|
1.
|
Internet besieged : countering cyberspace scofflaws
by Denning, Dorothy E | Denning, Peter J. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Addison-Wesley, 1998Availability: Items available for loan: [Call number: 364.168 DEN] (1).
|
|
2.
|
Digital certificates : applied internet security
by Feghhi, Jalala | Feghhi, Jalil | Williams, Peter. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Reading: Addison-Wesley, 1999Availability: Items available for loan: [Call number: 005.8 FEG] (2).
|
|
3.
|
Hop integrity in the Internet
by Huang, Chin-Tser | Gouda, Mohamed G. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2005Availability: Items available for loan: [Call number: 005.8 HUA] (1).
|
|
4.
|
PC pest control : protect your computers from malicious internet invaders.
by Gralla, Preston. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Sebastopol: O'Reilly, 2005Availability: Items available for loan: [Call number: 005.8 GRA] (1).
|
|
5.
|
Internet site security
by Schetina, Erik | Carlson, Jacob | Greene, Ken. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Indianapolis: Pearson Education, 2002Availability: Items available for loan: [Call number: 005.8 SCH] (1).
|
|
6.
|
Security Protocols : 8th International Workshops Cambridge, UK, April 3-5, 2000 revised papers
by Christianson, Bruce. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Berlin: Springer-Verlag, 2001Availability: Items available for loan: [Call number: 004 CHR] (1).
|
|
7.
|
State of the art in applied cryptography : course on computer security and industrial cryptography leuven, Belgium, June 3-6, 1997
by Preneel, Bart | Preneel, Bart | Rijmen, Vincent | Rijmen, Vincent. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Berlin: Springer-Verlag, 1998Availability: Items available for loan: [Call number: 004 PRE] (1).
|
|
8.
|
Microsoft internet security and acceleration (ISA) server 2000 administrator's pocket consultant
by Ballard, Jason | Ratliff, Bud. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Prentice Hall of India, 2003Availability: Items available for loan: [Call number: 005.8 BAL] (1).
|
|
9.
|
Firewalls and Internet security : repelling the wily hacker
by Cheswick, William R | Bellovin, Steven M | Rubin, Aviel D. Edition: 2nd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Pearson Education, 2006Availability: Items available for loan: [Call number: 005.8 CHE] (1).
|
|
10.
|
Network security hacks : hundred industrial strength tips and tools
by Lockhart, Andrew. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Mumbai: SPD, 2004Availability: Items available for loan: [Call number: 005.8 LOC] (1).
|
|
11.
|
Network intrusion detection
by Northcutt, Stephen | Novak, Judy. Edition: 3rd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Delhi: Pearson Education, 2003Availability: Items available for loan: [Call number: 005.82 NOR] (1).
|
|
12.
|
Intrusion detection & prevention
by Endorf, Carl | Mellander, Jim | Schultz, Eugene. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: California: McGraw-Hill/Osborne, 2004Availability: Items available for loan: [Call number: 005.8 END] (1).
|
|
13.
|
Executive guide to information security : threats, challenges, and solutions
by Egan, Mark | Mather, Tim. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Indianapolis: Addison-Wesley, 2005Availability: Items available for loan: [Call number: 005.8 EGA] (1).
|
|
14.
|
Crimeware : understanding new attacks and defenses
by Jakobsson, Markus | Ramzan, Zulfikar. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Addison-Wesley, 2008Availability: Items available for loan: [Call number: 005.8 JAK] (1).
|
|
15.
|
Practical Internet security
by Vacca, John R. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2007Availability: Items available for loan: [Call number: 005.8 VAC] (1).
|
|
16.
|
Web application hacker?s handbook : discovering and exploiting security flaws
by Stuttard, Dafydd. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Indianapolis: Wiley, 2008Availability: Items available for loan: [Call number: 005.8 STU] (1).
|
|
17.
|
Cryptography and public key infrastructure on the internet
by Schmeh, Klaus. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Chichester: John Wiley & Sons, 2001Availability: Items available for loan: [Call number: 005.82 SCH] (1).
|
|
18.
|
Internet security : hacking, counterhacking, and society
by Himma, Kenneth Einar. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Massachusetts: Jones & Bartlett, 2007Availability: Items available for loan: [Call number: 005.8 HIM] (1).
|
|
19.
|
Unauthorized access : the crisis in online privacy and security
by Sloan, Robert H. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton: CRC Press, 2014Availability: Items available for loan: [Call number: 323.4302854678 SLO] (1).
|
|
20.
|
What every librarian should know about electronic privacy
by Woodward, Jeannette. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Westport: Libraries Unlimited, 2007Availability: Items available for loan: [Call number: 025.50285 WOO] (1).
|