|
701.
|
XSS attacks : cross site scripting exploits and defense
by Grossman, Jeremiah. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Burlington: Syngress, 2007Availability: Items available for loan: [Call number: 005.6 GRO] (1).
|
|
702.
|
Practical Oracle security : your unauthorized guide to relational database security
by Shaul, Josh | Ingram, Aaron. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Rockland: Syngress, 2007Availability: Items available for loan: [Call number: 005.8 SHA] (1).
|
|
703.
|
Web application vunerabilities : detect, exploit, prevent
by Cross, Michael. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Burlington: Syngress Publishing, 2007Availability: Items available for loan: [Call number: 005.8 CRO] (2).
|
|
704.
|
Best damn firewall book period
by Shinder, Thomas W. Edition: 2nd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Rockland: Syngress, 2007Availability: Items available for loan: [Call number: 005.8 SHI] (1).
|
|
705.
|
Next generation SSH2 implementation : securing data in motion
by Liu, Dale. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Burlington: Syngress Publishing, 2009Availability: Items available for loan: [Call number: 005.8 LIU] (1).
|
|
706.
|
Professional penetration testing : creating and operating a formal hacking lab
by Wilhelm, Thomas | Kanclirz, Jan. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Burlington: Syngress, 2010Availability: Items available for loan: [Call number: 005.8068 WIL] (2).
|
|
707.
|
Network and system security
by Vacca, John R. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Burlington: Syngress, 2010Availability: Items available for loan: [Call number: 005.8 VAC] (1).
|
|
708.
|
Securing the cloud : cloud computer security techniques and tactics
by Winkler, Vic. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Waltham: Syngress, 2011Availability: Items available for loan: [Call number: 005.8 WIN] (1).
|
|
709.
|
Web application obfuscation
by Heiderich, Mario. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Burlington: Syngress, 2011Availability: Items available for loan: [Call number: 005.8 HEI] (1).
|
|
710.
|
Cyber warfare : techniques, tactics and tools for security practitioners
by Andress, Jason | Winterfeld, Steve. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Waltham: Syngress, 2011Availability: Items available for loan: [Call number: 355.343 AND] (1).
|
|
711.
|
Unofficial guide to ethical hacking
by Fadia, Ankit. Edition: 2nd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Thomson Course Technology, 2005Availability: Items available for loan: [Call number: 005.8 FAD] (1).
|
|
712.
|
Hacking mobile phones
by Fadia, Ankit. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Thomson Course Technology, 2006Availability: Items available for loan: [Call number: 384.53 FAD] (1).
|
|
713.
|
Network intrusion alert : an ethical hacking guide to intrusion detection
by Fadia, Ankit | Zacharia, Manu. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Thomson Course Technology, 2008Availability: Items available for loan: [Call number: 005.8 FAD] (1).
|
|
714.
|
Digital audio watermarking techniques and technologies : applications and benchmarks
by Cvejic, Nedeljko | Seppanen, Tapio. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Hershey: Information Science Reference, 2008Availability: Items available for loan: [Call number: 005.82 CVE] (1).
|
|
715.
|
Securing Web services : practical usage of standards and specifications
by Periorellis, Panos. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Hershey: Information Science Reference, 2008Availability: Items available for loan: [Call number: 005.8 PER] (1).
|
|
716.
|
Watermarking in audio : key techniques and technologies
by He, Xing. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Youngstown: Cambria Press, 2008Availability: Items available for loan: [Call number: 005.82 HEX] (1).
|
|
717.
|
Web services security development and architecture : theoretical and practical issues
by Gutierrez, Carlos | Fernandez-Medina, Eduardo | Piattini, Mario. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Hershey: Information Science Pub., 2010Availability: Items available for loan: [Call number: 006.78 GUT] (1).
|
|
718.
|
Web intelligence and security : advances in data and text mining techniques for detecting and preventing terrorist activities on the web
by Last, Mark | Kandel, Abraham. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Amsterdam: IOS Press, 2010Availability: Items available for loan: [Call number: 006.312 LAS] (1).
|
|
719.
|
Software and systems safety : specification and verification
by Broy, Manfred | Hoare, Tony | Leuxner, Christian | NATO Advanced Study Institute on Software and Systems Safety: Specification and Verification. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Amsterdam: IOS Press, 2011Availability: Items available for loan: [Call number: 005.8 BRO] (1).
|
|
720.
|
Formal models and techniques for analyzing security protocols
by Cortier, Veronique | Kremer, Steve. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Amsterdam: IOS Press, 2011Availability: Items available for loan: [Call number: 005.82 COR] (1).
|