005.8 D535l 2003 : Dhanjani, Nitesh.
Linux and UNIX security portable reference / Nitesh Dhanjani.
Axe 3rd Floor Stacks:Available
2003
005.8 F126n 2006 : Fadia, Ankit,
Network security : a hacker's perspective / Ankit Fadia.
Axe 3rd Floor Stacks:Available
2006
005.8 F126u 2006 : Fadia, Ankit,
The unofficial guide to ethical hacking / Ankit Fadia.
Axe 3rd Floor Stacks:Available
2006
005.8 G18p 2003 : Garfinkel, Simson.
Practical UNIX and Internet security / Simson Garfinkel, Gene Spafford, and Alan Schwartz.
Axe 3rd Floor Stacks:Available
2003
005.8 G758s 2003 : Graff, Mark.
Secure coding : principles and practices / Mark G. Graff and Kenneth R. van Wyk.
Axe 3rd Floor Stacks:Available
2003
005.8 H115 2003
Hacker's challenge 2 : test your network security & forensic skills / Mike D. Schiffman ... [et al.].
Axe 3rd Floor Stacks:Available
2003
005.8 H115c 2006
Hacker's challenge 3 : 20 brand-new forensic scenarios & solutions / David Pollino ... [et al.].
Axe 3rd Floor Stacks:Available
2006
005.8 H117s 2011 : Hadnagy, Christopher.
Social engineering : the art of human hacking / by Christopher Hadnagy.
Axe 3rd Floor Stacks:Available
2011
005.8 H217 2005
Hardening network security / John Mallery ... [et al.].
Axe 3rd Floor Stacks:Available
2005
005.8 H246n 2005 : Harrington, Jan L.
Network security : a practical approach / Jan L. Harrington.
Axe 3rd Floor Stacks:Available
2005
005.8 H835s 2006 : Howard, Michael,
The security development lifecycle : SDL, a process for developing demonstrably more secure software
Axe 3rd Floor Stacks:Available
2006
005.8 H835t 2010 : Howard, Michael,
24 deadly sins of software security : programming flaws and how to fix them / Michael Howard, David L
Axe 3rd Floor Stacks:Available
2010
005.8 H835w 2003 : Howard, Michael,
Writing secure code / Michael Howard and David LeBlanc.
Axe 3rd Floor Stacks:Available
2003
005.8 In3 2007
Information security research : new methods for protecting against cyber threats / Department of Defe
Axe 3rd Floor Stacks:Available
2007
005.8 In8 2008
Intrusion detection systems / edited by Roberto Di Pietro and Luigi V. Mancini.
Axe 3rd Floor Stacks:Available
2008
005.8 K116e 2007 : Kadrich, Mark.
Endpoint security / Mark Kadrich.
Axe 3rd Floor Stacks:Available
2007
005.8 K159i 2008 : Katz, Jonathan,
Introduction to modern cryptography / Jonathan Katz, Yehuda Lindell.
Axe 3rd Floor Stacks:Available
2008
005.8 K658c : Kizza, Joseph Migga.
Computer network security and cyber ethics / by Joseph Migga Kizza.
Axe 3rd Floor Stacks:Available
2001
005.8 L498p 2006 : Ledford, Jerri L.
The personal cybersecurity Bible / Jerri L. Ledford.
Axe 3rd Floor Stacks:Available
2006
005.8 L579c : Levy, Steven.
Crypto : how the code rebels beat the government, saving privacy in the digital age / Steven Levy.
Axe 3rd Floor Stacks:Available
2001
005.8 L74c 2009 : Liu, Dale.
Cisco router and switch forensics : investigating and analyzing malicious network activity / Dale Liu
Axe 3rd Floor Stacks:Available
2009
005.8 L742s 2011 : Liu, Lei,
Security and policy driven computing / Lei Liu.
Axe 3rd Floor Stacks:Available
2011
005.8 M127o 2007 : McCarthy, Linda.
Own your space : keep yourself and your stuff safe online / Linda McCarthy.
Axe 3rd Floor Stacks:Available
2007
005.8 M178s 2006 : McGraw, Gary,
Software security : building security in / Gary McGraw.
Axe 3rd Floor Stacks:Available
2006
005.8 N389 2011
Network security, administration, and management : advancing technology and practice / Dulal Chandra
Axe 3rd Floor Stacks:Available
2011
005.8 N467c 2010 : Newman, Robert C.
Computer security : protecting digital resources / Robert C. Newman.
Axe 3rd Floor Stacks:Available
2010
005.8 On2w 2003 : O'Neill, Mark.
Web services security / Mark O'Neill ... [et al].
Axe 3rd Floor Stacks:Available
2003
005.8 P194c 2004 : Panko, R. R.
Corporate computer and network security / Raymond R. Panko.
Axe 3rd Floor Stacks:Available
2003
005.8 P483s 2003 : Pfleeger, Charles P.,
Security in computing / Charles P. Pfleeger, Shari Lawrence Pfleeger.
Axe 3rd Floor Stacks:Available
2003
005.8 P483s 2007 : Pfleeger, Charles P.,
Security in computing / Charles P. Pfleeger, Shari Lawrence Pfleeger.
Axe 3rd Floor Stacks:Available
2007
005.8 P538h 2010 : Philipp, Aaron.
Hacking exposed : computer forensics / Aaron Philipp, David Cowen, Chris Davis.
Axe 3rd Floor Stacks:Available
2010
005.8 P599f 2003 : Pieprzyk, Josef,
Fundamentals of computer security / Josef Pieprzyk, Thomas Hardjono, Jennifer Seberry.
Axe 3rd Floor Stacks:Available
2003
005.8 P939 2011
Privacy online : perspectives on privacy and self-disclosure in the social web / Sabine Trepte, Leona
Axe 3rd Floor Stacks:Available
2011
005.8 R126i 2010 : Raggad, Bel G.
Information security management : concepts and practice / Bel G. Raggad.
Axe 3rd Floor Stacks:Available
2010
005.8 Sch58d 2015 : Schneier, Bruce,
Data and Goliath : the hidden battles to collect your data and control your world / Bruce Schneier.
Axe 3rd Floor Stacks:Available
2015
005.8 Sd46 2007 : SDM 2007
Secure data management : 4th VLDB workshop, SDM 2007, Vienna, Austria, September 23-24, 2007 : procee
Axe 3rd Floor Stacks:Available
2007
005.8 Sd46 2010 : SDM 2010
Secure data management : 7th VLDB Workshop, SDM 2010, Singapore, September 17, 2010 : proceedings / W
Axe 3rd Floor Stacks:Available
2010
005.8 Se26 2004
The Secure online business handbook : e-Commerce, IT functionality, & business continuity / [consulta
Axe 3rd Floor Stacks:Available
2004
005.8 Se262c 2012
Securing the clicks : network security in the age of social media / Gary Bahadur ... [et al.].
Axe 3rd Floor Stacks:Available
2012
005.8 Se263 2007
Security, privacy and trust in modern data management / Milan Petkovic, Willem Jonker (eds.).
Axe 3rd Floor Stacks:Available
2007
005.8 Sh44h 2003 : Shema, Mike.
Hacknotes web security portable reference / Mike Shema.
Axe 3rd Floor Stacks:Available
2003
005.8 Sl12s 2004 : Slade, Robert.
Software forensics : collecting evidence from the scene of a digital crime / Robert M. Slade.
Axe 3rd Floor Stacks:Available
2004
005.8 So47c 2011 : Solomon, Michael
Computer forensics jumpstart / Michael G. Solomon, K Rudolph, Ed Tittel, Neil Broom, Diane Barrett.
Axe 3rd Floor Stacks:Available
2011
005.8 Sp32p 2002 : Speed, Tim.
The personal Internet security guidebook : keeping hackers and crackers out of your home / Timothy Sp
Axe 3rd Floor Stacks:Available
2002
005.8 Sz56a 2005 : Szor, Peter.
The art of computer virus research and defense / Peter Szor.
Axe 3rd Floor Stacks:Available
2005
005.8 T635d 2011 : Torrenzano, Richard.
Digital assassination : protecting your reputation, brand, or business against online attacks / Richa
Axe 3rd Floor Stacks:Available
2011
005.8 V887c 2007 : Volonino, Linda.
Computer forensics : principles and practices / Linda Volonino, Reynaldo Anzaldua, Jana Godwin ; cont
Axe 3rd Floor Stacks:Available
2007
005.8023 M228c 2007 : McMillan, Troy.
Change your career. Computer network security as your new profession / Troy McMillan.
Axe 3rd Floor Stacks:Available
2007
005.8068 If5s 2005 : IFIP TC-11 WG 11.1 & WG 11.5 Joint Working Conference on Security Management, Integrity, and Internal Control in Information Systems
Security management, integrity, and internal control in information systems : IFIP TC-11 WG 11.1 & WG
Axe 3rd Floor Stacks:Available
2005
005.82 B326d 2007 : Bauer, Friedrich Ludwig,
Decrypted secrets : methods and maxims of cryptology / Friedrich L. Bauer.
Axe 3rd Floor Stacks:Available
2007
Add Marked to Bag
Add All On Page