 2007Availability: Items available for loan: [Call number: 005.8 WRI] (1).
595. Concepts in Computing

by Hoganson, Kenneth E | Hoganson, Kenneth E.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Sudbury: Jones & Bartlett, 2008Availability: Items available for loan: [Call number: 004 HOG] (1).
596. Computer security : protecting digital resources

by Newman, Robert C.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Sudbury: Jones & Bartlett, 2010Availability: Items available for loan: [Call number: 005.8 NEW] (1).
597. Wireless security : end to end

by Carter, Brian | Shumway, Russell.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Indianapolis: Wiley Publishing, 2002Availability: Items available for loan: [Call number: 005.8 CAR] (1).
598. Reversing : secrets of reverse engineering

by Eilam, Eldad.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Wiley, 2005Availability: Items available for loan: [Call number: 005.1 EIL] (1).
599. Beginning cryptography with Java

by Hook, David.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Wiley-India, 2005Availability: Items available for loan: [Call number: 005.8 HOO] (1).
600. Rescued by SQL

by Brockwood, Ted.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Australia: Onword Press, 2002Availability: Items available for loan: [Call number: 005.74 BRO] (1).

Powered by Koha