|
1.
|
Security analysis of network protocols : compositional reasoning and complexity-theoretic foundations
by Datta, Anupam. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: U.S.A.: ProQuest, 2005Availability: Items available for loan: [Call number: 005.8 DAT] (1).
|
|
2.
|
Java 2 network security
by Pistoia, Marco. Edition: 2nd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Upper Saddle River: Prentice Hall, 1999Availability: Items available for loan: [Call number: 005.8 PIS] (1).
|
|
3.
|
Malware : fighting malicious code
by Skoudis, Ed | Zeltser, Lenny. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Jersey: Prentice Hall, 2004Availability: Items available for loan: [Call number: 005.8 SKO] (1).
|
|
4.
|
Internet denial of service : attack and defense mechanisms
by Mirkovic, Jelena | Dietrich, Sven | Dittrich, David | Reiher, Peter. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Jersey: Prentice Hall, 2004Availability: Items available for loan: [Call number: 005.8 MIR] (1).
|
|
5.
|
Firewalls and VPNs : principles and practices
by Tibbs, Richard | Oakes, Edward. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Jersey: Prentice Hall, 2005Availability: Items available for loan: [Call number: 005.8 TIB] (1).
|
|
6.
|
Protecting critical infrastructures against cyber-attack
by Goodman, Seymour E | Longhurst,David W. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Oxford University Press, 2003Availability: Items available for loan: [Call number: 005.8 LUK] (1).
|
|
7.
|
Internet besieged : countering cyberspace scofflaws
by Denning, Dorothy E | Denning, Peter J. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Addison-Wesley, 1998Availability: Items available for loan: [Call number: 364.168 DEN] (1).
|
|
8.
|
Process of network security : designing and managing a safe network
by Wadlow, Thomas A. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Massachusetts: Addison-Wesley, 2000Availability: Items available for loan: [Call number: 005.8 WAD] (1).
|
|
9.
|
Know your enemy : learning about security threats
by Honeynet project. Edition: 2nd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Pearson Education, 2004Availability: Items available for loan: [Call number: 005.8 HON] (2).
|
|
10.
|
Defend I.T. : security by example
by Gupta, Ajay | Laliberte, Scott. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Addison-Wesley, 2004Availability: Items available for loan: [Call number: 005.8 GUP] (1).
|
|
11.
|
Wi-Foo : the secrets of wireless hacking
by Vladimirov, Andrew A | Gavrilenko, Konstantin V | Mikhailovsky, Andrei A. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Addison-Wesley, 2004Availability: Items available for loan: [Call number: 005.8 VLA] (1).
|
|
12.
|
High-tech crimes revealed : cyberwar stories from the digital front
by Branigan, Steven. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Addison-Wesley, 2005Availability: Items available for loan: [Call number: 005.8 BRA] (1).
|
|
13.
|
Extrusion detection : security monitoring for internal intrusions
by Bejtlich, Richard. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Upper Saddle River: Addison-Wesley, 2006Availability: Items available for loan: [Call number: 005.8 BEJ] (1).
|
|
14.
|
Network Control and Engineering for QOS, Security and Mobility, III.
by Gaiti, Dominique | Gaiti, Dominique | Galmes, Sebastia | Puigjaner, Ramon. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer-Verlag, 2005Availability: Items available for loan: [Call number: 004.6068 GAI] (1).
|
|
15.
|
Intrusion detection and correlation : challenges and solutions
by Kruegel, Christopher | Valeur, Fredrik | Vigna, Giovanni. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2005Availability: Items available for loan: [Call number: 005.8 KRU] (1).
|
|
16.
|
Understanding intrusion detection through visualization
by Axelsson, Stefan. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2005Availability: Items available for loan: [Call number: 005.8 AXE] (1).
|
|
17.
|
Security in fixed and wireless networks : an introduction to securing data communications
by Schafer, Gunter. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Harlow: John Wiley & Sons, 2003Availability: Items available for loan: [Call number: 005.8 SCH] (1).
|
|
18.
|
Building open source network security tools : components and techniques
by Schiffman, Mike D. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Indiana: Wiley Publishing, 2003Availability: Items available for loan: [Call number: 005.8 SCH] (1).
|
|
19.
|
Implementing SSH : strategies for optimizing the secure shell
by Dwivedi, Himanshu. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Indianapolis: Wiley, 2004Availability: Items available for loan: [Call number: 005.8 DWI] (1).
|
|
20.
|
Peter Norton's network security fundamentals
by Norton, Peter | Stockman, Mike. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Prentice Hall, 2000Availability: Items available for loan: [Call number: 005.8 NOR] (1).
|