|
|
005.8 Ar75 2007
|
|
|
The art of software security testing : identifying software security flaws / Chris Wysopal ... [et al
Axe 3rd Floor Stacks:Available
|
|
2007
|
|
005.8 As32s 2009 : Ashbaugh, Douglas A.
|
|
|
Security software development : assessing and managing security risks / Douglas A. Ashbaugh.
Axe 3rd Floor Stacks:Available
|
|
2009
|
|
005.8 B275s 2001 : Barrett, Daniel J.
|
|
|
SSH, the secure shell : the definitive guide / Daniel J. Barrett and Richard E. Silverman.
Axe 3rd Floor Stacks:Available
|
|
2001
|
|
005.8 B326l 2005 : Bauer, Michael D.
|
|
|
Linux server security / Michael D. Bauer.
Axe 3rd Floor Stacks:Available
|
|
2005
|
|
005.8 B386h 2010 : Beaver, Kevin.
|
|
|
Hacking for dummies / by Kevin Beaver ; foreword by Stuart McClure.
Axe 3rd Floor Stacks:Available
|
|
2010
|
|
005.8 B469w 2003 : Bhasin, Shweta,
|
|
|
Web security basics / Shweta Bhasin ; with NIIT.
Axe 3rd Floor Stacks:Available
|
|
2003
|
|
005.8 B541i 2005 : Bishop, Matt
|
|
|
Introduction to computer security / Matt Bishop.
Axe 3rd Floor Stacks:Available
|
|
2005
|
|
005.8 B832c 2005 : Bruen, Aiden A.,
|
|
|
Cryptography, information theory, and error-correction : a handbook for the 21st century / Aiden A. B
Axe 3rd Floor Stacks:Available
|
|
2005
|
|
005.8 C127i 2005 : Calder, Alan,
|
|
|
IT governance : a manager's guide to data security and BS 7799/ISO 17799 / Alan Calder, Steve Watkins
Axe 3rd Floor Stacks:Available
|
|
2005
|
|
005.8 C137p 2004 : Caloyannides, Michael A.
|
|
|
Privacy protection and computer forensics / Michael A. Caloyannides.
Axe 3rd Floor Stacks:Available
|
|
2004
|
|
005.8 C425s 2007 : Chess, Brian.
|
|
|
Secure programming with static analysis / Brian Chess, Jacob West.
Axe 3rd Floor Stacks:Available
|
|
2007
|
|
005.8 C553s 2009 : Clarke, Justin.
|
|
|
SQL injection attacks and defense / Justin Clarke, lead author and technical editor ; [contributing a
Axe 3rd Floor Stacks:Available
|
|
2009
|
|
005.8 D342c 2009 : Deal, Richard A.
|
|
|
Cisco ASA configuration / Richard A. Deal.
Axe 3rd Floor Stacks:Available
|
|
2009
|
|
005.8 D434u 2005 : Dent, Alexander W.
|
|
|
User's guide to cryptography and standards / Alexander W. Dent, Chris J. Mitchell.
Axe 3rd Floor Stacks:Available
|
|
2005
|
|
005.8 D535l 2003 : Dhanjani, Nitesh.
|
|
|
Linux and UNIX security portable reference / Nitesh Dhanjani.
Axe 3rd Floor Stacks:Available
|
|
2003
|
|
005.8 F126n 2006 : Fadia, Ankit,
|
|
|
Network security : a hacker's perspective / Ankit Fadia.
Axe 3rd Floor Stacks:Available
|
|
2006
|
|
005.8 F126u 2006 : Fadia, Ankit,
|
|
|
The unofficial guide to ethical hacking / Ankit Fadia.
Axe 3rd Floor Stacks:Available
|
|
2006
|
|
005.8 G18p 2003 : Garfinkel, Simson.
|
|
|
Practical UNIX and Internet security / Simson Garfinkel, Gene Spafford, and Alan Schwartz.
Axe 3rd Floor Stacks:Available
|
|
2003
|
|
005.8 G758s 2003 : Graff, Mark.
|
|
|
Secure coding : principles and practices / Mark G. Graff and Kenneth R. van Wyk.
Axe 3rd Floor Stacks:Available
|
|
2003
|
|
005.8 H115 2003
|
|
|
Hacker's challenge 2 : test your network security & forensic skills / Mike D. Schiffman ... [et al.].
Axe 3rd Floor Stacks:Available
|
|
2003
|
|
005.8 H115c 2006
|
|
|
Hacker's challenge 3 : 20 brand-new forensic scenarios & solutions / David Pollino ... [et al.].
Axe 3rd Floor Stacks:Available
|
|
2006
|
|
005.8 H117s 2011 : Hadnagy, Christopher.
|
|
|
Social engineering : the art of human hacking / by Christopher Hadnagy.
Axe 3rd Floor Stacks:Available
|
|
2011
|
|
005.8 H217 2005
|
|
|
Hardening network security / John Mallery ... [et al.].
Axe 3rd Floor Stacks:Available
|
|
2005
|
|
005.8 H246n 2005 : Harrington, Jan L.
|
|
|
Network security : a practical approach / Jan L. Harrington.
Axe 3rd Floor Stacks:Available
|
|
2005
|
|
005.8 H835s 2006 : Howard, Michael,
|
|
|
The security development lifecycle : SDL, a process for developing demonstrably more secure software
Axe 3rd Floor Stacks:Available
|
|
2006
|
|
005.8 H835t 2010 : Howard, Michael,
|
|
|
24 deadly sins of software security : programming flaws and how to fix them / Michael Howard, David L
Axe 3rd Floor Stacks:Available
|
|
2010
|
|
005.8 H835w 2003 : Howard, Michael,
|
|
|
Writing secure code / Michael Howard and David LeBlanc.
Axe 3rd Floor Stacks:Available
|
|
2003
|
|
005.8 In3 2007
|
|
|
Information security research : new methods for protecting against cyber threats / Department of Defe
Axe 3rd Floor Stacks:Available
|
|
2007
|
|
005.8 In8 2008
|
|
|
Intrusion detection systems / edited by Roberto Di Pietro and Luigi V. Mancini.
Axe 3rd Floor Stacks:Available
|
|
2008
|
|
005.8 K116e 2007 : Kadrich, Mark.
|
|
|
Endpoint security / Mark Kadrich.
Axe 3rd Floor Stacks:Available
|
|
2007
|
|
005.8 K159i 2008 : Katz, Jonathan,
|
|
|
Introduction to modern cryptography / Jonathan Katz, Yehuda Lindell.
Axe 3rd Floor Stacks:Available
|
|
2008
|
|
005.8 K658c : Kizza, Joseph Migga.
|
|
|
Computer network security and cyber ethics / by Joseph Migga Kizza.
Axe 3rd Floor Stacks:Available
|
|
2001
|
|
005.8 L498p 2006 : Ledford, Jerri L.
|
|
|
The personal cybersecurity Bible / Jerri L. Ledford.
Axe 3rd Floor Stacks:Available
|
|
2006
|
|
005.8 L579c : Levy, Steven.
|
|
|
Crypto : how the code rebels beat the government, saving privacy in the digital age / Steven Levy.
Axe 3rd Floor Stacks:Available
|
|
2001
|
|
005.8 L74c 2009 : Liu, Dale.
|
|
|
Cisco router and switch forensics : investigating and analyzing malicious network activity / Dale Liu
Axe 3rd Floor Stacks:Available
|
|
2009
|
|
005.8 L742s 2011 : Liu, Lei,
|
|
|
Security and policy driven computing / Lei Liu.
Axe 3rd Floor Stacks:Available
|
|
2011
|
|
005.8 M127o 2007 : McCarthy, Linda.
|
|
|
Own your space : keep yourself and your stuff safe online / Linda McCarthy.
Axe 3rd Floor Stacks:Available
|
|
2007
|
|
005.8 M178s 2006 : McGraw, Gary,
|
|
|
Software security : building security in / Gary McGraw.
Axe 3rd Floor Stacks:Available
|
|
2006
|
|
005.8 N389 2011
|
|
|
Network security, administration, and management : advancing technology and practice / Dulal Chandra
Axe 3rd Floor Stacks:Available
|
|
2011
|
|
005.8 N467c 2010 : Newman, Robert C.
|
|
|
Computer security : protecting digital resources / Robert C. Newman.
Axe 3rd Floor Stacks:Available
|
|
2010
|
|
005.8 On2w 2003 : O'Neill, Mark.
|
|
|
Web services security / Mark O'Neill ... [et al].
Axe 3rd Floor Stacks:Available
|
|
2003
|
|
005.8 P194c 2004 : Panko, R. R.
|
|
|
Corporate computer and network security / Raymond R. Panko.
Axe 3rd Floor Stacks:Available
|
|
2003
|
|
005.8 P483s 2003 : Pfleeger, Charles P.,
|
|
|
Security in computing / Charles P. Pfleeger, Shari Lawrence Pfleeger.
Axe 3rd Floor Stacks:Available
|
|
2003
|
|
005.8 P483s 2007 : Pfleeger, Charles P.,
|
|
|
Security in computing / Charles P. Pfleeger, Shari Lawrence Pfleeger.
Axe 3rd Floor Stacks:Available
|
|
2007
|
|
005.8 P538h 2010 : Philipp, Aaron.
|
|
|
Hacking exposed : computer forensics / Aaron Philipp, David Cowen, Chris Davis.
Axe 3rd Floor Stacks:Available
|
|
2010
|
|
005.8 P599f 2003 : Pieprzyk, Josef,
|
|
|
Fundamentals of computer security / Josef Pieprzyk, Thomas Hardjono, Jennifer Seberry.
Axe 3rd Floor Stacks:Available
|
|
2003
|
|
005.8 P939 2011
|
|
|
Privacy online : perspectives on privacy and self-disclosure in the social web / Sabine Trepte, Leona
Axe 3rd Floor Stacks:Available
|
|
2011
|
|
005.8 R126i 2010 : Raggad, Bel G.
|
|
|
Information security management : concepts and practice / Bel G. Raggad.
Axe 3rd Floor Stacks:Available
|
|
2010
|
|
005.8 Sch58d 2015 : Schneier, Bruce,
|
|
|
Data and Goliath : the hidden battles to collect your data and control your world / Bruce Schneier.
Axe 3rd Floor Stacks:Available
|
|
2015
|
|
005.8 Sd46 2007 : SDM 2007
|
|
|
Secure data management : 4th VLDB workshop, SDM 2007, Vienna, Austria, September 23-24, 2007 : procee
Axe 3rd Floor Stacks:Available
|
|
2007
|
Add Marked to Bag
Add All On Page
|