1. Digital certificates : applied internet security

by Feghhi, Jalala | Feghhi, Jalil | Williams, Peter.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Reading: Addison-Wesley, 1999Availability: Items available for loan: [Call number: 005.8 FEG] (2).
2. Know your enemy : learning about security threats

by Honeynet project.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Pearson Education, 2004Availability: Items available for loan: [Call number: 005.8 HON] (2).
3. Inside network security assessment : guarding your IT infrastructure

by Gregg, Michael | Kim, David.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Pearson Education, 2005Availability: Items available for loan: [Call number: 005.8 GRE] (2).
4. Information security intelligence : cryptographic principles and applications

by Calabrese, Thomas.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Australia: Thomson, 2004Availability: Items available for loan: [Call number: 005.8 CAL] (2).
5. Computer forensics : computer crime scene investigation

by Vacca, John.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Massachusetts: Charles River Media, 2002Availability: Items available for loan: [Call number: 363.25968 VAC] (2).
6. Software vulnerability guide

by Thompson, Herbert H | Chase, Scott G.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Hingham: Charles River Media, 2005Availability: Items available for loan: [Call number: 005.8 THO] (2).
7. CISSP Certification exam study guide

by Harris, Shon.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Dreamtech Press, 2004Availability: Items available for loan: [Call number: 005.805 HAR] (10).
8. How to break Web software : functional and security testing of Web applications and Web services

by Andrews, Mike | Whittaker, James A.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Upper Saddle River: Addison-Wesley, 2006Availability: Items available for loan: [Call number: 005.14 AND] (2).
9. Hiding in plain sight : steganography and the art of covert communication

by Cole, Eric.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Indianapolis: John Wiley & Sons, 2003Availability: Items available for loan: [Call number: 005.8 COL] (2).
10. Web security for network and system administrators

by Mackey, David.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Course Technology, 2003Availability: Items available for loan: [Call number: 005.8 MAC] (4).
11. Lab manual for Security+ guide to network security fundamentals

by Cretaro, Paul.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Thomson Course Technology, 2005Availability: Items available for loan: [Call number: 005.8 CRE] (2).
12. Microsoft windows security resource kit

by Smith, Ben | Komar, Brian | Smith, Ben.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Redmond: Microsoft Press, 2005Availability: Items available for loan: [Call number: 005.8 SMI] (2).
13. Introduction to network security

by Krawetz, Neal.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Charles River Media, 2006Availability: Items available for loan: [Call number: 005.8 KRA] (2).
14. Information systems security : security management, metrics, frameworks and best practices

by Godbole, Nina S.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Wiley India, 2009Availability: Items available for loan: [Call number: 005.8 GOD] (9).
15. Protecting your PC

by Barile, Ian.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Charles River Media, 2007Availability: Items available for loan: [Call number: 005.8 BAR] (2).
16. Code hacking : a developer's guide to network security

by Cordingley, Julian.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Mumbai: Shroff Publishers, 2004Availability: Items available for loan: [Call number: 005.8 CON] (2).
17. Hacking Web services

by Shah, Shreeraj.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Charles River Media, 2007Availability: Items available for loan: [Call number: 005.8 SHA] (2).

Powered by Koha