|
1.
|
Computer communications security : principles, standard protocols, and techniques / Warwick Ford.
by Ford, Warwick. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Englewood Cliffs, N.J. : PTR Prentice Hall, c1994Availability: Items available for loan: [Call number: 005.8 FOR] (15).
|
|
2.
|
Network security : private communication in a public world / Charlie Kaufman, Radia Perlman, Mike Speciner.
by Kaufman, Charlie | Perlman, Radia | Speciner, Michael. Edition: 2nd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Upper Saddle River, NJ : Prentice Hall PTR, c2002.[Reprinted 2005]Availability: Items available for loan: [Call number: 005.8 KAU] (4). Checked out (1).
|
|
3.
|
Security in computing / Charles P. Pfleeger, Shari Lawrence Pfleeger.
by Pfleeger, Charles P | Pfleeger, Shari Lawrence. Edition: 3rd ed.Material type: Book; Format:
print
Publisher: Upper Saddle River, N.J. : Prentice Hall PTR, c2003.[Reprinted 2003 , 2005]Availability: Items available for loan: [Call number: 005.8 PFL] (15). Checked out (5).
|
|
4.
|
Computer security / Dieter Gollmann.
by Gollmann, Dieter. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Chichester ; New York : Wiley, c1999Online access: Publisher description | Table of Contents only | Contributor biographical information Availability: Items available for loan: [Call number: 005.8 GOL] (6).
|
|
5.
|
Information security risk analysis / Thomas R. Peltier.
by Peltier, Thomas R. Edition: 2nd ed.Material type: Book; Format:
print
; Literary form:
Fiction
Publisher: Boca Raton : Auerbach Publications, c2005Online access: Publisher description Availability: Items available for loan: [Call number: 005.8 PEL] (2).
|
|
6.
|
Security engineering : a guide to building dependable distributed systems / Ross J. Anderson.
by Anderson, Ross. Edition: 2nd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Indianapolis, IN : Wiley Pub., c2008.[Repeinted]Availability: Items available for loan: [Call number: 005.1 AND] (2).
|
|
7.
|
Fundamentals of computer security technology / Edward G. Amoroso.
by Amoroso, Edward G. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Englewood Cliffs, N.J. : PTR Prentice Hall, c1994Availability: Items available for loan: [Call number: 005.8 AMO] (14).
|
|
8.
|
Microsoft encyclopedia of security / Mitch Tulloch.
by Tulloch, Mitch. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Redmond, Wash. : New Delhi : Microsoft Press ; Prentice-Hall, c2003 [reprinted 2004]Online access: Contributor biographical information | Publisher description Availability: Items available for loan: [Call number: 005.803 TUL] (1).
|
|
9.
|
Fundamentals of computer security technology / Edward G. Amoroso.
by Amoroso, Edward G. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Englewood Cliffs, N.J. : PTR Prentice Hall, c1994Availability: Items available for loan: [Call number: 005.8 AMO] (1).
|
|
10.
|
Network security : private communication in a public world / Charlie Kaufman, Radia Perlman, Mike Speciner.
by Kaufman, Charlie | Perlman, Radia | Speciner, Michael. Edition: 2nd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Englewood Cliffs, New Jersey : New Delhi : PTR Prentice Hall ; Prentice Hall of India, c2002.[Reprinted 2003]Availability: Items available for loan: [Call number: 005.8 KAU] (2).
|
|
11.
|
Network security essentials : applications and standards / William Stallings.
by Stallings, William. Edition: 3rd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Upper Saddle River, NJ : Pearson Education, c2007Online access: Table of contents only Availability: Items available for loan: [Call number: 005.8 STA] (2).
|
|
12.
|
Modern cryptography, probabilistic proofs, and pseudorandomness / Oded Goldreich.
by Goldreich, Oded. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Berlin ; New York : Springer, c1999Online access: Publisher description | Table of contents only Availability: Items available for loan: [Call number: 005.8 GOL] (2).
|
|
13.
|
Applied cryptography : protocols, algorithms, and source code in C / Bruce Schneier.
by Schneier, Bruce, 1963-. Edition: 2nd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York : John Wiley and Sons, Inc., c1996Online access: Contributor biographical information | Publisher description | Table of Contents Availability: Items available for loan: [Call number: 005.82 SCH] (7). Checked out (1).
|
|
14.
|
Red Hat Linux security and optimization / Mohammed J. Kabir.
by Kabir, Mohammed J, 1971-. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York ; New Delhi : Hungry Minds, c2002 [reprinted 2002]Online access: Contributor biographical information | Publisher description | Table of contents Availability: Items available for loan: [Call number: 005.8 KAB] (1).
|
|
15.
|
Web hacking : attacks and defense / Stuart McClure, Saumil Shah, Shreeraj Shah.
by McClure, Stuart | Shah, Saumil | Shah, Shreeraj. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston : Addison-Wesley, c2003Availability: Items available for loan: [Call number: 005.8 MCC] (1).
|
|
16.
|
Web hacking : attacks and defense / Stuart McClure, Saumil Shah, Shreeraj Shah.
by McClure, Stuart | Shah, Saumil | Shah, Shreeraj. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston : Addison-Wesley, c2003Availability: Items available for loan: [Call number: 005.8 MCC] (1).
|
|
17.
|
The basics of hacking and penetration testing : ethical hacking and penetration testing made easy / Dr. Patrick Engebretson, David Kennedy, Technical Editor.
by Engebretson, Pat (Patrick Henry), 1974-. Edition: Second Edition.Material type: Book; Format:
print
; Literary form:
Not fiction
Availability: Items available for reference: [Call number: 005.8 ENG] (1).
|
|
18.
|
Network security essentials : applications and standards / William Stallings.
by Stallings, William. Edition: 4th ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Delhi : Pearson Education, c2011[reprinted 2013]Availability: Items available for loan: [Call number: 005.8 STA] (1). Items available for reference: [Call number: 005.8 STA] (1).
|
|
19.
|
Introduction to computer security / Matt Bisop, Sathyanarayana S Venkatramanayya
by Bishop, Matt | Venkatramanayya, Sathyanarayana S [Author]. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Delhi : Pearson Education, c2006 [reprinted 2013]Availability: Items available for loan: [Call number: 005.8 BIS] (1). Items available for reference: [Call number: 005.8 BIS] (1).
|
|
20.
|
Fundamentals network security / Eric Maiwld
by Maiwald, Eric. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi : McGraw Hill, c2004.[Reprinted 2010, 2013]Availability: Items available for loan: [Call number: 005.8 MAI] (1). Items available for reference: [Call number: 005.8 MAI] (1).
|
|
21.
|
Computer security / Alfred Basta and Wolfa Halton
by Basta, Alfred. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi : Course Technology, c2007Online access: Publisher description | Table of Contents only | Contributor biographical information Availability: Items available for loan: [Call number: 005.8 BAS] (2). Items available for reference: [Call number: 005.8 BAS] (1).
|
|
22.
|
Information security : principles and practice / Mark Stamp.
by Stamp, Mark. Edition: 2nd ed.Material type: Book; Format:
available online
; Literary form:
Not fiction
Publisher: Hoboken, N.J. : Wiley, ©2011Online access: Wiley Online Library Availability: No items available
|
|
23.
|
Healthcare fraud : auditing and detection guide / Rebecca Saltiel Busch.
by Busch, Rebecca S. Edition: 2nd ed.Material type: Book; Format:
available online
; Literary form:
Not fiction
Publisher: Hoboken, N.J. : John Wiley & Sons, ©2012Online access: Wiley Online Library Availability: No items available
|
|
24.
|
Auditor's guide to IT auditing / Richard E. Cascarino.
by Cascarino, Richard | Cascarino, Richard. Auditor's guide to information systems auditing. Edition: 2nd ed.Material type: Book; Format:
available online
; Literary form:
Not fiction
Publisher: Hoboken, N.J. : Wiley, ©2012Online access: Wiley Online Library Availability: No items available
|
|
25.
|
Cyber security policy guidebook / Jennifer L. Bayuk [and others].
by Bayuk, Jennifer L. Material type: Book; Format:
available online
; Literary form:
Not fiction
Publisher: Hoboken, N.J. : Wiley, ©2012Online access: Wiley Online Library Availability: No items available
|
|
26.
|
Reliability and availability of cloud computing / Eric Bauer, Randee Adams.
by Bauer, Eric | Adams, Randee | Wiley InterScience (Online service). Material type: Book; Format:
available online
; Literary form:
Not fiction
Publisher: Hoboken, N.J. : Wiley-IEEE Press, 2012Online access: Wiley Online Library Availability: No items available
|
|
27.
|
Investigative computer forensics : the practical guide for lawyers, accountants, investigators, and business / Erik Laykin, CHFI, CEDS.
by Laykin, Erik. Material type: Book; Format:
available online
; Literary form:
Not fiction
Publisher: Hoboken : John Wiley, 2013Online access: Wiley Online Library Availability: No items available
|
|
28.
|
Computer security handbook / edited by Seymour Bosworth, Michel E. Kabay, Eric Whyne.
by Bosworth, Seymour [editor.] | Kabay, Michel E [editor.] | Whyne, Eric, 1981- [editor.]. Edition: Sixth edition.Material type: Book; Format:
available online
; Literary form:
Not fiction
Publisher: Hoboken, New Jersey : Wiley, [2014]Online access: Wiley Online Library Availability: No items available
|
|
29.
|
Cloud management and security / Imad M. Abbadi.
by Abbadi, Imad M [author.]. Material type: Book; Format:
available online
; Literary form:
Not fiction
Publisher: Chichester, West Sussex ; Hoboken, NJ : John Wiley & Sons Inc., 2014Online access: Wiley Online Library Availability: No items available
|
|
30.
|
Understanding Bitcoin : Cryptography, Engineering and Economics / Pedro Franco.
by Franco, Pedro [author.]. Material type: Book; Format:
available online
; Literary form:
Not fiction
Publisher: Chichester, West Sussex : Wiley, 2015Online access: Wiley Online Library Availability: No items available
|
|
31.
|
Phishing dark waters : the offensive and defensive sides of malicious emails / Christopher Hadnagy, Michele Fincher ; foreword by Robin Dreeke.
by Hadnagy, Christopher [author.] | Fincher, Michele [author.] | Dreeke, Robin [writer of supplementary textual content.]. Material type: Book; Format:
available online
; Literary form:
Not fiction
Publisher: Indianapolis, IN : Wiley, [2015]Copyright date: ©2015Online access: Wiley Online Library Availability: No items available
|
|
32.
|
Security intelligence : a practitioner's guide to solving enterprise security challenges / Qing Li, Gregory Clark.
by Li, Qing, 1971- [author.] | Clark, Gregory [author.]. Material type: Book; Format:
available online
; Literary form:
Not fiction
Publisher: Indianapolis, IN : Wiley, 2015Online access: Wiley Online Library Availability: No items available
|
|
33.
|
Beyond cybersecurity : protecting your digital business / James M. Kaplan, Tucker Bailey, Chris Rezek, Derek O'Halloran, Alan Marcus.
by Kaplan, James M [author.] | Bailey, Tucker [author.] | Rezek, Chris [author.] | O'Halloran, Derek [author.] | Marcus, Alan [author.]. Material type: Book; Format:
available online
; Literary form:
Not fiction
Publisher: Hoboken, New Jersey : Wiley, 2015Online access: Wiley Online Library Availability: No items available
|
|
34.
|
Network attacks and exploitation : a framework / Matthew Monte.
by Monte, Matthew [author.]. Material type: Book; Format:
available online
; Literary form:
Not fiction
Publisher: Indianapolis, IN : Wiley, 2015Copyright date: ©2015Other title: Network attacks & exploitation.Online access: Wiley Online Library Availability: No items available
|
|
35.
|
The network security test lab : a step-by-step guide / Michael Gregg.
by Gregg, Michael (Michael C.) [author.]. Material type: Book; Format:
available online
; Literary form:
Not fiction
Publisher: Indianapolis, IN : Wiley, [2015]Copyright date: ©2015Online access: Wiley Online Library Availability: No items available
|
|
36.
|
The antivirus hacker's handbook / Joxean Koret, Elias Bachaalany.
by Koret, Joxean [author.] | Bachaalany, Elias [author.]. Material type: Book; Format:
available online
; Literary form:
Not fiction
Publisher: Indianapolis, IN : John Wiley & Sons, Inc., [2015]Copyright date: ©2015Online access: Wiley Online Library Availability: No items available
|
|
37.
|
Engineering information security : the application of systems engineering concepts to achieve information assurance / Stuart Jacobs.
by Jacobs, Stuart [author.]. Edition: Second edition.Material type: Book; Format:
available online
; Literary form:
Not fiction
Publisher: Piscataway, NJ : Hoboken, N.J. : IEEE Press ; Wiley, [2016]Copyright date: ©2016Online access: Wiley Online Library Availability: No items available
|
|
38.
|
Unauthorized access [electronic resource] : the crisis in online privacy and security / Robert H. Sloan and Richard Warner.
by Sloan, Robert H | Warner, Richard, 1946-. Material type: Book; Format:
electronic
available online
; Literary form:
Not fiction
Publisher: Boca Raton : CRC Press, 2014Online access: Distributed by publisher. Purchase or institutional license may be required for access. Availability: No items available
|
|
39.
|
Network anomaly detection : a machine learning perspective / Dhruba Kumar Bhattacharyya, Jugal Kumar Kalita.
by Bhattacharyya, Dhruba K [author.] | Kalita, Jugal Kumar [author]. Material type: Book; Format:
available online
; Literary form:
Not fiction
Publisher: Boca Raton : CRC Press, [2014]Copyright date: �201Online access: Distributed by publisher. Purchase or institutional license may be required for access Availability: No items available
|
|
40.
|
Cryptanalysis of RSA and its variants [electronic resource] / M. Jason Hinek.
by Hinek, M. Jason. Material type: Book; Format:
electronic
available online
; Literary form:
Not fiction
Publisher: Boca Raton : CRC Press, c2010Online access: Distributed by publisher. Purchase or institutional license may be required for access. Availability: No items available
|
|
41.
|
Discrete dynamical systems and chaotic machines [electronic resource] : theory and applications / Jacques M. Bahi, Christophe Guyeux.
by Bahi, Jacques Mohcine | Guyeux, Christophe. Material type: Book; Format:
electronic
available online
; Literary form:
Not fiction
Publisher: Boca Raton : CRC Press, 2013Online access: Distributed by publisher. Purchase or institutional license may be required for access. Availability: No items available
|
|
42.
|
Investigator's guide to steganography [electronic resource] / Gregory Kipper.
by Kipper, Gregory. Material type: Book; Format:
electronic
available online
; Literary form:
Not fiction
Publisher: Boca Raton, FL : Auerbach Publications, c2004Online access: Distributed by publisher. Purchase or institutional license may be required for access. Availability: No items available
|
|
43.
|
Machine learning forensics for law enforcement, security, and intelligence [electronic resource] / Jesus Mena.
by Mena, Jesus. Material type: Book; Format:
electronic
available online
; Literary form:
Not fiction
Publisher: Boca Raton, Fla. : Taylor & Francis, 2011Online access: Distributed by publisher. Purchase or institutional license may be required for access. Availability: No items available
|
|
44.
|
Honeypot [electronic resource] : a new paradigm to information security / R.C. Joshi, Anjali Sardana.
by Joshi, R. C | Sardana, Anjali. Material type: Book; Format:
electronic
available online
; Literary form:
Not fiction
Publisher: Enfield, N.H. : Science Publishers, 2011Online access: Distributed by publisher. Purchase or institutional license may be required for access. Availability: No items available
|
|
45.
|
Enhancing computer security with smart technology [electronic resource] / editor, V. Rao Vemuri.
by Vemuri, V. Rao. Material type: Book; Format:
electronic
available online
; Literary form:
Not fiction
Publisher: Boca Raton, FL : Auerbach Publications, 2006Online access: Distributed by publisher. Purchase or institutional license may be required for access. Availability: No items available
|
|
46.
|
Digital forensics for handheld devices [electronic resource] / Eamon P. Doherty.
by Doherty, Eamon P. Material type: Book; Format:
electronic
available online
; Literary form:
Not fiction
Publisher: Boca Raton, Fla. : CRC Press, 2013Online access: Distributed by publisher. Purchase or institutional license may be required for access. Availability: No items available
|
|
47.
|
Security and policy driven computing [electronic resource] / Lei Liu.
by Liu, Lei, 1968-. Material type: Book; Format:
electronic
available online
; Literary form:
Not fiction
Publisher: Boca Raton, Fla. : CRC Press, c2011Online access: Distributed by publisher. Purchase or institutional license may be required for access. Availability: No items available
|
|
48.
|
Software test attacks to break mobile and embedded devices / Jon Duncan Hagar.
by Hagar, Jon Duncan [author.]. Material type: Book; Format:
available online
; Literary form:
Not fiction
Publisher: Boca Raton : CRC Press, [2014]Online access: Distributed by publisher. Purchase or institutional license may be required for access. Availability: No items available
|
|
49.
|
Data mining and machine learning in cybersecurity [electronic resource] / Sumeet Dua and Xian Du.
by Dua, Sumeet | Du, Xian. Material type: Book; Format:
electronic
available online
; Literary form:
Not fiction
Publisher: Boca Raton : Taylor & Francis, 2011Online access: Distributed by publisher. Purchase or institutional license may be required for access. Availability: No items available
|
|
50.
|
RC4 stream cipher and its variants [electronic resource] / Goutam Paul, Subhamoy Maitra.
by Paul, Goutam | Maitra, Subhamoy, 1970-. Material type: Book; Format:
electronic
available online
; Literary form:
Not fiction
Publisher: Boca Raton, Fla. : CRC Press, c2012Online access: Distributed by publisher. Purchase or institutional license may be required for access. Availability: No items available
|