21. Art of software security testing : identifying software security flaws

by Wysopal, Chris.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Upper Saddle River: Addison-Wesley, 2007Availability: Items available for loan: [Call number: 005.8 WYS] (1).
22. Software security : building security in

by McGraw, Gary.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Jersey: Addison-Wesley, 2006Availability: Items available for loan: [Call number: 005.8 MCG] (2).
23. Secure programming with static analysis

by Chess, Brian.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Jersey: Addison-Wesley, 2007Availability: Items available for loan: [Call number: 005.8 CHE] (2).
24. Craft of system security

by Smith, Sean | Marchesini, John.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Jersey: Addison-Wesley, 2008Availability: Items available for loan: [Call number: 005.8 SMI] (1).
25. Fuzzing : brute force vulnerabilty discovery

by Sutton, Michael | Amini, Pedram | Greene, Adam.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Jersey: Addison-Wesley, 2007Availability: Items available for loan: [Call number: 005.8 SUT] (1).
26. Chained exploits : advanced hacking attacks from start to finish

by Whitaker, Andrew | Evans, Keatron | Voth, Jack B.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Upper Saddle River: Addison-Wesley, 2009Availability: Items available for loan: [Call number: 005.8 WHI] (1).
27. Crimeware : understanding new attacks and defenses

by Jakobsson, Markus | Ramzan, Zulfikar.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Addison-Wesley, 2008Availability: Items available for loan: [Call number: 005.8 JAK] (1).
28. New school of information security

by Shostack, Adam | Stewart, Andrew.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Upper Saddle River: Addison-Wesley, 2008Availability: Items available for loan: [Call number: 658.478 SHO] (1).
29. Surreptitious software : obfuscation, watermarking, and tamperproofing for software protection

by Collberg, Christian | Nagra, Jasvir.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Jersey: Addison-Wesley, 2010Availability: Items available for loan: [Call number: 005.8 COL] (1).
30. Understanding PKI: Concepts, standards and deployment considerations

by Adams, Carlisle | Lloyd, Steve.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Addison-Wesley, 2003Availability: Items available for loan: [Call number: 005.8 ADA] (1).
31. Forensic discovery

by Venema, Wietse | Farmer, Dan.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Addison-Wesley, 2004Availability: Items available for loan: [Call number: 005.8 FAR] (1).
32. Building secure software: How to avoid security problems the right way

by Viega, John | McGaw, Gary.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Addison-Wesley, 2001Availability: Items available for loan: [Call number: 005.1 VIE] (1).
33. CERT guide to system and network security practices

by Allen, Julia H.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Addison-Wesley, 2001Availability: Items available for loan: [Call number: 005.8 ALL] (1).
34. Cybersecurity myths and misconceptions : avoiding the hazards and pitfalls that derail us

by Spafford, Eugene H | Metcalf, Leigh | Dykstra, Josiah.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston : Addison Wesley, 2023Availability: Items available for loan: [Call number: 005.8 SPA] (1).

Powered by Koha