|
1.
|
Java 2 network security
by Pistoia, Marco. Edition: 2nd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Upper Saddle River: Prentice Hall, 1999Availability: Items available for loan: [Call number: 005.8 PIS] (1).
|
|
2.
|
Security in computing
by Pfleeger, Charles P | Pfleeger, Shari Lawrence. Edition: 3rd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Jersey: Prentice Hall, 2003Availability: Items available for loan: [Call number: 005.8 PFL] (2).
|
|
3.
|
Malware : fighting malicious code
by Skoudis, Ed | Zeltser, Lenny. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Jersey: Prentice Hall, 2004Availability: Items available for loan: [Call number: 005.8 SKO] (1).
|
|
4.
|
Core security patterns : best practices and strategies for J2EE, web services and identity management
by Steel, Christopher | Lai, Ray | Nagappan, Ramesh. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Jersey: Prentice Hall, 2005Availability: Items available for loan: [Call number: 005.8 STE] (1).
|
|
5.
|
Firewalls and VPNs : principles and practices
by Tibbs, Richard | Oakes, Edward. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Jersey: Prentice Hall, 2005Availability: Items available for loan: [Call number: 005.8 TIB] (1).
|
|
6.
|
Security in computing
by Pfleeger, Charles P. Edition: 2nd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Jersey: Prentice Hall, 1997Availability: Items available for loan: [Call number: 005.8 PFL] (1).
|
|
7.
|
Peter Norton's network security fundamentals
by Norton, Peter | Stockman, Mike. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Prentice Hall, 2000Availability: Items available for loan: [Call number: 005.8 NOR] (1).
|
|
8.
|
Microsoft internet security and acceleration (ISA) server 2000 administrator's pocket consultant
by Ballard, Jason | Ratliff, Bud. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Prentice Hall of India, 2003Availability: Items available for loan: [Call number: 005.8 BAL] (1).
|
|
9.
|
Microsoft encyclopedia of security
by Tulloch, Mitch. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Prentice Hall of India, 2004Availability: Items available for loan: [Call number: 005.803 TUL] (1).
|
|
10.
|
Digital signature : network security practices
by Gupta, Kailash N | Agarwala, Kamlesh N | Agarwala, Prateek A. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Prentice Hall of India, 2005Availability: Items available for loan: [Call number: 005.8 GUP] (1).
|
|
11.
|
Disaster recovery handbook : a step-by-step plan to ensure business continuity and protect vital operations, facilities, and assets
by Wallace, Michael | Webber, Lawrence. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Prentice Hall of India, 2007Availability: Items available for loan: [Call number: 658.477 WAL] (2).
|
|
12.
|
Cryptography and network security : principles and practices
by Stallings, William. Edition: 4th ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Prentice Hall, 2006Availability: Items available for loan: [Call number: 005.8 STA] (1).
|
|
13.
|
Practical intrusion detection handbook
by Proctor, Paul E. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Jersey: Prentice Hall, 2001Availability: Items available for loan: [Call number: 005.8 PRO] (1).
|
|
14.
|
Secure electronic commerce : building the infrastructure for digital signatures and encryption
by Baum, Michael S. Edition: 2nd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Jersey: Prentice Hall, 2000Availability: Items available for loan: [Call number: 658.84 FOR] (1).
|
|
15.
|
Computer security fundamentals
by Easttom, Chuck. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Upper Saddle River: Prentice Hall of India, 2005Availability: Items available for loan: [Call number: 005.8 EAS] (1).
|
|
16.
|
Linux Patch Management : keeping Linux systems up to date
by Jang, Michael H. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Upper Saddle River: Prentice Hall, 2006Availability: Items available for loan: [Call number: 005.432 JAN] (1).
|
|
17.
|
Analyzing computer security : a threat/vulnerability/countermeasure approach
by Pfleeger, Charles P | Pfleeger, Shari Lawrence. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Upper Saddle River: Prentice Hall, 2012Availability: Items available for loan: [Call number: 005.8 PFL] (1).
|
|
18.
|
Computer security : principles and practice
by Stallings, Willam. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Jersey: Prentice Hall, 2007Availability: Items available for loan: [Call number: 005.8 STA] (1).
|
|
19.
|
Cryptography and network security : principles and practice
by Stallings, William. Edition: 5th ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Upper Saddle River: Prentice Hall, 2011Availability: Items available for loan: [Call number: 005.82 STA] (1).
|
|
20.
|
Network security essentials : applications and standards
by Stallings, William. Edition: 4th ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Prentice Hall, 2010Availability: Items available for loan: [Call number: 005.8 STA] (1).
|