Refine your search

Your search returned 80 results.

Not what you expected? Check for suggestions
Sort
Results
Web security, privacy and commerce / Simson Garfinkel with Gene Spafford. by
  • Garfinkel, Simson
  • Spafford, Gene
Edition: 2nd ed., expanded & updated.
Material type: Text Text; Literary form: Not fiction ; Audience: Specialized;
Publication details: California : O'Reilly Media, c.2002
Other title:
  • Web security, privacy & commerce
Availability: Items available for loan: Central Library (3)Call number: 005.8 GAR, ...

Web application security : a beginner's guide / Bryan Sullivan, Vincent Liu. by
  • Sullivan, Bryan, 1974-
  • Liu, Vincent
Material type: Text Text; Literary form: Not fiction ; Audience: Specialized;
Publication details: New York : McGraw-Hill, c.2012
Availability: Items available for loan: Central Library (1)Call number: 005.8 SUL.

Client-side attacks and defense / Robert Shimonski, Sean-Philip Oriyano. by
  • Shimonski, Robert
  • Oriyano, Sean-Philip
Material type: Text Text; Literary form: Not fiction ; Audience: Specialized;
Publication details: Waltham : Elsevier / Syngress, c.2012
Availability: Items available for loan: Central Library (1)Call number: 005.8 SHI.

Computational network science : an algorithmic approach / Henry Hexmoor. by
  • Hexmoor, Henry, 1960-
Series: Computer science reviews and trends
Material type: Text Text; Literary form: Not fiction ; Audience: Specialized;
Publication details: Waltham : Morgan Kaufmann / Elsevier, c.2015
Availability: Items available for loan: Central Library (1)Call number: 005.8 HEX.

Network security : a beginner's guide / Eric Maiwald. by
  • Maiwald, Eric
Edition: 3rd ed.
Material type: Text Text; Literary form: Not fiction ; Audience: Specialized;
Publication details: New York : McGraw-Hill, c.2013
Availability: Items available for loan: Central Library (1)Call number: 005.8 MAI.

Security risk management : building an information security risk management program from the ground up / Evan Wheeler ; technical editor Kenneth Swick. by
  • Wheeler, Evan
  • Swick, Kenneth [editor.]
Material type: Text Text; Literary form: Not fiction ; Audience: Specialized;
Publication details: Waltham : Elsevier, c.2011
Availability: Items available for loan: Central Library (1)Call number: 005.8 WHE.

The basics of information security : understanding the fundamentals of InfoSec in theory and practice / Jason Andress ; editor Russ Rogers. by
  • Andress, Jason
Material type: Text Text; Literary form: Not fiction ; Audience: Specialized;
Publication details: Waltham : Syngress / Elsevier, c.2011
Availability: Items available for loan: Central Library (1)Call number: 005.8 AND.

Digital forensics for network, internet, and cloud computing : a forensic evidence guide for moving targets and data / Terrence V. Lillard ... [et al.] ; technical editor, Jim Murray. by
  • Lillard, Terrence
  • Murray, Jim [editor.]
Material type: Text Text; Literary form: Not fiction ; Audience: Specialized;
Publication details: Burlington : Syngress / Elsevier, c.2010
Availability: Items available for loan: Central Library (1)Call number: 363.2502854678 DIG.

Applied network security monitoring : collection, detection, and analysis / Chris Sanders, Jason Smith ; editor David J. Bianco by
  • Sanders, Chris, 1986-
  • Smith, Jason
  • Bianco, David J [editor.]
Material type: Text Text; Literary form: Not fiction ; Audience: Specialized;
Publication details: Waltham : Syngress / Elsevier, c.2014
Availability: Items available for loan: Central Library (1)Call number: 005.8 SAN.

Modern cryptography : applied mathematics for encryption and information security / Chuck Easttom. by
  • Easttom, Chuck
Material type: Text Text; Literary form: Not fiction ; Audience: Specialized;
Publication details: New York : McGraw Hill Education, c.2016
Availability: Items available for loan: Central Library (3)Call number: 005.82 EAS, ...

Security intelligence : a practitioner's guide to solving enterprise security challenges / Qing Li, Gregory Clark. by
  • Li, Qing, 1971-
  • Clark, Gregory
Material type: Text Text; Literary form: Not fiction ; Audience: Specialized;
Publication details: New Delhi : Wiley, c.2015
Availability: Items available for loan: Central Library (1)Call number: 005.8 LII.

Information assurance handbook : effective computer security and risk management strategies / Corey Schou, Steven Hernandez. by
  • Schou, Corey
  • Hernandez, Steven
Material type: Text Text; Literary form: Not fiction ; Audience: Specialized;
Publication details: New York : McGraw Hill Education, c.2015
Availability: Items available for loan: Central Library (1)Call number: 658.478 SCH.

Security intelligence : a practitioner's guide to solving enterprise security challenges / Qing Li, Gregory Clark. by
  • Li, Qing, 1971-
  • Clark, Gregory (Gregory S.)
Material type: Text Text; Literary form: Not fiction ; Audience: Specialized;
Publication details: Indianapolis : John Wiley & Sons, c.2015
Availability: Items available for loan: Central Library (1)Call number: 005.8 LII.

Securing systems : applied security architecture and threat models / Brook S. E. Schoenfield ; forewords by John N. Stewart and James F. Ransome. by
  • Schoenfield, Brook S. E
  • Stewart, John N [author of introduction, etc.]
  • Ransome, James F [author of introduction, etc.]
Material type: Text Text; Literary form: Not fiction ; Audience: Specialized;
Publication details: Boca Raton : CRC Press / Taylor & Francis Group, c.2015
Availability: Items available for loan: Central Library (1)Call number: 005.8 SCH.

Information security for managers / Michael Workman, Daniel C. Phelps, John N. Gathegi. by
  • Workman, Michael D, 1957-
  • Phelps, Daniel C
  • Gathegi, John Ng'ang'a
Material type: Text Text; Literary form: Not fiction ; Audience: Specialized;
Publication details: Burlington : Jones & Bartlett Learning, c.2013
Availability: Items available for loan: Central Library (1)Call number: 658.478 WOR.

Cybersecurity : managing systems, conducting testing, and investigating intrusions / Thomas J. Mowbray. by
  • Mowbray, Thomas J
Edition: 1st edition.
Material type: Text Text; Literary form: Not fiction ; Audience: Specialized;
Publication details: Indianapolis : John Wiley & Sons, c.2014
Availability: Not available: Central Library: Checked out (1).

Cryptographic protocol : security analysis based on trusted freshness / Ling Dong, Kefei Chen. by
  • Dong, Ling
  • Chen, Kefei
Material type: Text Text; Literary form: Not fiction ; Audience: Specialized;
Publication details: Heidelberg : Springer-Verlag, c.2012
Availability: Items available for loan: Central Library (1)Call number: 005.82 DON.

How to defeat advanced malware : new tools for protection and forensics / Henry Dalziel. by
  • Dalziel, Henry
Material type: Text Text; Literary form: Not fiction ; Audience: Specialized;
Publication details: Waltham : Syngress / Elsevier, c.2015
Availability: Items available for loan: Central Library (1)Call number: 005.8 DAL.

Cryptography and information security / V. K. Pachghare. by
  • Pachghare, V. K
Edition: 2nd ed.
Material type: Text Text; Literary form: Not fiction ; Audience: Specialized;
Publication details: New Delhi : PHI Learning Private Limited, c.2015
Availability: Items available for loan: Central Library (1)Call number: 005.82 PAC.

Security for cloud storage systems / Kan Yang, Xiaohua Jia. by
  • Yang, Kan
  • Jia, Xiaohua
Series: Springer briefs in computer science
Material type: Text Text; Literary form: Not fiction ; Audience: Specialized;
Publication details: New York : Springer, c.2014
Availability: Items available for loan: Central Library (1)Call number: 005.8 YAN.

Pages