181. NET security and cryptography

by Thorsteinson, Peter | Ganesh, G. Gnana Arun.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Delhi Pearson Education 2004Availability: Items available for loan: [Call number: 005.8 THO] (1).
182. Computer security fundamentals

by Easttom, Chuck.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Upper Saddle River: Prentice Hall of India, 2005Availability: Items available for loan: [Call number: 005.8 EAS] (1).
183. Security in distributed computing : did you lock the door?

by Dempsey, Rob.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Jersey: Pearson Education, 1997Availability: Items available for loan: [Call number: 005.8 BRU] (1).
184. Linux Patch Management : keeping Linux systems up to date

by Jang, Michael H.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Upper Saddle River: Prentice Hall, 2006Availability: Items available for loan: [Call number: 005.432 JAN] (1).
185. Practical guide to trusted computing

by Challener, David.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Upper Saddle River: IBM Press, 2008Availability: Items available for loan: [Call number: 005.8 CHA] (1).
186. Analyzing computer security : a threat/vulnerability/countermeasure approach

by Pfleeger, Charles P | Pfleeger, Shari Lawrence.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Upper Saddle River: Prentice Hall, 2012Availability: Items available for loan: [Call number: 005.8 PFL] (1).
187. Computer security : principles and practice

by Stallings, Willam.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Jersey: Prentice Hall, 2007Availability: Items available for loan: [Call number: 005.8 STA] (1).
188. Cryptography and network security : principles and practice

by Stallings, William.

Edition: 5th ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Upper Saddle River: Prentice Hall, 2011Availability: Items available for loan: [Call number: 005.82 STA] (1).
189. Network security essentials : applications and standards

by Stallings, William.

Edition: 4th ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Prentice Hall, 2010Availability: Items available for loan: [Call number: 005.8 STA] (1).
190. VMware vSphere and virtual infrastructure security : securing the virtual environment

by Haletky, Edward L.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Upper Saddle River: Prentice Hall, 2009Availability: Items available for loan: [Call number: 005.8 HAL] (1).
191. Art of deception : controlling the human element of security

by Simon, William L.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Indianapolis: Wiley Publishing, 2002Availability: Items available for loan: [Call number: 005.8 MIT] (1).
192. Cybersecurity and cyberwar : what everyone needs to know

by Singer, P. W | Friedman, Allan.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Oxford University Press, 2014Availability: Items available for loan: [Call number: 005.8 SIN] (1).
193. CORBA Security

by Blakley, Bob.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Harlow: Addison-Wesley, 1999Availability: Items available for loan: [Call number: 005.8 BLA] (1).
194. Programming Windows Security

by Brown, Keith.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Addison-Wesley, 2000Availability: Items available for loan: [Call number: 005.8 BRO] (1).
195. Cryptography Decrypted

by Mel, H. X.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Addison-Wesley, 2001Availability: Items available for loan: [Call number: 005.82 MEL] (1).
196. Web Security

by Stein, Lincoln D.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Addison-Wesley, 1997Availability: Items available for loan: [Call number: 005.8 STE] (1).
197. Computer forensics: Incident response essentials

by Kruse, Warren G | Heiser, Jay G.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Addison-Wesley, 2002Availability: Items available for loan: [Call number: 005.8 KRU] (1).
198. Effective incident response team

by Lucas, Julie | Moeller, Brain.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Addison-Wesley, 2004Availability: Items available for loan: [Call number: 005.8 LUC] (1).
199. Exploiting software : how to break code

by Gary, McGraw | McGraw, Gary.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Pearson Higher Education, 2004Availability: Items available for loan: [Call number: 005.8 HOG] (1).
200. Rethinking public key infrastructures and digital certificates: Building in privacy

by Brands, Stefan A.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Cambridge: The MIT Press, 2000Availability: Items available for loan: [Call number: 005.8 BRA] (2).

Powered by Koha