1. Security analysis of network protocols : compositional reasoning and complexity-theoretic foundations

by Datta, Anupam.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: U.S.A.: ProQuest, 2005Availability: Items available for loan: [Call number: 005.8 DAT] (1).
2. ASN.1 communication between heterogeneous systems

by Dubuisson, Olivier.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: San Diego: Morgan Kaufmann, 2001Availability: Items available for loan: [Call number: 004.35 DUB] (1).
3. Java 2 network security

by Pistoia, Marco.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Upper Saddle River: Prentice Hall, 1999Availability: Items available for loan: [Call number: 005.8 PIS] (1).
4. Malware : fighting malicious code

by Skoudis, Ed | Zeltser, Lenny.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Jersey: Prentice Hall, 2004Availability: Items available for loan: [Call number: 005.8 SKO] (1).
5. Internet denial of service : attack and defense mechanisms

by Mirkovic, Jelena | Dietrich, Sven | Dittrich, David | Reiher, Peter.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Jersey: Prentice Hall, 2004Availability: Items available for loan: [Call number: 005.8 MIR] (1).
6. Firewalls and VPNs : principles and practices

by Tibbs, Richard | Oakes, Edward.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Jersey: Prentice Hall, 2005Availability: Items available for loan: [Call number: 005.8 TIB] (1).
7. Protecting critical infrastructures against cyber-attack

by Goodman, Seymour E | Longhurst,David W.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Oxford University Press, 2003Availability: Items available for loan: [Call number: 005.8 LUK] (1).
8. Internet besieged : countering cyberspace scofflaws

by Denning, Dorothy E | Denning, Peter J.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Addison-Wesley, 1998Availability: Items available for loan: [Call number: 364.168 DEN] (1).
9. Process of network security : designing and managing a safe network

by Wadlow, Thomas A.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Massachusetts: Addison-Wesley, 2000Availability: Items available for loan: [Call number: 005.8 WAD] (1).
10. Modeling and analysis of security protocols

by Ryan, Peter | Goldsmith, Michael | Lowe, Gavin | Schneider, Steve.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Harlow: Addison-Wesley, 2001Availability: Items available for loan: [Call number: 005.8 RYA] (1).
11. Communication Netwroks : a first course

by Walrand, Jean.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Tata McGraw-Hill, 1998Availability: Items available for loan: [Call number: 004.6 WAL] (1).
12. Know your enemy : learning about security threats

by Honeynet project.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Pearson Education, 2004Availability: Items available for loan: [Call number: 005.8 HON] (2).
13. Defend I.T. : security by example

by Gupta, Ajay | Laliberte, Scott.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Addison-Wesley, 2004Availability: Items available for loan: [Call number: 005.8 GUP] (1).
14. Wi-Foo : the secrets of wireless hacking

by Vladimirov, Andrew A | Gavrilenko, Konstantin V | Mikhailovsky, Andrei A.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Addison-Wesley, 2004Availability: Items available for loan: [Call number: 005.8 VLA] (1).
15. High-tech crimes revealed : cyberwar stories from the digital front

by Branigan, Steven.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Addison-Wesley, 2005Availability: Items available for loan: [Call number: 005.8 BRA] (1).
16. Extrusion detection : security monitoring for internal intrusions

by Bejtlich, Richard.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Upper Saddle River: Addison-Wesley, 2006Availability: Items available for loan: [Call number: 005.8 BEJ] (1).
17. Network Control and Engineering for QOS, Security and Mobility, III.

by Gaiti, Dominique | Gaiti, Dominique | Galmes, Sebastia | Puigjaner, Ramon.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer-Verlag, 2005Availability: Items available for loan: [Call number: 004.6068 GAI] (1).
18. Intrusion detection and correlation : challenges and solutions

by Kruegel, Christopher | Valeur, Fredrik | Vigna, Giovanni.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2005Availability: Items available for loan: [Call number: 005.8 KRU] (1).
19. Understanding intrusion detection through visualization

by Axelsson, Stefan.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2005Availability: Items available for loan: [Call number: 005.8 AXE] (1).
20. Security in fixed and wireless networks : an introduction to securing data communications

by Schafer, Gunter.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Harlow: John Wiley & Sons, 2003Availability: Items available for loan: [Call number: 005.8 SCH] (1).

Powered by Koha