1. Java 2 network security

by Pistoia, Marco.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Upper Saddle River: Prentice Hall, 1999Availability: Items available for loan: [Call number: 005.8 PIS] (1).
2. Malware : fighting malicious code

by Skoudis, Ed | Zeltser, Lenny.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Jersey: Prentice Hall, 2004Availability: Items available for loan: [Call number: 005.8 SKO] (1).
3. Firewalls and VPNs : principles and practices

by Tibbs, Richard | Oakes, Edward.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Jersey: Prentice Hall, 2005Availability: Items available for loan: [Call number: 005.8 TIB] (1).
4. Protecting critical infrastructures against cyber-attack

by Goodman, Seymour E | Longhurst,David W.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Oxford University Press, 2003Availability: Items available for loan: [Call number: 005.8 LUK] (1).
5. Internet besieged : countering cyberspace scofflaws

by Denning, Dorothy E | Denning, Peter J.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Addison-Wesley, 1998Availability: Items available for loan: [Call number: 364.168 DEN] (1).
6. Digital certificates : applied internet security

by Feghhi, Jalala | Feghhi, Jalil | Williams, Peter.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Reading: Addison-Wesley, 1999Availability: Items available for loan: [Call number: 005.8 FEG] (2).
7. Know your enemy : learning about security threats

by Honeynet project.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Pearson Education, 2004Availability: Items available for loan: [Call number: 005.8 HON] (2).
8. Defend I.T. : security by example

by Gupta, Ajay | Laliberte, Scott.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Addison-Wesley, 2004Availability: Items available for loan: [Call number: 005.8 GUP] (1).
9. High-tech crimes revealed : cyberwar stories from the digital front

by Branigan, Steven.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Addison-Wesley, 2005Availability: Items available for loan: [Call number: 005.8 BRA] (1).
10. Intrusion detection and correlation : challenges and solutions

by Kruegel, Christopher | Valeur, Fredrik | Vigna, Giovanni.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2005Availability: Items available for loan: [Call number: 005.8 KRU] (1).
11. Hop integrity in the Internet

by Huang, Chin-Tser | Gouda, Mohamed G.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2005Availability: Items available for loan: [Call number: 005.8 HUA] (1).
12. Understanding intrusion detection through visualization

by Axelsson, Stefan.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2005Availability: Items available for loan: [Call number: 005.8 AXE] (1).
13. Security in fixed and wireless networks : an introduction to securing data communications

by Schafer, Gunter.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Harlow: John Wiley & Sons, 2003Availability: Items available for loan: [Call number: 005.8 SCH] (1).
14. Building open source network security tools : components and techniques

by Schiffman, Mike D.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Indiana: Wiley Publishing, 2003Availability: Items available for loan: [Call number: 005.8 SCH] (1).
15. Computer security handbook

by Bosworth, Seymour | Kabay, M. E.

Edition: 4th ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: John Wiley & Sons, 2002Availability: Items available for loan: [Call number: 005.8 BOS] (1).
16. Cryptography, information theory, and error-correction : a handbook for the twenty first century

by Bruen, Aiden A | Forcinito, Mario A.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Jersey: John Wiley & Sons, 2005Availability: Items available for loan: [Call number: 005.8 BRU] (1).
17. PC pest control : protect your computers from malicious internet invaders.

by Gralla, Preston.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Sebastopol: O'Reilly, 2005Availability: Items available for loan: [Call number: 005.8 GRA] (1).
18. Peter Norton's network security fundamentals

by Norton, Peter | Stockman, Mike.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Prentice Hall, 2000Availability: Items available for loan: [Call number: 005.8 NOR] (1).
19. Internet site security

by Schetina, Erik | Carlson, Jacob | Greene, Ken.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Indianapolis: Pearson Education, 2002Availability: Items available for loan: [Call number: 005.8 SCH] (1).
20. Inside network security assessment : guarding your IT infrastructure

by Gregg, Michael | Kim, David.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Pearson Education, 2005Availability: Items available for loan: [Call number: 005.8 GRE] (2).

Powered by Koha