1. Digital certificates : applied internet security

by Feghhi, Jalala | Feghhi, Jalil | Williams, Peter.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Reading: Addison-Wesley, 1999Availability: Items available for loan: [Call number: 005.8 FEG] (2).
2. Know your enemy : learning about security threats

by Honeynet project.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Pearson Education, 2004Availability: Items available for loan: [Call number: 005.8 HON] (2).
3. Inside network security assessment : guarding your IT infrastructure

by Gregg, Michael | Kim, David.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Pearson Education, 2005Availability: Items available for loan: [Call number: 005.8 GRE] (2).
4. Information security intelligence : cryptographic principles and applications

by Calabrese, Thomas.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Australia: Thomson, 2004Availability: Items available for loan: [Call number: 005.8 CAL] (2).
5. Computer forensics : computer crime scene investigation

by Vacca, John.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Massachusetts: Charles River Media, 2002Availability: Items available for loan: [Call number: 363.25968 VAC] (2).
6. Software vulnerability guide

by Thompson, Herbert H | Chase, Scott G.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Hingham: Charles River Media, 2005Availability: Items available for loan: [Call number: 005.8 THO] (2).
7. Crackproof your software : protect your software against crackers

by Cerven, Pavol.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: San Francisco: No Starch Press, 2002Availability: Items available for loan: [Call number: 005.8 CER] (2).
8. Disaster recovery handbook : a step-by-step plan to ensure business continuity and protect vital operations, facilities, and assets

by Wallace, Michael | Webber, Lawrence.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Prentice Hall of India, 2007Availability: Items available for loan: [Call number: 658.477 WAL] (2).
9. Computer forensics : computer crime scence investigation

by Vacca, John.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Firewall Media, 2002Availability: Items available for loan: [Call number: 363.25968 VAC] (2).
10. MCSE/MCSA implementing and administering security in a Windows 2000 network

by Schmied, Will.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Navi Mumbai: Shroff Publishers, 2003Availability: Items available for loan: [Call number: 005.8 SCH] (2).
11. Cryptography in C and C++

by Welschenbach, Michael | Kramer, David.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Wiley-Dreamtech India, 2003Availability: Items available for loan: [Call number: 005.8 WEL] (2).
12. CISSP Certification exam study guide

by Harris, Shon.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Dreamtech Press, 2004Availability: Items available for loan: [Call number: 005.805 HAR] (10).
13. Principles of computer security : security+ and beyond

by White, Gregory B | Cothren, Chuck | Williams, Dwayne.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: McGraw-Hill, 2005Availability: Items available for loan: [Call number: 005.8 CON] (2).
14. Applied algebra: Codes, ciphers and discrete algorithms

by Hardy, Darel W | Walker, Carol L.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Jersey: Pearson Education, 2003Availability: Items available for loan: [Call number: 003.54 HAR] (2).
15. Software security : building security in

by McGraw, Gary.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Jersey: Addison-Wesley, 2006Availability: Items available for loan: [Call number: 005.8 MCG] (2).
16. Secure programming with static analysis

by Chess, Brian.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Jersey: Addison-Wesley, 2007Availability: Items available for loan: [Call number: 005.8 CHE] (2).
17. Hiding in plain sight : steganography and the art of covert communication

by Cole, Eric.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Indianapolis: John Wiley & Sons, 2003Availability: Items available for loan: [Call number: 005.8 COL] (2).
18. Lab manual for Security+ guide to network security fundamentals

by Cretaro, Paul.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Thomson Course Technology, 2005Availability: Items available for loan: [Call number: 005.8 CRE] (2).
19. Hands on ethical hacking and network defense

by Simpson, Michael T.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Australia: Thomson Course technology, 2006Availability: Items available for loan: [Call number: 005.8 SIM] (2).
20. Maximum security

by Anonymous.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Techmedia, 1998Availability: Items available for loan: [Call number: 005.8 ANO] (2).

Powered by Koha