|  | 1. | Security analysis of network protocols : compositional reasoning and complexity-theoretic foundations 
    by Datta, Anupam.Material type:  Book; Format: 
                    print
                ; Literary form: 
                    Not fiction
                 Publisher: U.S.A.:  ProQuest,  2005Availability: Items available for loan: DAU [Call number: 005.8 DAT] (1). | 
                                    
                                        
                                            
                                            |  | 2. | Java 2 network security 
    by Pistoia, Marco.Edition: 2nd ed.Material type:  Book; Format: 
                    print
                ; Literary form: 
                    Not fiction
                 Publisher: Upper Saddle River:  Prentice Hall,  1999Availability: Items available for loan: DAU [Call number: 005.8 PIS] (1). | 
                                    
                                        
                                            
                                            |  | 3. | Malware : fighting malicious code 
    by Skoudis, Ed | Zeltser, Lenny.Material type:  Book; Format: 
                    print
                ; Literary form: 
                    Not fiction
                 Publisher: New Jersey:  Prentice Hall,  2004Availability: Items available for loan: DAU [Call number: 005.8 SKO] (1). | 
                                    
                                        
                                            
                                            |  | 4. | Internet denial of service : attack and defense mechanisms 
    by Mirkovic, Jelena | Dietrich, Sven | Dittrich, David | Reiher, Peter.Material type:  Book; Format: 
                    print
                ; Literary form: 
                    Not fiction
                 Publisher: New Jersey:  Prentice Hall,  2004Availability: Items available for loan: DAU [Call number: 005.8 MIR] (1). | 
                                    
                                        
                                            
                                            |  | 5. | Firewalls and VPNs : principles and practices 
    by Tibbs, Richard | Oakes, Edward.Material type:  Book; Format: 
                    print
                ; Literary form: 
                    Not fiction
                 Publisher: New Jersey:  Prentice Hall,  2005Availability: Items available for loan: DAU [Call number: 005.8 TIB] (1). | 
                                    
                                        
                                            
                                            |  | 6. | Protecting critical infrastructures against cyber-attack 
    by Goodman, Seymour E | Longhurst,David W.Material type:  Book; Format: 
                    print
                ; Literary form: 
                    Not fiction
                 Publisher: New York:  Oxford University Press,  2003Availability: Items available for loan: DAU [Call number: 005.8 LUK] (1). | 
                                    
                                        
                                            
                                            |  | 7. | Internet besieged : countering cyberspace scofflaws 
    by Denning, Dorothy E | Denning, Peter J.Material type:  Book; Format: 
                    print
                ; Literary form: 
                    Not fiction
                 Publisher: Boston:  Addison-Wesley,  1998Availability: Items available for loan: DAU [Call number: 364.168 DEN] (1). | 
                                    
                                        
                                            
                                            |  | 8. | Process of network security : designing and managing a safe network 
    by Wadlow, Thomas A.Material type:  Book; Format: 
                    print
                ; Literary form: 
                    Not fiction
                 Publisher: Massachusetts:  Addison-Wesley,  2000Availability: Items available for loan: DAU [Call number: 005.8 WAD] (1). | 
                                    
                                        
                                            
                                            |  | 9. | Know your enemy : learning about security threats 
    by Honeynet project.Edition: 2nd ed.Material type:  Book; Format: 
                    print
                ; Literary form: 
                    Not fiction
                 Publisher: Boston:  Pearson Education,  2004Availability: Items available for loan: DAU [Call number: 005.8 HON] (2). | 
                                    
                                        
                                            
                                            |  | 10. | Defend I.T. : security by example 
    by Gupta, Ajay | Laliberte, Scott.Material type:  Book; Format: 
                    print
                ; Literary form: 
                    Not fiction
                 Publisher: Boston:  Addison-Wesley,  2004Availability: Items available for loan: DAU [Call number: 005.8 GUP] (1). | 
                                    
                                        
                                            
                                            |  | 11. | Wi-Foo : the secrets of wireless hacking 
    by Vladimirov, Andrew A | Gavrilenko, Konstantin V | Mikhailovsky, Andrei A.Material type:  Book; Format: 
                    print
                ; Literary form: 
                    Not fiction
                 Publisher: Boston:  Addison-Wesley,  2004Availability: Items available for loan: DAU [Call number: 005.8 VLA] (1). | 
                                    
                                        
                                            
                                            |  | 12. | High-tech crimes revealed : cyberwar stories from the digital front 
    by Branigan, Steven.Material type:  Book; Format: 
                    print
                ; Literary form: 
                    Not fiction
                 Publisher: Boston:  Addison-Wesley,  2005Availability: Items available for loan: DAU [Call number: 005.8 BRA] (1). | 
                                    
                                        
                                            
                                            |  | 13. | Extrusion detection : security monitoring for internal intrusions 
    by Bejtlich, Richard.Material type:  Book; Format: 
                    print
                ; Literary form: 
                    Not fiction
                 Publisher: Upper Saddle River:  Addison-Wesley,  2006Availability: Items available for loan: DAU [Call number: 005.8 BEJ] (1). | 
                                    
                                        
                                            
                                            |  | 14. | Network Control and Engineering for QOS, Security and Mobility, III. 
    by Gaiti, Dominique | Gaiti, Dominique | Galmes, Sebastia | Puigjaner, Ramon.Material type:  Book; Format: 
                    print
                ; Literary form: 
                    Not fiction
                 Publisher: New York:  Springer-Verlag,  2005Availability: Items available for loan: DAU [Call number: 004.6068 GAI] (1). | 
                                    
                                        
                                            
                                            |  | 15. | Intrusion detection and correlation : challenges and solutions 
    by Kruegel, Christopher | Valeur, Fredrik | Vigna, Giovanni.Material type:  Book; Format: 
                    print
                ; Literary form: 
                    Not fiction
                 Publisher: New York:  Springer,  2005Availability: Items available for loan: DAU [Call number: 005.8 KRU] (1). | 
                                    
                                        
                                            
                                            |  | 16. | Understanding intrusion detection through visualization 
    by Axelsson, Stefan.Material type:  Book; Format: 
                    print
                ; Literary form: 
                    Not fiction
                 Publisher: New York:  Springer,  2005Availability: Items available for loan: DAU [Call number: 005.8 AXE] (1). | 
                                    
                                        
                                            
                                            |  | 17. | Security in fixed and wireless networks : an introduction to securing data communications 
    by Schafer, Gunter.Material type:  Book; Format: 
                    print
                ; Literary form: 
                    Not fiction
                 Publisher: Harlow:  John Wiley & Sons,  2003Availability: Items available for loan: DAU [Call number: 005.8 SCH] (1). | 
                                    
                                        
                                            
                                            |  | 18. | Building open source network security tools : components and techniques 
    by Schiffman, Mike D.Material type:  Book; Format: 
                    print
                ; Literary form: 
                    Not fiction
                 Publisher: Indiana:  Wiley Publishing,  2003Availability: Items available for loan: DAU [Call number: 005.8 SCH] (1). | 
                                    
                                        
                                            
                                            |  | 19. | Implementing SSH : strategies for optimizing the secure shell 
    by Dwivedi, Himanshu.Material type:  Book; Format: 
                    print
                ; Literary form: 
                    Not fiction
                 Publisher: Indianapolis:  Wiley,  2004Availability: Items available for loan: DAU [Call number: 005.8 DWI] (1). | 
                                    
                                        
                                            
                                            |  | 20. | Peter Norton's network security fundamentals 
    by Norton, Peter | Stockman, Mike.Material type:  Book; Format: 
                    print
                ; Literary form: 
                    Not fiction
                 Publisher: New Delhi:  Prentice Hall,  2000Availability: Items available for loan: DAU [Call number: 005.8 NOR] (1). |