|
21.
|
Digital certificates : applied internet security
by Feghhi, Jalala | Feghhi, Jalil | Williams, Peter. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Reading: Addison-Wesley, 1999Availability: Items available for loan: [Call number: 005.8 FEG] (2).
|
|
22.
|
Process of network security : designing and managing a safe network
by Wadlow, Thomas A. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Massachusetts: Addison-Wesley, 2000Availability: Items available for loan: [Call number: 005.8 WAD] (1).
|
|
23.
|
UNIX system security : a guide for users and system administrators
by Curry, David A. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Massachusetts: Addison-Wesley, 1992Availability: Items available for loan: [Call number: 005.43 CUR] (1).
|
|
24.
|
Modeling and analysis of security protocols
by Ryan, Peter | Goldsmith, Michael | Lowe, Gavin | Schneider, Steve. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Harlow: Addison-Wesley, 2001Availability: Items available for loan: [Call number: 005.8 RYA] (1).
|
|
25.
|
Inside Internet security : what hackers don't want you to know
by Crume, Jeff. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Harlow: Addison-Wesley, 2000Availability: Items available for loan: [Call number: 005.8 CRU] (1).
|
|
26.
|
Digital rights management : protecting and monetizing content
by Tassel, Joan Van. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Amsterdam: Focal Press, 2006Availability: Items available for loan: [Call number: 005.8 TAS] (1).
|
|
27.
|
Communication Netwroks : a first course
by Walrand, Jean. Edition: 2nd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Tata McGraw-Hill, 1998Availability: Items available for loan: [Call number: 004.6 WAL] (1).
|
|
28.
|
Best truth: Intelligence in the information age
by Berkowitz, Bruce D | Goodman, Allan E. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: London: Yale University Press, 2000Availability: Items available for loan: [Call number: 005.8 BER] (1).
|
|
29.
|
Developing distributed and E-commerce applications
by Ince, Darrel. Edition: 2nd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: London: Pearson Addison Wesley, 2003Availability: Items available for loan: [Call number: 005.1 INC] (2).
|
|
30.
|
Know your enemy : learning about security threats
by Honeynet project. Edition: 2nd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Pearson Education, 2004Availability: Items available for loan: [Call number: 005.8 HON] (2).
|
|
31.
|
Secure architectures with openBSD
by Nazario, Jose | Palmer, Brandon. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Addison-Wesley, 2004Availability: Items available for loan: [Call number: 005.432 PAL] (1).
|
|
32.
|
Defend I.T. : security by example
by Gupta, Ajay | Laliberte, Scott. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Addison-Wesley, 2004Availability: Items available for loan: [Call number: 005.8 GUP] (1).
|
|
33.
|
Wi-Foo : the secrets of wireless hacking
by Vladimirov, Andrew A | Gavrilenko, Konstantin V | Mikhailovsky, Andrei A. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Addison-Wesley, 2004Availability: Items available for loan: [Call number: 005.8 VLA] (1).
|
|
34.
|
High-tech crimes revealed : cyberwar stories from the digital front
by Branigan, Steven. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Addison-Wesley, 2005Availability: Items available for loan: [Call number: 005.8 BRA] (1).
|
|
35.
|
Troubleshooting Linux firewalls.
by Shinn, Mike | Shinn, Michael | Shinn, Scott. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Jersey: Addison-Wesley, 2005Availability: Items available for loan: [Call number: 005.8 SHI] (1).
|
|
36.
|
.NET developer's guide to windows security
by Brown, Keith. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Addison-Wesley, 2004Availability: Items available for loan: [Call number: 005.8 BRO] (1).
|
|
37.
|
Introduction to computer security
by Bishop, Matt. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Addison-Wesley, 2004Availability: Items available for loan: [Call number: 005.8 BIS] (1).
|
|
38.
|
Practical cryptology and web security.
by Yuen, P. K. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Harlow: Pearson Education, 2006Availability: Items available for loan: [Call number: 005.82 YUE] (1).
|
|
39.
|
Rootkits : subverting the windows kernel
by Hoglund, Greg | Butler, James. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Jersey: Addison-Wesley, 2005Availability: Items available for loan: [Call number: 005.8 HOG] (1).
|
|
40.
|
Secure coding in C and C++
by Seacord, Robert C. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Jersey: Addison-Wesley, 2005Availability: Items available for loan: [Call number: 005.8 SEA] (1).
|