1. Internet besieged : countering cyberspace scofflaws

by Denning, Dorothy E | Denning, Peter J.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Addison-Wesley, 1998Availability: Items available for loan: [Call number: 364.168 DEN] (1).
2. Process of network security : designing and managing a safe network

by Wadlow, Thomas A.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Massachusetts: Addison-Wesley, 2000Availability: Items available for loan: [Call number: 005.8 WAD] (1).
3. Defend I.T. : security by example

by Gupta, Ajay | Laliberte, Scott.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Addison-Wesley, 2004Availability: Items available for loan: [Call number: 005.8 GUP] (1).
4. Wi-Foo : the secrets of wireless hacking

by Vladimirov, Andrew A | Gavrilenko, Konstantin V | Mikhailovsky, Andrei A.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Addison-Wesley, 2004Availability: Items available for loan: [Call number: 005.8 VLA] (1).
5. High-tech crimes revealed : cyberwar stories from the digital front

by Branigan, Steven.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Addison-Wesley, 2005Availability: Items available for loan: [Call number: 005.8 BRA] (1).
6. Extrusion detection : security monitoring for internal intrusions

by Bejtlich, Richard.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Upper Saddle River: Addison-Wesley, 2006Availability: Items available for loan: [Call number: 005.8 BEJ] (1).
7. Exploiting online games : cheating massively distributed systems

by Hoglund, Greg | McGraw, Gary.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Upper Saddle River: Addison-Wesley, 2008Availability: Items available for loan: [Call number: 005.8 HOG] (1).
8. SSL and TLS : designing and building secure systems

by Rescorla, Eric.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Addison-Wesley, 2000Availability: Items available for loan: [Call number: 005.8 RES] (1).
9. Essential Check Point FireWall-1 : an installation, configuration, and troubleshooting guide

by Welch-Abernathy, Dameon | Welch-Abernathy, Dameon D.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston Addison-Wesley 2002Availability: Items available for loan: [Call number: 005.8 WEL] (1).
10. Computer forensics: Incident response essentials

by Kruse, Warren G | Heiser, Jay G.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Addison-Wesley, 2002Availability: Items available for loan: [Call number: 005.8 KRU] (1).
11. Executive guide to information security : threats, challenges, and solutions

by Egan, Mark | Mather, Tim.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Indianapolis: Addison-Wesley, 2005Availability: Items available for loan: [Call number: 005.8 EGA] (1).
12. Art of software security testing : identifying software security flaws

by Wysopal, Chris.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Upper Saddle River: Addison-Wesley, 2007Availability: Items available for loan: [Call number: 005.8 WYS] (1).
13. How to break Web software : functional and security testing of Web applications and Web services

by Andrews, Mike | Whittaker, James A.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Upper Saddle River: Addison-Wesley, 2006Availability: Items available for loan: [Call number: 005.14 AND] (2).
14. Craft of system security

by Smith, Sean | Marchesini, John.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Jersey: Addison-Wesley, 2008Availability: Items available for loan: [Call number: 005.8 SMI] (1).
15. Fuzzing : brute force vulnerabilty discovery

by Sutton, Michael | Amini, Pedram | Greene, Adam.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Jersey: Addison-Wesley, 2007Availability: Items available for loan: [Call number: 005.8 SUT] (1).
16. Chained exploits : advanced hacking attacks from start to finish

by Whitaker, Andrew | Evans, Keatron | Voth, Jack B.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Upper Saddle River: Addison-Wesley, 2009Availability: Items available for loan: [Call number: 005.8 WHI] (1).
17. Understanding PKI: Concepts, standards and deployment considerations

by Adams, Carlisle | Lloyd, Steve.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Addison-Wesley, 2003Availability: Items available for loan: [Call number: 005.8 ADA] (1).
18. CERT guide to system and network security practices

by Allen, Julia H.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Addison-Wesley, 2001Availability: Items available for loan: [Call number: 005.8 ALL] (1).
19. Process of network security: Designing and managing a safe network

by Wadlow, Thomas A.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Addison-Wesley, 2000Availability: Items available for loan: [Call number: 005.8 WAD] (1).

Powered by Koha