81. Computer and information security handbook

by Vacca, John R.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Amsterdam: Morgan Kaufmann, 2013Availability: Items available for loan: [Call number: 005.8 VAC ] (1).
82. Secure electronic commerce : building the infrastructure for digital signatures and encryption

by Baum, Michael S.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Jersey: Prentice Hall, 2000Availability: Items available for loan: [Call number: 658.84 FOR] (1).
83. Counter hack reloaded : a step-by-step guide to computer attacks and effective defenses

by Skoudis, Ed | Liston, Tom.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Upper Saddle River: Prentice Hall, 2006Availability: Items available for loan: [Call number: 005.8 SKO] (1).
84. Computer security fundamentals

by Easttom, Chuck.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Upper Saddle River: Prentice Hall of India, 2005Availability: Items available for loan: [Call number: 005.8 EAS] (1).
85. SELinux by example : understanding security enhanced Linux

by Mayer, Frank | Caplan, David | MacMillan, Karl.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Upper Saddle River: Prentice Hall, 2007Availability: Items available for loan: [Call number: 005.8 MAY] (1).
86. Exploiting online games : cheating massively distributed systems

by Hoglund, Greg | McGraw, Gary.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Upper Saddle River: Addison-Wesley, 2008Availability: Items available for loan: [Call number: 005.8 HOG] (1).
87. Cryptography and network security : principles and practice

by Stallings, William.

Edition: 5th ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Upper Saddle River: Prentice Hall, 2011Availability: Items available for loan: [Call number: 005.82 STA] (1).
88. Network security essentials : applications and standards

by Stallings, William.

Edition: 4th ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Prentice Hall, 2010Availability: Items available for loan: [Call number: 005.8 STA] (1).
89. Cybersecurity and cyberwar : what everyone needs to know

by Singer, P. W | Friedman, Allan.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Oxford University Press, 2014Availability: Items available for loan: [Call number: 005.8 SIN] (1).
90. SSL and TLS : designing and building secure systems

by Rescorla, Eric.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Addison-Wesley, 2000Availability: Items available for loan: [Call number: 005.8 RES] (1).
91. Essential Check Point FireWall-1 : an installation, configuration, and troubleshooting guide

by Welch-Abernathy, Dameon | Welch-Abernathy, Dameon D.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston Addison-Wesley 2002Availability: Items available for loan: [Call number: 005.8 WEL] (1).
92. Computer forensics: Incident response essentials

by Kruse, Warren G | Heiser, Jay G.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Addison-Wesley, 2002Availability: Items available for loan: [Call number: 005.8 KRU] (1).
93. Rethinking public key infrastructures and digital certificates: Building in privacy

by Brands, Stefan A.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Cambridge: The MIT Press, 2000Availability: Items available for loan: [Call number: 005.8 BRA] (2).
94. Protocol : how control exists after decentralization

by Galloway, Alexander R.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Cambridge: MIT Press, 2004Availability: Items available for loan: [Call number: 005.8 GAL] (1).
95. Trust and risk in Internet commerce

by Camp, L. Jean.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Cambridge: The MIT Press, 2001Availability: Items available for loan: [Call number: 005.8 CAM] (1).
96. Executive guide to information security : threats, challenges, and solutions

by Egan, Mark | Mather, Tim.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Indianapolis: Addison-Wesley, 2005Availability: Items available for loan: [Call number: 005.8 EGA] (1).
97. Art of software security testing : identifying software security flaws

by Wysopal, Chris.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Upper Saddle River: Addison-Wesley, 2007Availability: Items available for loan: [Call number: 005.8 WYS] (1).
98. How to break Web software : functional and security testing of Web applications and Web services

by Andrews, Mike | Whittaker, James A.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Upper Saddle River: Addison-Wesley, 2006Availability: Items available for loan: [Call number: 005.14 AND] (2).
99. Craft of system security

by Smith, Sean | Marchesini, John.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Jersey: Addison-Wesley, 2008Availability: Items available for loan: [Call number: 005.8 SMI] (1).
100. Fuzzing : brute force vulnerabilty discovery

by Sutton, Michael | Amini, Pedram | Greene, Adam.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Jersey: Addison-Wesley, 2007Availability: Items available for loan: [Call number: 005.8 SUT] (1).

Powered by Koha