701. XSS attacks : cross site scripting exploits and defense

by Grossman, Jeremiah.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Burlington: Syngress, 2007Availability: Items available for loan: [Call number: 005.6 GRO] (1).
702. Practical Oracle security : your unauthorized guide to relational database security

by Shaul, Josh | Ingram, Aaron.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Rockland: Syngress, 2007Availability: Items available for loan: [Call number: 005.8 SHA] (1).
703. Web application vunerabilities : detect, exploit, prevent

by Cross, Michael.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Burlington: Syngress Publishing, 2007Availability: Items available for loan: [Call number: 005.8 CRO] (2).
704. Best damn firewall book period

by Shinder, Thomas W.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Rockland: Syngress, 2007Availability: Items available for loan: [Call number: 005.8 SHI] (1).
705. Next generation SSH2 implementation : securing data in motion

by Liu, Dale.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Burlington: Syngress Publishing, 2009Availability: Items available for loan: [Call number: 005.8 LIU] (1).
706. Professional penetration testing : creating and operating a formal hacking lab

by Wilhelm, Thomas | Kanclirz, Jan.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Burlington: Syngress, 2010Availability: Items available for loan: [Call number: 005.8068 WIL] (2).
707. Network and system security

by Vacca, John R.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Burlington: Syngress, 2010Availability: Items available for loan: [Call number: 005.8 VAC] (1).
708. Securing the cloud : cloud computer security techniques and tactics

by Winkler, Vic.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Waltham: Syngress, 2011Availability: Items available for loan: [Call number: 005.8 WIN] (1).
709. Web application obfuscation

by Heiderich, Mario.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Burlington: Syngress, 2011Availability: Items available for loan: [Call number: 005.8 HEI] (1).
710. Cyber warfare : techniques, tactics and tools for security practitioners

by Andress, Jason | Winterfeld, Steve.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Waltham: Syngress, 2011Availability: Items available for loan: [Call number: 355.343 AND] (1).
711. Unofficial guide to ethical hacking

by Fadia, Ankit.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Thomson Course Technology, 2005Availability: Items available for loan: [Call number: 005.8 FAD] (1).
712. Hacking mobile phones

by Fadia, Ankit.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Thomson Course Technology, 2006Availability: Items available for loan: [Call number: 384.53 FAD] (1).
713. Network intrusion alert : an ethical hacking guide to intrusion detection

by Fadia, Ankit | Zacharia, Manu.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Thomson Course Technology, 2008Availability: Items available for loan: [Call number: 005.8 FAD] (1).
714. Digital audio watermarking techniques and technologies : applications and benchmarks

by Cvejic, Nedeljko | Seppanen, Tapio.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Hershey: Information Science Reference, 2008Availability: Items available for loan: [Call number: 005.82 CVE] (1).
715. Securing Web services : practical usage of standards and specifications

by Periorellis, Panos.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Hershey: Information Science Reference, 2008Availability: Items available for loan: [Call number: 005.8 PER] (1).
716. Watermarking in audio : key techniques and technologies

by He, Xing.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Youngstown: Cambria Press, 2008Availability: Items available for loan: [Call number: 005.82 HEX] (1).
717. Web services security development and architecture : theoretical and practical issues

by Gutierrez, Carlos | Fernandez-Medina, Eduardo | Piattini, Mario.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Hershey: Information Science Pub., 2010Availability: Items available for loan: [Call number: 006.78 GUT] (1).
718. Web intelligence and security : advances in data and text mining techniques for detecting and preventing terrorist activities on the web

by Last, Mark | Kandel, Abraham.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Amsterdam: IOS Press, 2010Availability: Items available for loan: [Call number: 006.312 LAS] (1).
719. Software and systems safety : specification and verification

by Broy, Manfred | Hoare, Tony | Leuxner, Christian | NATO Advanced Study Institute on Software and Systems Safety: Specification and Verification.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Amsterdam: IOS Press, 2011Availability: Items available for loan: [Call number: 005.8 BRO] (1).
720. Formal models and techniques for analyzing security protocols

by Cortier, Veronique | Kremer, Steve.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Amsterdam: IOS Press, 2011Availability: Items available for loan: [Call number: 005.82 COR] (1).

Powered by Koha