Your search returned 50 results.

1.
CISSP guide to security essentials / Peter Gregory.

by Gregory, Peter H.

Material type: Text Text Publisher: Boston Course Technology c2010Availability: Items available for loan: Call number: 005.8 GRE 2010 (2).

2.
Embedded systems security : practical methods for safe and secure software and systems development / David Kleidermacher, Mike Kleidermacher.

by Kleidermacher, David.

Edition: 1st ed..Material type: Text Text Publisher: Amsterdam Elsevier 2012Availability: Items available for loan: Call number: 005.8 KLE 2012 (1).

3.
Unix system security tools / Seth T. Ross.

by Ross Seth T.

Material type: Text Text Publisher: New York McGraw Hill 1999Availability: Items available for loan: Call number: 005.8 ROS 1999 (3).

4.
The Twofish encryption algorithm : a 128-bit block cipher / Bruce Schneier ... [et al.].

by Schneier, Bruce, 1963-.

Material type: Text Text Publisher: New York John Wiley & Sons c1999Availability: Items available for loan: Call number: 005.82 TWO 1999 (1).

5.
Protect your privacy on the Internet / Bryan Pfaffenberger.

by PFAFFENBERGER Bryan, 1949-.

Material type: Text Text Publisher: New York John Wiley & Sons 1997Availability: Items available for loan: Call number: 005.8 PFA 1997 (4).

6.
Java network security / Robert Macgregor ... [et al.].

by Macgregor, Robert.

Material type: Text Text Publisher: New Jersey Prentice Hall 1998Availability: Items available for loan: Call number: 005.8 JAV 1998 (4).

7.
Computers, ethics & social values / edited by Deborah G. Johnson, Helen Nissenbaum.

by Johnson, Deborah G | Nissenbaum, Helen.

Material type: Text Text Publisher: Upper Saddle River, N.J. Prentice Hall 1995Availability: Items available for loan: Call number: 174.90904 COM 1995 (1).

8.
Cryptography and network security : principles and practice / William Stallings.

by Stallings.

Edition: 2nd ed..Material type: Text Text Publisher: New Jersey Prentice Hall International 1999Availability: Items available for loan: Call number: 005.8 STA 1999 (2).

9.
Fighting computer crime : a new framework for protecting information / Donn B. Parker.

by Parker.

Material type: Text Text Publisher: New York John Wiley and Sons 1998Availability: Items available for loan: Call number: 658.478 PAR 1998 (3).

10.
Computer security / Dieter Gollmann.

by Gollmann.

Material type: Text Text Publisher: Chichester John Wiley & Sons 1999Availability: Items available for loan: Call number: 005.8 GOL 1999 (5).

11.
Computer security assurance using the common criteria / Mark Merkow S., James Breithaupt.

by Merkow | Breithaupt, James.

Material type: Text Text Publisher: New York Thomson Delmar Learning 2005Availability: Items available for loan: Call number: 005.8 MER 2005 (1).

12.
Hacker V : pakar keselamatan rangkaian norton internet security.

Material type: Text Text Publisher: Kuala Lumpur Kwei Information 2003Availability: Items available for loan: Call number: 005.44 HAC 2003 (1).

13.
Computer security : 20 things every employee should know / Ben Rothke.

by Rothke.

Material type: Text Text Publisher: New York McGraw-Hill 2005Availability: Items available for reference: Not for loanCall number: 005.8 ROT 2005 (1). :

14.
Information warfare in business : strategies of control and resistance in the network society / Iain Munro.

by Munro.

Material type: Text Text Publisher: London Routledge 2004Availability: Items available for loan: Call number: 303.4833 MUN 2004 (1).

15.
Phishing and countermeasures : understanding the increasing problem of electronic identity theft; edited by Markus Jakobsson, Steven Myers.

by Myers, Steven.

Material type: Text Text Publisher: Hoboken John Wiley and Sons 2007Availability: Items available for loan: Call number: 364.163 PHI 2007 (1).

16.
Firewall fundamentals / Wes Noonan, Ido Dubrawsky.

by Noonan | Dubrawsky, Ido.

Material type: Text Text Publisher: Indianapolis Cisco Press 2006Availability: Items available for loan: Call number: 005.8 NOO 2006 (1).

17.
Intrusion prevention fundamentals / Earl Carter, Jonathan Hogue.

by Carter | Hogue, Jonathan.

Material type: Text Text Publisher: Indianapolis Cisco Press 2006Availability: Items available for loan: Call number: 005.8 CAR 2006 (1).

18.
Guide to Linux networking and security / Nicholas Wells.

by Wells.

Material type: Text Text Publisher: United Kingdom Thomson Course Technology 2003Availability: Items available for loan: Call number: 005.432 WEL 2003 (3).

19.
Building and implementing a security certification and accreditation program : official (ISC) guide to the CAP CBK / Patrick D. Howard.

by Howard.

Material type: Text Text Publisher: Boca Raton Auerbach Publications 2006Availability: Items available for loan: Call number: 005.8 HOW 2006 (1).
Lists:

20.
The security risk assessment handbook : a complete guide for performing security risk assessments / Douglas J. Landoll.

by Landoll.

Material type: Text Text Publisher: Boca Raton Auerbach Publications 2006Availability: Items available for loan: Call number: 658.47 LAN 2006 (1).

Powered by Koha