|
81.
|
Lab manual for Security+ guide to network security fundamentals
by Cretaro, Paul. Edition: 2nd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Thomson Course Technology, 2005Availability: Items available for loan: [Call number: 005.8 CRE] (2).
|
|
82.
|
Understanding PKI: Concepts, standards and deployment considerations
by Adams, Carlisle | Lloyd, Steve. Edition: 2nd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Addison-Wesley, 2003Availability: Items available for loan: [Call number: 005.8 ADA] (1).
|
|
83.
|
Microsoft windows security resource kit
by Smith, Ben | Komar, Brian | Smith, Ben. Edition: 2nd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Redmond: Microsoft Press, 2005Availability: Items available for loan: [Call number: 005.8 SMI] (2).
|
|
84.
|
Information security : contemporary cases
by Wright, Marie A. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Massachusetts: Jones & Bartlett, 2007Availability: Items available for loan: [Call number: 005.8 WRI] (1).
|
|
85.
|
Computer security : protecting digital resources
by Newman, Robert C. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Sudbury: Jones & Bartlett, 2010Availability: Items available for loan: [Call number: 005.8 NEW] (1).
|
|
86.
|
Trusted computing
by Mitchell, Chris. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: London: Institution of Electrical Engineers, 2005Availability: Items available for loan: [Call number: 005.8 MIT] (1).
|
|
87.
|
Cyberspace security and defence : research issues
by Kowalik, Janusz S | Gorski, Janusz | Sachenko, Anatoly. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Dordrecht: Springer, 2005Availability: Items available for loan: [Call number: 005.8 KOW] (1).
|
|
88.
|
Ethical hacking guide to corporate security
by Fadia, Ankit. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Delhi: MacMillan India, 2004Availability: Items available for loan: [Call number: 005.8 FAD] (1).
|
|
89.
|
Mechanics of user identification and authentication : fundamentals of identity management
by Todorov, Dobromir. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton: Auerbach Publications, 2007Availability: Items available for loan: [Call number: 005.8 TOD] (1).
|
|
90.
|
Multidiciplinary introduction to information security
by Mjolsnes, Stig F. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton: CRC Press, 2012Availability: Items available for loan: [Call number: 005.8 MJO] (1).
|
|
91.
|
Architecting secure software systems
by Talukder, Asoke K | Chaitanya, Manish. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton: CRC Press, 2009Availability: Items available for loan: [Call number: 005.8 TAL] (1).
|
|
92.
|
Security and policy priven computing
by Liu, Lei. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton: CRC Press, 2011Availability: Items available for loan: [Call number: 005.8 LIU] (1).
|
|
93.
|
Insider threats in cyber security
by Probst, Christian W. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2010Availability: Items available for loan: [Call number: 005.8 PRO] (1).
|
|
94.
|
Intrusion detection networks : a key to collaborative security
by Fung, Carol | Boutaba, Raouf. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton: CRC Press, 2014Availability: Items available for loan: [Call number: 005.8 FUN] (1).
|
|
95.
|
Essential cybersecurity science : build, test, and evaluate secure systems
by Dykstra, Josiah. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Sebastopol: O'Reilly Media, 2016Availability: Items available for loan: [Call number: 005.8 DYK] (1).
|
|
96.
|
Security data visualization : graphical techniques for network analysis
by Conti, Greg. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: San Francisco: No Starch Press, 2007Availability: Items available for loan: [Call number: 005.8 CON] (1).
|
|
97.
|
Role-Based Access Control
by Ferraiolo, David F | Chandramouli, Ramaswamy | Kuhn, D. Richard. Edition: 2nd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Artech House, 2007Availability: Items available for loan: [Call number: 005.8 FER] (1).
|
|
98.
|
Next generation SSH2 implementation : securing data in motion
by Liu, Dale. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Burlington: Syngress Publishing, 2009Availability: Items available for loan: [Call number: 005.8 LIU] (1).
|
|
99.
|
Securing the cloud : cloud computer security techniques and tactics
by Winkler, Vic. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Waltham: Syngress, 2011Availability: Items available for loan: [Call number: 005.8 WIN] (1).
|
|
100.
|
Formal models and techniques for analyzing security protocols
by Cortier, Veronique | Kremer, Steve. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Amsterdam: IOS Press, 2011Availability: Items available for loan: [Call number: 005.82 COR] (1).
|