81. Lab manual for Security+ guide to network security fundamentals

by Cretaro, Paul.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Thomson Course Technology, 2005Availability: Items available for loan: [Call number: 005.8 CRE] (2).
82. Understanding PKI: Concepts, standards and deployment considerations

by Adams, Carlisle | Lloyd, Steve.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Addison-Wesley, 2003Availability: Items available for loan: [Call number: 005.8 ADA] (1).
83. Microsoft windows security resource kit

by Smith, Ben | Komar, Brian | Smith, Ben.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Redmond: Microsoft Press, 2005Availability: Items available for loan: [Call number: 005.8 SMI] (2).
84. Information security : contemporary cases

by Wright, Marie A.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Massachusetts: Jones & Bartlett, 2007Availability: Items available for loan: [Call number: 005.8 WRI] (1).
85. Computer security : protecting digital resources

by Newman, Robert C.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Sudbury: Jones & Bartlett, 2010Availability: Items available for loan: [Call number: 005.8 NEW] (1).
86. Trusted computing

by Mitchell, Chris.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: London: Institution of Electrical Engineers, 2005Availability: Items available for loan: [Call number: 005.8 MIT] (1).
87. Cyberspace security and defence : research issues

by Kowalik, Janusz S | Gorski, Janusz | Sachenko, Anatoly.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Dordrecht: Springer, 2005Availability: Items available for loan: [Call number: 005.8 KOW] (1).
88. Ethical hacking guide to corporate security

by Fadia, Ankit.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Delhi: MacMillan India, 2004Availability: Items available for loan: [Call number: 005.8 FAD] (1).
89. Mechanics of user identification and authentication : fundamentals of identity management

by Todorov, Dobromir.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton: Auerbach Publications, 2007Availability: Items available for loan: [Call number: 005.8 TOD] (1).
90. Multidiciplinary introduction to information security

by Mjolsnes, Stig F.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton: CRC Press, 2012Availability: Items available for loan: [Call number: 005.8 MJO] (1).
91. Architecting secure software systems

by Talukder, Asoke K | Chaitanya, Manish.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton: CRC Press, 2009Availability: Items available for loan: [Call number: 005.8 TAL] (1).
92. Security and policy priven computing

by Liu, Lei.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton: CRC Press, 2011Availability: Items available for loan: [Call number: 005.8 LIU] (1).
93. Insider threats in cyber security

by Probst, Christian W.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2010Availability: Items available for loan: [Call number: 005.8 PRO] (1).
94. Intrusion detection networks : a key to collaborative security

by Fung, Carol | Boutaba, Raouf.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton: CRC Press, 2014Availability: Items available for loan: [Call number: 005.8 FUN] (1).
95. Essential cybersecurity science : build, test, and evaluate secure systems

by Dykstra, Josiah.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Sebastopol: O'Reilly Media, 2016Availability: Items available for loan: [Call number: 005.8 DYK] (1).
96. Security data visualization : graphical techniques for network analysis

by Conti, Greg.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: San Francisco: No Starch Press, 2007Availability: Items available for loan: [Call number: 005.8 CON] (1).
97. Role-Based Access Control

by Ferraiolo, David F | Chandramouli, Ramaswamy | Kuhn, D. Richard.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Artech House, 2007Availability: Items available for loan: [Call number: 005.8 FER] (1).
98. Next generation SSH2 implementation : securing data in motion

by Liu, Dale.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Burlington: Syngress Publishing, 2009Availability: Items available for loan: [Call number: 005.8 LIU] (1).
99. Securing the cloud : cloud computer security techniques and tactics

by Winkler, Vic.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Waltham: Syngress, 2011Availability: Items available for loan: [Call number: 005.8 WIN] (1).
100. Formal models and techniques for analyzing security protocols

by Cortier, Veronique | Kremer, Steve.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Amsterdam: IOS Press, 2011Availability: Items available for loan: [Call number: 005.82 COR] (1).

Powered by Koha