|
1.
|
Digital certificates : applied internet security
by Feghhi, Jalala | Feghhi, Jalil | Williams, Peter. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Reading: Addison-Wesley, 1999Availability: Items available for loan: [Call number: 005.8 FEG] (2).
|
|
2.
|
Know your enemy : learning about security threats
by Honeynet project. Edition: 2nd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Pearson Education, 2004Availability: Items available for loan: [Call number: 005.8 HON] (2).
|
|
3.
|
Inside network security assessment : guarding your IT infrastructure
by Gregg, Michael | Kim, David. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Pearson Education, 2005Availability: Items available for loan: [Call number: 005.8 GRE] (2).
|
|
4.
|
Information security intelligence : cryptographic principles and applications
by Calabrese, Thomas. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Australia: Thomson, 2004Availability: Items available for loan: [Call number: 005.8 CAL] (2).
|
|
5.
|
Computer forensics : computer crime scene investigation
by Vacca, John. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Massachusetts: Charles River Media, 2002Availability: Items available for loan: [Call number: 363.25968 VAC] (2).
|
|
6.
|
Software vulnerability guide
by Thompson, Herbert H | Chase, Scott G. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Hingham: Charles River Media, 2005Availability: Items available for loan: [Call number: 005.8 THO] (2).
|
|
7.
|
Crackproof your software : protect your software against crackers
by Cerven, Pavol. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: San Francisco: No Starch Press, 2002Availability: Items available for loan: [Call number: 005.8 CER] (2).
|
|
8.
|
Disaster recovery handbook : a step-by-step plan to ensure business continuity and protect vital operations, facilities, and assets
by Wallace, Michael | Webber, Lawrence. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Prentice Hall of India, 2007Availability: Items available for loan: [Call number: 658.477 WAL] (2).
|
|
9.
|
Computer forensics : computer crime scence investigation
by Vacca, John. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Firewall Media, 2002Availability: Items available for loan: [Call number: 363.25968 VAC] (2).
|
|
10.
|
MCSE/MCSA implementing and administering security in a Windows 2000 network
by Schmied, Will. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Navi Mumbai: Shroff Publishers, 2003Availability: Items available for loan: [Call number: 005.8 SCH] (2).
|
|
11.
|
Cryptography in C and C++
by Welschenbach, Michael | Kramer, David. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Wiley-Dreamtech India, 2003Availability: Items available for loan: [Call number: 005.8 WEL] (2).
|
|
12.
|
CISSP Certification exam study guide
by Harris, Shon. Edition: 2nd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Dreamtech Press, 2004Availability: Items available for loan: [Call number: 005.805 HAR] (10).
|
|
13.
|
Principles of computer security : security+ and beyond
by White, Gregory B | Cothren, Chuck | Williams, Dwayne. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: McGraw-Hill, 2005Availability: Items available for loan: [Call number: 005.8 CON] (2).
|
|
14.
|
Applied algebra: Codes, ciphers and discrete algorithms
by Hardy, Darel W | Walker, Carol L. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Jersey: Pearson Education, 2003Availability: Items available for loan: [Call number: 003.54 HAR] (2).
|
|
15.
|
Software security : building security in
by McGraw, Gary. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Jersey: Addison-Wesley, 2006Availability: Items available for loan: [Call number: 005.8 MCG] (2).
|
|
16.
|
Secure programming with static analysis
by Chess, Brian. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Jersey: Addison-Wesley, 2007Availability: Items available for loan: [Call number: 005.8 CHE] (2).
|
|
17.
|
Hiding in plain sight : steganography and the art of covert communication
by Cole, Eric. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Indianapolis: John Wiley & Sons, 2003Availability: Items available for loan: [Call number: 005.8 COL] (2).
|
|
18.
|
Lab manual for Security+ guide to network security fundamentals
by Cretaro, Paul. Edition: 2nd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Thomson Course Technology, 2005Availability: Items available for loan: [Call number: 005.8 CRE] (2).
|
|
19.
|
Hands on ethical hacking and network defense
by Simpson, Michael T. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Australia: Thomson Course technology, 2006Availability: Items available for loan: [Call number: 005.8 SIM] (2).
|
|
20.
|
Maximum security
by Anonymous. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Techmedia, 1998Availability: Items available for loan: [Call number: 005.8 ANO] (2).
|