21. Digital certificates : applied internet security

by Feghhi, Jalala | Feghhi, Jalil | Williams, Peter.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Reading: Addison-Wesley, 1999Availability: Items available for loan: [Call number: 005.8 FEG] (2).
22. Process of network security : designing and managing a safe network

by Wadlow, Thomas A.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Massachusetts: Addison-Wesley, 2000Availability: Items available for loan: [Call number: 005.8 WAD] (1).
23. UNIX system security : a guide for users and system administrators

by Curry, David A.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Massachusetts: Addison-Wesley, 1992Availability: Items available for loan: [Call number: 005.43 CUR] (1).
24. Modeling and analysis of security protocols

by Ryan, Peter | Goldsmith, Michael | Lowe, Gavin | Schneider, Steve.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Harlow: Addison-Wesley, 2001Availability: Items available for loan: [Call number: 005.8 RYA] (1).
25. Inside Internet security : what hackers don't want you to know

by Crume, Jeff.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Harlow: Addison-Wesley, 2000Availability: Items available for loan: [Call number: 005.8 CRU] (1).
26. Digital rights management : protecting and monetizing content

by Tassel, Joan Van.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Amsterdam: Focal Press, 2006Availability: Items available for loan: [Call number: 005.8 TAS] (1).
27. Communication Netwroks : a first course

by Walrand, Jean.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Tata McGraw-Hill, 1998Availability: Items available for loan: [Call number: 004.6 WAL] (1).
28. Best truth: Intelligence in the information age

by Berkowitz, Bruce D | Goodman, Allan E.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: London: Yale University Press, 2000Availability: Items available for loan: [Call number: 005.8 BER] (1).
29. Developing distributed and E-commerce applications

by Ince, Darrel.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: London: Pearson Addison Wesley, 2003Availability: Items available for loan: [Call number: 005.1 INC] (2).
30. Know your enemy : learning about security threats

by Honeynet project.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Pearson Education, 2004Availability: Items available for loan: [Call number: 005.8 HON] (2).
31. Secure architectures with openBSD

by Nazario, Jose | Palmer, Brandon.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Addison-Wesley, 2004Availability: Items available for loan: [Call number: 005.432 PAL] (1).
32. Defend I.T. : security by example

by Gupta, Ajay | Laliberte, Scott.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Addison-Wesley, 2004Availability: Items available for loan: [Call number: 005.8 GUP] (1).
33. Wi-Foo : the secrets of wireless hacking

by Vladimirov, Andrew A | Gavrilenko, Konstantin V | Mikhailovsky, Andrei A.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Addison-Wesley, 2004Availability: Items available for loan: [Call number: 005.8 VLA] (1).
34. High-tech crimes revealed : cyberwar stories from the digital front

by Branigan, Steven.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Addison-Wesley, 2005Availability: Items available for loan: [Call number: 005.8 BRA] (1).
35. Troubleshooting Linux firewalls.

by Shinn, Mike | Shinn, Michael | Shinn, Scott.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Jersey: Addison-Wesley, 2005Availability: Items available for loan: [Call number: 005.8 SHI] (1).
36. .NET developer's guide to windows security

by Brown, Keith.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Addison-Wesley, 2004Availability: Items available for loan: [Call number: 005.8 BRO] (1).
37. Introduction to computer security

by Bishop, Matt.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Addison-Wesley, 2004Availability: Items available for loan: [Call number: 005.8 BIS] (1).
38. Practical cryptology and web security.

by Yuen, P. K.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Harlow: Pearson Education, 2006Availability: Items available for loan: [Call number: 005.82 YUE] (1).
39. Rootkits : subverting the windows kernel

by Hoglund, Greg | Butler, James.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Jersey: Addison-Wesley, 2005Availability: Items available for loan: [Call number: 005.8 HOG] (1).
40. Secure coding in C and C++

by Seacord, Robert C.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Jersey: Addison-Wesley, 2005Availability: Items available for loan: [Call number: 005.8 SEA] (1).

Powered by Koha