|
1.
|
Internet besieged : countering cyberspace scofflaws
by Denning, Dorothy E | Denning, Peter J. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Addison-Wesley, 1998Availability: Items available for loan: [Call number: 364.168 DEN] (1).
|
|
2.
|
Digital certificates : applied internet security
by Feghhi, Jalala | Feghhi, Jalil | Williams, Peter. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Reading: Addison-Wesley, 1999Availability: Items available for loan: [Call number: 005.8 FEG] (2).
|
|
3.
|
UNIX system security : a guide for users and system administrators
by Curry, David A. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Massachusetts: Addison-Wesley, 1992Availability: Items available for loan: [Call number: 005.43 CUR] (1).
|
|
4.
|
Modeling and analysis of security protocols
by Ryan, Peter | Goldsmith, Michael | Lowe, Gavin | Schneider, Steve. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Harlow: Addison-Wesley, 2001Availability: Items available for loan: [Call number: 005.8 RYA] (1).
|
|
5.
|
Secure architectures with openBSD
by Nazario, Jose | Palmer, Brandon. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Addison-Wesley, 2004Availability: Items available for loan: [Call number: 005.432 PAL] (1).
|
|
6.
|
Defend I.T. : security by example
by Gupta, Ajay | Laliberte, Scott. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Addison-Wesley, 2004Availability: Items available for loan: [Call number: 005.8 GUP] (1).
|
|
7.
|
High-tech crimes revealed : cyberwar stories from the digital front
by Branigan, Steven. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Addison-Wesley, 2005Availability: Items available for loan: [Call number: 005.8 BRA] (1).
|
|
8.
|
Troubleshooting Linux firewalls.
by Shinn, Mike | Shinn, Michael | Shinn, Scott. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Jersey: Addison-Wesley, 2005Availability: Items available for loan: [Call number: 005.8 SHI] (1).
|
|
9.
|
.NET developer's guide to windows security
by Brown, Keith. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Addison-Wesley, 2004Availability: Items available for loan: [Call number: 005.8 BRO] (1).
|
|
10.
|
Introduction to computer security
by Bishop, Matt. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Addison-Wesley, 2004Availability: Items available for loan: [Call number: 005.8 BIS] (1).
|
|
11.
|
Rootkits : subverting the windows kernel
by Hoglund, Greg | Butler, James. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Jersey: Addison-Wesley, 2005Availability: Items available for loan: [Call number: 005.8 HOG] (1).
|
|
12.
|
Secure coding in C and C++
by Seacord, Robert C. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Jersey: Addison-Wesley, 2005Availability: Items available for loan: [Call number: 005.8 SEA] (1).
|
|
13.
|
Information Warfare and Security
by Denning, Dorothy E. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Harlow: Addison-Wesley, 1999Availability: Items available for loan: [Call number: 005.8 DEN] (1).
|
|
14.
|
CORBA Security
by Blakley, Bob. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Harlow: Addison-Wesley, 1999Availability: Items available for loan: [Call number: 005.8 BLA] (1).
|
|
15.
|
Programming Windows Security
by Brown, Keith. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Addison-Wesley, 2000Availability: Items available for loan: [Call number: 005.8 BRO] (1).
|
|
16.
|
Cryptography Decrypted
by Mel, H. X. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Addison-Wesley, 2001Availability: Items available for loan: [Call number: 005.82 MEL] (1).
|
|
17.
|
Web Security
by Stein, Lincoln D. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Addison-Wesley, 1997Availability: Items available for loan: [Call number: 005.8 STE] (1).
|
|
18.
|
Computer forensics: Incident response essentials
by Kruse, Warren G | Heiser, Jay G. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Addison-Wesley, 2002Availability: Items available for loan: [Call number: 005.8 KRU] (1).
|
|
19.
|
Effective incident response team
by Lucas, Julie | Moeller, Brain. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Addison-Wesley, 2004Availability: Items available for loan: [Call number: 005.8 LUC] (1).
|
|
20.
|
Executive guide to information security : threats, challenges, and solutions
by Egan, Mark | Mather, Tim. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Indianapolis: Addison-Wesley, 2005Availability: Items available for loan: [Call number: 005.8 EGA] (1).
|