|
1.
|
Network security : private communication in a public world / Charlie Kaufman, Radia Perlman, Mike Speciner.
by Kaufman, Charlie | Perlman, Radia | Speciner, Michael. Edition: 2nd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Upper Saddle River, NJ : Prentice Hall PTR, c2002.[Reprinted 2005]Availability: Items available for loan: [Call number: 005.8 KAU] (5).
|
|
2.
|
Information security risk analysis / Thomas R. Peltier.
by Peltier, Thomas R. Edition: 2nd ed.Material type: Book; Format:
print
; Literary form:
Fiction
Publisher: Boca Raton : Auerbach Publications, c2005Online access: Publisher description Availability: Items available for loan: [Call number: 005.8 PEL] (2).
|
|
3.
|
Microsoft encyclopedia of security / Mitch Tulloch.
by Tulloch, Mitch. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Redmond, Wash. : New Delhi : Microsoft Press ; Prentice-Hall, c2003 [reprinted 2004]Online access: Contributor biographical information | Publisher description Availability: Items available for loan: [Call number: 005.803 TUL] (1).
|
|
4.
|
Security for ubiquitous computing / Frank Stajano.
by Stajano, Frank. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: West Sussex, England ; New York : J. Wiley & Sons, c2002Online access: Publisher description | Table of contents Availability: Items available for loan: [Call number: 005.8 STA] (1).
|
|
5.
|
Network security / Steven L. Shaffer, Alan R. Simon.
by Shaffer, Steven L | Simon, Alan R. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston : AP Professional, c1994Availability: Items available for loan: [Call number: 005.8 SHA] (1).
|
|
6.
|
Network security essentials : applications and standards / William Stallings.
by Stallings, William. Edition: 3rd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Upper Saddle River, NJ : Pearson Education, c2007Online access: Table of contents only Availability: Items available for loan: [Call number: 005.8 STA] (2).
|
|
7.
|
Security for telecommunications network management / Moshe Rozenblit.
by Rozenblit, Moshe, 1944-. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York : IEEE Press, c2000Online access: Contributor biographical information | Publisher description | Table of Contents Availability: Items available for loan: [Call number: 621.382 ROZ] (2).
|
|
8.
|
Web hacking : attacks and defense / Stuart McClure, Saumil Shah, Shreeraj Shah.
by McClure, Stuart | Shah, Saumil | Shah, Shreeraj. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston : Addison-Wesley, c2003Availability: Items available for loan: [Call number: 005.8 MCC] (1).
|
|
9.
|
Web hacking : attacks and defense / Stuart McClure, Saumil Shah, Shreeraj Shah.
by McClure, Stuart | Shah, Saumil | Shah, Shreeraj. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston : Addison-Wesley, c2003Availability: Items available for loan: [Call number: 005.8 MCC] (1).
|
|
10.
|
Network security essentials : applications and standards / William Stallings.
by Stallings, William. Edition: 4th ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Delhi : Pearson Education, c2011[reprinted 2013]Availability: Items available for reference: [Call number: 005.8 STA] (1). Checked out (1).
|
|
11.
|
Fundamentals network security / Eric Maiwld
by Maiwald, Eric. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi : McGraw Hill, c2004.[Reprinted 2010, 2013]Availability: Items available for loan: [Call number: 005.8 MAI] (1). Items available for reference: [Call number: 005.8 MAI] (1).
|
|
12.
|
Auditing cloud computing : a security and privacy guide / [edited by] Ben Halpert.
by Halpert, Ben, 1986-. Material type: Book; Format:
available online
; Literary form:
Not fiction
Publisher: Hoboken, N.J. : John Wiley & Sons, ©2011Online access: Wiley Online Library Availability: No items available
|
|
13.
|
Cyber conflict : competing national perspectives / edited by Daniel Ventre.
by Ventre, Daniel. Material type: Book; Format:
available online
; Literary form:
Not fiction
Publisher: London : Hoboken, NJ : ISTE ; John Wiley & Sons, 2012Online access: Wiley Online Library Availability: No items available
|
|
14.
|
Cybercrime and cyberwarfare / Igor Bernik.
by Bernik, Igor [author.]. Material type: Book; Format:
available online
; Literary form:
Not fiction
Publisher: London, UK : Hoboken, NJ : ISTE Ltd ; John Wiley & Sons, Inc., 2014Copyright date: ©2014Online access: Wiley Online Library Availability: No items available
|
|
15.
|
Cybersecurity for executives : a practical guide / by Gregory J. Touhill and C. Joseph Touhill.
by Touhill, Gregory J | Touhill, C. J, 1938-. Material type: Book; Format:
available online
; Literary form:
Not fiction
Publisher: Hoboken, New Jersey : John Wiley & Sons, [2014]Online access: Wiley Online Library Availability: No items available
|
|
16.
|
Network Security / André Perez.
by Perez, Andre. Material type: Book; Format:
available online
; Literary form:
Not fiction
Publisher: London : Hoboken, NJ : ISTE ; Wiley, 2014Online access: Wiley Online Library Availability: No items available
|
|
17.
|
Understanding Bitcoin : Cryptography, Engineering and Economics / Pedro Franco.
by Franco, Pedro [author.]. Material type: Book; Format:
available online
; Literary form:
Not fiction
Publisher: Chichester, West Sussex : Wiley, 2015Online access: Wiley Online Library Availability: No items available
|
|
18.
|
Security intelligence : a practitioner's guide to solving enterprise security challenges / Qing Li, Gregory Clark.
by Li, Qing, 1971- [author.] | Clark, Gregory [author.]. Material type: Book; Format:
available online
; Literary form:
Not fiction
Publisher: Indianapolis, IN : Wiley, 2015Online access: Wiley Online Library Availability: No items available
|
|
19.
|
Beyond cybersecurity : protecting your digital business / James M. Kaplan, Tucker Bailey, Chris Rezek, Derek O'Halloran, Alan Marcus.
by Kaplan, James M [author.] | Bailey, Tucker [author.] | Rezek, Chris [author.] | O'Halloran, Derek [author.] | Marcus, Alan [author.]. Material type: Book; Format:
available online
; Literary form:
Not fiction
Publisher: Hoboken, New Jersey : Wiley, 2015Online access: Wiley Online Library Availability: No items available
|
|
20.
|
Introduction to network security : theory and practice / Jie Wang, Department of Computer Science at the University of Massachusetts Lowell and Zachary A. Kissel, Department of Computer Science at Merrimack College in North Andover, MA.
by Wang, Jie, 1961- | Kissel, Zachary A. Edition: Second edition.Material type: Book; Format:
available online
; Literary form:
Not fiction
Publisher: Hoboken, NJ : Singapore : Wiley ; HEP, 2015Online access: Wiley Online Library Availability: No items available
|
|
21.
|
Network attacks and exploitation : a framework / Matthew Monte.
by Monte, Matthew [author.]. Material type: Book; Format:
available online
; Literary form:
Not fiction
Publisher: Indianapolis, IN : Wiley, 2015Copyright date: ©2015Other title: Network attacks & exploitation.Online access: Wiley Online Library Availability: No items available
|
|
22.
|
The network security test lab : a step-by-step guide / Michael Gregg.
by Gregg, Michael (Michael C.) [author.]. Material type: Book; Format:
available online
; Literary form:
Not fiction
Publisher: Indianapolis, IN : Wiley, [2015]Copyright date: ©2015Online access: Wiley Online Library Availability: No items available
|
|
23.
|
The antivirus hacker's handbook / Joxean Koret, Elias Bachaalany.
by Koret, Joxean [author.] | Bachaalany, Elias [author.]. Material type: Book; Format:
available online
; Literary form:
Not fiction
Publisher: Indianapolis, IN : John Wiley & Sons, Inc., [2015]Copyright date: ©2015Online access: Wiley Online Library Availability: No items available
|
|
24.
|
Engineering information security : the application of systems engineering concepts to achieve information assurance / Stuart Jacobs.
by Jacobs, Stuart [author.]. Edition: Second edition.Material type: Book; Format:
available online
; Literary form:
Not fiction
Publisher: Piscataway, NJ : Hoboken, N.J. : IEEE Press ; Wiley, [2016]Copyright date: ©2016Online access: Wiley Online Library Availability: No items available
|
|
25.
|
Distributed networks : intelligence, security, and applications / edited by Qurban A. Memon.
by Memon, Qurban Ali [editor.]. Material type: Book; Format:
available online
; Literary form:
Not fiction
Publisher: Boca Raton : Taylor & Francis, 2014Online access: Distributed by publisher. Purchase or institutional license may be required for access. Availability: No items available
|
|
26.
|
Handbook of financial cryptography and security [electronic resource] / editor, Burton Rosenberg.
by Rosenberg, Burton. Material type: Book; Format:
electronic
available online
; Literary form:
Not fiction
Publisher: Boca Raton : Chapman & Hall/CRC, 2010Online access: Distributed by publisher. Purchase or institutional license may be required for access. Availability: No items available
|
|
27.
|
Network anomaly detection : a machine learning perspective / Dhruba Kumar Bhattacharyya, Jugal Kumar Kalita.
by Bhattacharyya, Dhruba K [author.] | Kalita, Jugal Kumar [author]. Material type: Book; Format:
available online
; Literary form:
Not fiction
Publisher: Boca Raton : CRC Press, [2014]Copyright date: �201Online access: Distributed by publisher. Purchase or institutional license may be required for access Availability: No items available
|
|
28.
|
Managing trust in cyberspace / edited by Sabu M. Thampi, Bharat Bhargava, Pradeep K. Atrey.
by Thampi, Sabu M [editor of compilation] | Bhargava, Bharat K, 1948- [editor of compilation] | Atrey, Pradeep [editor of compilation]. Material type: Book; Format:
available online
; Literary form:
Not fiction
Publisher: Boca Raton : Taylor & Francis, [2014]Copyright date: �201Online access: Distributed by publisher. Purchase or institutional license may be required for access Availability: No items available
|
|
29.
|
Honeypot [electronic resource] : a new paradigm to information security / R.C. Joshi, Anjali Sardana.
by Joshi, R. C | Sardana, Anjali. Material type: Book; Format:
electronic
available online
; Literary form:
Not fiction
Publisher: Enfield, N.H. : Science Publishers, 2011Online access: Distributed by publisher. Purchase or institutional license may be required for access. Availability: No items available
|
|
30.
|
Enhancing computer security with smart technology [electronic resource] / editor, V. Rao Vemuri.
by Vemuri, V. Rao. Material type: Book; Format:
electronic
available online
; Literary form:
Not fiction
Publisher: Boca Raton, FL : Auerbach Publications, 2006Online access: Distributed by publisher. Purchase or institutional license may be required for access. Availability: No items available
|
|
31.
|
Iris biometric model for secured network access [electronic resource] / Franjieh El Khoury.
by Khoury, Franjieh El. Material type: Book; Format:
electronic
available online
; Literary form:
Not fiction
Publisher: Boca Raton : CRC Press, 2013Online access: Distributed by publisher. Purchase or institutional license may be required for access. Availability: No items available
|
|
32.
|
Security and policy driven computing [electronic resource] / Lei Liu.
by Liu, Lei, 1968-. Material type: Book; Format:
electronic
available online
; Literary form:
Not fiction
Publisher: Boca Raton, Fla. : CRC Press, c2011Online access: Distributed by publisher. Purchase or institutional license may be required for access. Availability: No items available
|
|
33.
|
Data mining tools for malware detection [electronic resource] / Mehedy Masud, Latifur Khan and Bhavani Thuraisingham.
by Masud, Mehedy | Khan, Latifur | Thuraisingham, Bhavani M. Material type: Book; Format:
electronic
available online
; Literary form:
Not fiction
Publisher: Boca Raton, Fla. : CRC Press, 2012Online access: Distributed by publisher. Purchase or institutional license may be required for access. Availability: No items available
|
|
34.
|
What every engineer should know about cyber security and digital forensics / Joanna F. DeFranco.
by DeFranco, Joanna F [author.]. Material type: Book; Format:
available online
; Literary form:
Not fiction
Publisher: Boca Raton : CRC Press, [2014]Copyright date: �201Other title: Cyber security and digital forensics.Online access: Distributed by publisher. Purchase or institutional license may be required for access Availability: No items available
|
|
35.
|
What every engineer should know about cyber security and digital forensics / Joanna F. DeFranco.
by DeFranco, Joanna F [author.]. Material type: Book; Format:
available online
; Literary form:
Not fiction
Publisher: Boca Raton : CRC Press, [2014]Copyright date: �201Other title: Cyber security and digital forensics.Online access: Distributed by publisher. Purchase or institutional license may be required for access Availability: No items available
|
|
36.
|
Automatic defense against zero-day polymorphic worms in communication networks [electronic resource] / Mohssen Mohammed, Al-Sakib Khan Pathan.
by Mohammed, Mohssen, 1982- | Pathan, Al-Sakib Khan. Material type: Book; Format:
electronic
available online
; Literary form:
Not fiction
Publisher: Boca Raton, Fla. : CRC Press, 2013Online access: Distributed by publisher. Purchase or institutional license may be required for access. Availability: No items available
|