1. Internet besieged : countering cyberspace scofflaws

by Denning, Dorothy E | Denning, Peter J.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Addison-Wesley, 1998Availability: Items available for loan: [Call number: 364.168 DEN] (1).
2. Digital certificates : applied internet security

by Feghhi, Jalala | Feghhi, Jalil | Williams, Peter.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Reading: Addison-Wesley, 1999Availability: Items available for loan: [Call number: 005.8 FEG] (2).
3. Hop integrity in the Internet

by Huang, Chin-Tser | Gouda, Mohamed G.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2005Availability: Items available for loan: [Call number: 005.8 HUA] (1).
4. PC pest control : protect your computers from malicious internet invaders.

by Gralla, Preston.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Sebastopol: O'Reilly, 2005Availability: Items available for loan: [Call number: 005.8 GRA] (1).
5. Internet site security

by Schetina, Erik | Carlson, Jacob | Greene, Ken.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Indianapolis: Pearson Education, 2002Availability: Items available for loan: [Call number: 005.8 SCH] (1).
6. Security Protocols : 8th International Workshops Cambridge, UK, April 3-5, 2000 revised papers

by Christianson, Bruce.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer-Verlag, 2001Availability: Items available for loan: [Call number: 004 CHR] (1).
7. State of the art in applied cryptography : course on computer security and industrial cryptography leuven, Belgium, June 3-6, 1997

by Preneel, Bart | Preneel, Bart | Rijmen, Vincent | Rijmen, Vincent.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer-Verlag, 1998Availability: Items available for loan: [Call number: 004 PRE] (1).
8. Microsoft internet security and acceleration (ISA) server 2000 administrator's pocket consultant

by Ballard, Jason | Ratliff, Bud.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Prentice Hall of India, 2003Availability: Items available for loan: [Call number: 005.8 BAL] (1).
9. Firewalls and Internet security : repelling the wily hacker

by Cheswick, William R | Bellovin, Steven M | Rubin, Aviel D.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Pearson Education, 2006Availability: Items available for loan: [Call number: 005.8 CHE] (1).
10. Network security hacks : hundred industrial strength tips and tools

by Lockhart, Andrew.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Mumbai: SPD, 2004Availability: Items available for loan: [Call number: 005.8 LOC] (1).
11. Network intrusion detection

by Northcutt, Stephen | Novak, Judy.

Edition: 3rd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Delhi: Pearson Education, 2003Availability: Items available for loan: [Call number: 005.82 NOR] (1).
12. Intrusion detection & prevention

by Endorf, Carl | Mellander, Jim | Schultz, Eugene.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: California: McGraw-Hill/Osborne, 2004Availability: Items available for loan: [Call number: 005.8 END] (1).
13. Executive guide to information security : threats, challenges, and solutions

by Egan, Mark | Mather, Tim.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Indianapolis: Addison-Wesley, 2005Availability: Items available for loan: [Call number: 005.8 EGA] (1).
14. Crimeware : understanding new attacks and defenses

by Jakobsson, Markus | Ramzan, Zulfikar.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Addison-Wesley, 2008Availability: Items available for loan: [Call number: 005.8 JAK] (1).
15. Practical Internet security

by Vacca, John R.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2007Availability: Items available for loan: [Call number: 005.8 VAC] (1).
16. Web application hacker?s handbook : discovering and exploiting security flaws

by Stuttard, Dafydd.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Indianapolis: Wiley, 2008Availability: Items available for loan: [Call number: 005.8 STU] (1).
17. Cryptography and public key infrastructure on the internet

by Schmeh, Klaus.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Chichester: John Wiley & Sons, 2001Availability: Items available for loan: [Call number: 005.82 SCH] (1).
18. Internet security : hacking, counterhacking, and society

by Himma, Kenneth Einar.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Massachusetts: Jones & Bartlett, 2007Availability: Items available for loan: [Call number: 005.8 HIM] (1).
19. Unauthorized access : the crisis in online privacy and security

by Sloan, Robert H.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton: CRC Press, 2014Availability: Items available for loan: [Call number: 323.4302854678 SLO] (1).
20. What every librarian should know about electronic privacy

by Woodward, Jeannette.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Westport: Libraries Unlimited, 2007Availability: Items available for loan: [Call number: 025.50285 WOO] (1).

Powered by Koha