|
1.
|
Extrusion detection : security monitoring for internal intrusions
by Bejtlich, Richard. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Upper Saddle River: Addison-Wesley, 2006Availability: Items available for loan: [Call number: 005.8 BEJ] (1).
|
|
2.
|
Internet and intranet security management : risks and solutions
by Janczewski, Lech. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Hershey: Idea Group Pub., 2000Availability: Items available for loan: [Call number: 005.8 JAN] (1).
|
|
3.
|
Managing security with snort and IDS tools
by Cox, Kerry | Gerg, Christopher. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Mumbai: SPD, 2004Availability: Items available for loan: [Call number: 005.8 GER] (1).
|
|
4.
|
Access control systems : security, identity management and trust models
by Benantar, Messaoud. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2006Availability: Items available for loan: [Call number: 005.8 BEN] (1).
|
|
5.
|
802.1X port-based authentification
by Brown, Edwin Lyle. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton: Auerbach Publications, 2007Availability: Items available for loan: [Call number: 005.8 BRO] (1).
|
|
6.
|
Mechanics of user identification and authentication : fundamentals of identity management
by Todorov, Dobromir. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton: Auerbach Publications, 2007Availability: Items available for loan: [Call number: 005.8 TOD] (1).
|
|
7.
|
Multidiciplinary introduction to information security
by Mjolsnes, Stig F. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton: CRC Press, 2012Availability: Items available for loan: [Call number: 005.8 MJO] (1).
|
|
8.
|
Intrusion detection networks : a key to collaborative security
by Fung, Carol | Boutaba, Raouf. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton: CRC Press, 2014Availability: Items available for loan: [Call number: 005.8 FUN] (1).
|
|
9.
|
Formal models and techniques for analyzing security protocols
by Cortier, Veronique | Kremer, Steve. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Amsterdam: IOS Press, 2011Availability: Items available for loan: [Call number: 005.82 COR] (1).
|
|
10.
|
Emerging challenges for security, privacy and trust
by Gritzalis, Dimitris | Lopez, Javier. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Berlin: Springer, 2009Availability: Items available for loan: [Call number: 005.8 GRI] (1).
|
|
11.
|
Snort cookbook
by Orebaugh, Angela | Babbin, Jacob | Biles, Simon. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Mumbai: Shroff Publishers, 2005Availability: Items available for loan: [Call number: 005.8 ORE] (1).
|
|
12.
|
Hacker's handbook : the strategy behind breaking into and defending networks
by Susan Young | Aitel, Dav. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Roca Raton: CRC Press, 2003Availability: Items available for loan: [Call number: 005.8 SUS] (1).
|