161. Building VPNs with IPSec and MPLS

by Tan, Nam-Kee.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: McGraw-Hill, 2003Availability: Items available for loan: [Call number: 005.8 TAN] (1).
162. Defending your digital assets: againts hackers, crackers, spies and theieves

by Nichols, Randall K | Ryan, Daniel J | Ryan, Julie C. H.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: McGraw-Hill, 2000Availability: Items available for loan: [Call number: 005.8 NIC] (1).
163. Digital signatures

by Atreya, Mohan.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: McGraw-Hill, 2002Availability: Items available for loan: [Call number: 005.82 ATR] (1).
164. Intrusion detection & prevention

by Endorf, Carl | Mellander, Jim | Schultz, Eugene.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: California: McGraw-Hill/Osborne, 2004Availability: Items available for loan: [Call number: 005.8 END] (1).
165. Effective Oracle Database 10g security by design

by Knox, David.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Tata McGraw-Hill, 2004Availability: Items available for loan: [Call number: 005.8 KNO] (1).
166. Hardening windows systems : bulletproof your systems before you are hacked

by Bragg, Roberta.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Tata McGraw-Hill, 2004Availability: Items available for loan: [Call number: 005.8 BRA] (1).
167. Computer security lab manual

by Nestler, Vincent J.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: McGraw-Hill, 2005Availability: Items available for loan: [Call number: 005.8 NES] (1).
168. Gray hat hacking : the ethical hacker's handbook

by Harris, Shon.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York McGraw-Hill 2005Availability: Items available for loan: [Call number: 005.8 HAR] (1).
169. Hacking exposed : network security secrets and solutions

by McClure, Stuart.

Edition: 5th ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York McGraw-Hill 2005Availability: Items available for loan: [Call number: 005.8 MCC] (1).
170. Nineteen deadly sins of software security : programming flaws and how to fix them

by Howard, Michael | LeBlanc, David | Viega, John.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: McGraw-Hill/Osborne, 2005Availability: Items available for loan: [Call number: 005.8 HOW] (1).
171. Computer security : 20 things every employee should know

by Rothke, Ben.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: McGraw-Hill, 2005Availability: Items available for loan: [Call number: 005.8 ROT] (1).
172. Multimedia security technologies for digital rights management

by Zeng, Wenjun | Lin, Ching-Yung | Yu, Hong Heather.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Amsterdam: Academic Press, 2006Availability: Items available for loan: [Call number: 005.8 ZEN] (1).
173. Digital watermarking and steganography

by Cox, Ingemar J.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Amsterdam: Morgan Kaufmann, 2008Availability: Items available for loan: [Call number: 005.8 COX] (1).
174. Information assurance : dependability and security in networked systems

by Qian, Yi.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Amsterdam: Elsevier, 2008Availability: Items available for loan: [Call number: 005.8 QIA] (1).
175. System assurance : beyond detecting vulnerabilities

by Mansourov, Nikolai | Campara, Djenana.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Amsterdam: Morgan Kaufmann, 2011Availability: Items available for loan: [Call number: 005.8 MAN] (1).
176. Cyber attacks : protecting national infrastructure

by Amoroso, Edward G.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Burlington: Butterworth-Heinemann, 2011Availability: Items available for loan: [Call number: 363.32590046780973 AMO] (1).
177. Practical intrusion detection handbook

by Proctor, Paul E.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Jersey: Prentice Hall, 2001Availability: Items available for loan: [Call number: 005.8 PRO] (1).
178. Secure electronic commerce : building the infrastructure for digital signatures and encryption

by Baum, Michael S.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Jersey: Prentice Hall, 2000Availability: Items available for loan: [Call number: 658.84 FOR] (1).
179. Modern cryptography: Theory and practice

by Mao, Wenbo.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Jersey: Pearson Education, 2004Availability: Items available for loan: [Call number: 005.8 MAO] (1).
180. Applied algebra: Codes, ciphers and discrete algorithms

by Hardy, Darel W | Walker, Carol L.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Jersey: Pearson Education, 2003Availability: Items available for loan: [Call number: 003.54 HAR] (2).

Powered by Koha