1. Internet besieged : countering cyberspace scofflaws

by Denning, Dorothy E | Denning, Peter J.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Addison-Wesley, 1998Availability: Items available for loan: [Call number: 364.168 DEN] (1).
2. Digital certificates : applied internet security

by Feghhi, Jalala | Feghhi, Jalil | Williams, Peter.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Reading: Addison-Wesley, 1999Availability: Items available for loan: [Call number: 005.8 FEG] (2).
3. UNIX system security : a guide for users and system administrators

by Curry, David A.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Massachusetts: Addison-Wesley, 1992Availability: Items available for loan: [Call number: 005.43 CUR] (1).
4. Modeling and analysis of security protocols

by Ryan, Peter | Goldsmith, Michael | Lowe, Gavin | Schneider, Steve.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Harlow: Addison-Wesley, 2001Availability: Items available for loan: [Call number: 005.8 RYA] (1).
5. Secure architectures with openBSD

by Nazario, Jose | Palmer, Brandon.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Addison-Wesley, 2004Availability: Items available for loan: [Call number: 005.432 PAL] (1).
6. Defend I.T. : security by example

by Gupta, Ajay | Laliberte, Scott.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Addison-Wesley, 2004Availability: Items available for loan: [Call number: 005.8 GUP] (1).
7. High-tech crimes revealed : cyberwar stories from the digital front

by Branigan, Steven.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Addison-Wesley, 2005Availability: Items available for loan: [Call number: 005.8 BRA] (1).
8. Troubleshooting Linux firewalls.

by Shinn, Mike | Shinn, Michael | Shinn, Scott.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Jersey: Addison-Wesley, 2005Availability: Items available for loan: [Call number: 005.8 SHI] (1).
9. .NET developer's guide to windows security

by Brown, Keith.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Addison-Wesley, 2004Availability: Items available for loan: [Call number: 005.8 BRO] (1).
10. Introduction to computer security

by Bishop, Matt.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Addison-Wesley, 2004Availability: Items available for loan: [Call number: 005.8 BIS] (1).
11. Rootkits : subverting the windows kernel

by Hoglund, Greg | Butler, James.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Jersey: Addison-Wesley, 2005Availability: Items available for loan: [Call number: 005.8 HOG] (1).
12. Secure coding in C and C++

by Seacord, Robert C.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Jersey: Addison-Wesley, 2005Availability: Items available for loan: [Call number: 005.8 SEA] (1).
13. Information Warfare and Security

by Denning, Dorothy E.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Harlow: Addison-Wesley, 1999Availability: Items available for loan: [Call number: 005.8 DEN] (1).
14. CORBA Security

by Blakley, Bob.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Harlow: Addison-Wesley, 1999Availability: Items available for loan: [Call number: 005.8 BLA] (1).
15. Programming Windows Security

by Brown, Keith.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Addison-Wesley, 2000Availability: Items available for loan: [Call number: 005.8 BRO] (1).
16. Cryptography Decrypted

by Mel, H. X.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Addison-Wesley, 2001Availability: Items available for loan: [Call number: 005.82 MEL] (1).
17. Web Security

by Stein, Lincoln D.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Addison-Wesley, 1997Availability: Items available for loan: [Call number: 005.8 STE] (1).
18. Computer forensics: Incident response essentials

by Kruse, Warren G | Heiser, Jay G.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Addison-Wesley, 2002Availability: Items available for loan: [Call number: 005.8 KRU] (1).
19. Effective incident response team

by Lucas, Julie | Moeller, Brain.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Addison-Wesley, 2004Availability: Items available for loan: [Call number: 005.8 LUC] (1).
20. Executive guide to information security : threats, challenges, and solutions

by Egan, Mark | Mather, Tim.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Indianapolis: Addison-Wesley, 2005Availability: Items available for loan: [Call number: 005.8 EGA] (1).

Powered by Koha