Search Results for - Narrowed by: Computer security - Open Access Book SirsiDynix Enterprise http://portal.utm.my/client/en_AU/main/main/qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity$002509Computer$002bsecurity$0026qf$003dITYPE$002509Material$002bType$0025091$00253AOPEN_BK$002509Open$002bAccess$002bBook$0026ps$003d300$0026isd$003dtrue?dt=list 2024-05-24T20:45:01Z Computer Security Fundamentals ent://SD_ILS/0/SD_ILS:886135 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Easttom, Chuck, author<br/>Author&#160;Easttom, Chuck, author<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 E27 2020<br/>Edition&#160;Fourth Edition<br/>Publication Date&#160;2020<br/>ISBN&#160;9780135774779<br/> Cybersecurity Analytics ent://SD_ILS/0/SD_ILS:887246 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Verma, Rakesh M., author<br/>Author&#160;Verma, Rakesh M., author,&#160;Marchette, David J., author<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 V47 2020<br/>Publication Date&#160;2020<br/>ISBN&#160;9780367346010<br/> CYBER INFLUENCE AND COGNITIVE THREATS ent://SD_ILS/0/SD_ILS:887935 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Benson, Vladlena, editor<br/>Author&#160;Benson, Vladlena, editor,&#160;McAlaney, John, editor<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 C933 2020<br/>Publication Date&#160;2020<br/>ISBN&#160;9780128192047<br/> Computer and Cyber Security : Principles, Algorithm, Applications, and Perspectives ent://SD_ILS/0/SD_ILS:882324 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Gupta, Brij, Dr., 1982-, editor<br/>Author&#160;Gupta, Brij, Dr., 1982-, editor,&#160;Agrawal, Dharma P., Dr., editor,&#160;Wang, Haoxiang, Dr., editor<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 C668 2019<br/>Publication Date&#160;2019<br/>ISBN&#160;9780815371335<br/> GUIDE TO COMPUTER FORENSICS AND INVESTIGATIONS ent://SD_ILS/0/SD_ILS:888152 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Nelson, Bill, author<br/>Author&#160;Nelson, Bill, author,&#160;Phillips, Amelia, author,&#160;Steuart, Christopher, author<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 G84 2019<br/>Edition&#160;Sixth edition<br/>Publication Date&#160;2019<br/>ISBN&#160;9781337568944<br/> CompTIA security+ guide to network security fundamentals ent://SD_ILS/0/SD_ILS:873229 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Ciampa, Mark D., author<br/>Author&#160;Ciampa, Mark D., author<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 C574 2018<br/>Edition&#160;Sixth edition<br/>Publication Date&#160;2018<br/>ISBN&#160;9781337288781<br/> CYBERSECURITY ESSENTIALS ent://SD_ILS/0/SD_ILS:882336 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Brooks, Charles J., author<br/>Author&#160;Brooks, Charles J., author,&#160;Grow, Christophe, author,&#160;Craig, Philip, author,&#160;Short, Donald, author<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 B76 2018<br/>Publication Date&#160;2018<br/>ISBN&#160;9781119362395<br/> Digital Forensics and Investigations : People, Processes, and Technologies to Defend the Enterprise ent://SD_ILS/0/SD_ILS:887256 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Sachowski, Jason, author<br/>Author&#160;Sachowski, Jason, author<br/>Format:&#160;Books<br/>Call Number&#160;HV8079.C65 S23 2018<br/>Publication Date&#160;2018<br/>ISBN&#160;9781138720930<br/> Advanced Persistent Security : A Cyberwarfare Approach to Implementing Adaptive Enterprise Protection, Detection, and Reaction Strategies ent://SD_ILS/0/SD_ILS:873236 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Winkler, Ira, author<br/>Author&#160;Winkler, Ira, author,&#160;Gomes, Araceli Treu, author,&#160;Shackleford, Dave, editor<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 W56 2017<br/>Publication Date&#160;2017<br/>ISBN&#160;9780128093160<br/> Industrial network security : securing critical infrastructure networks for smart grid, SCADA, and other industrial control systems ent://SD_ILS/0/SD_ILS:841037 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Knapp, Eric D.<br/>Author&#160;Knapp, Eric D.,&#160;Langill, Joel Thomas<br/>Format:&#160;Books<br/>Call Number&#160;TS156.8 K53 2015<br/>Edition&#160;2nd ed.<br/>Publisher&#160;Syngress ,<br/>Publication Date&#160;2015<br/>ISBN&#160;9780124201149<br/> Pervasive Computing and Communications. Part II : QOS &amp; SECURITY ent://SD_ILS/0/SD_ILS:864714 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Yahaya Coulibaly, editor<br/>Author&#160;Yahaya Coulibaly, editor,&#160;Mohammad Abdur Razzaque, editor,&#160;Adekemi Adedokun, contributor,&#160;Chong, Yuh Chwen, contributor,&#160;Fauziah Abdul Razak, contributor<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 P473 2015 a<br/>Edition&#160;First Edition 2015<br/>Publication Date&#160;2015<br/>ISBN&#160;9789835210501<br/> SECURITY IN COMPUTING &amp; NETWORKING. PART II ent://SD_ILS/0/SD_ILS:865839 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Hassan Chizari, 1975-, editor<br/>Author&#160;Hassan Chizari, 1975-, editor,&#160;Hazinah Kutty Mammi, editor,&#160;Hassan Chizari, 1975-, contributor,&#160;Mahnoush Babaeizadeh, 1988-, contributor,&#160;Majid Bakhtiari, 1961-, contributor<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 S439 2015 a<br/>Edition&#160;First Edition 2015<br/>Publication Date&#160;2015<br/>ISBN&#160;9789835211515<br/> Introduction to modern cryptography ent://SD_ILS/0/SD_ILS:835855 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Katz, Jonathan, 1974- author<br/>Author&#160;Katz, Jonathan, 1974- author,&#160;Lindell, Yehuda, author<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 K38 2015<br/>Edition&#160;Second edition<br/>Publisher&#160;CRC Press/Taylor &amp; Francis,<br/>Publication Date&#160;2015<br/>ISBN&#160;9781466570269<br/> Web security : a WhiteHat perspective ent://SD_ILS/0/SD_ILS:835869 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Hanqing, Wu, author<br/>Author&#160;Hanqing, Wu, author,&#160;Zhao, Liz, author<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 H363 2015<br/>Publisher&#160;CRC Press is an imprint of Taylor &amp; Francis ; Publishing House of Electronics Industry,<br/>Publication Date&#160;2015<br/>ISBN&#160;9781466592612<br/> Information security : principles and new concepts ent://SD_ILS/0/SD_ILS:837058 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Hobbs, Fiona, editor<br/>Author&#160;Hobbs, Fiona, editor<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 I549 2015 f v.1<br/>Publisher&#160;Clanrye Intl.,<br/>Publication Date&#160;2015<br/>ISBN&#160;9781632403063&#160;9781632403070&#160;9781632403087&#160;9781632403094<br/> Integrated researh in steganography ent://SD_ILS/0/SD_ILS:837102 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Coon, Audrey, editor<br/>Author&#160;Coon, Audrey, editor<br/>Format:&#160;Books<br/>Call Number&#160;TK5102.94 I58 2015<br/>Publisher&#160;Clanrye Intl.,<br/>Publication Date&#160;2015<br/>ISBN&#160;9781632403131<br/> Hardware security : design, threats, and safeguards ent://SD_ILS/0/SD_ILS:837219 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Mukhopadhyay, Debdeep, author<br/>Author&#160;Mukhopadhyay, Debdeep, author,&#160;Chakraborty, Rajat Subhra, author<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 M85 2015<br/>Publisher&#160;CRC Press,<br/>Publication Date&#160;2015<br/>ISBN&#160;9781439895832<br/> Designing and building security operations center ent://SD_ILS/0/SD_ILS:838365 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Nathans, David<br/>Author&#160;Nathans, David<br/>Format:&#160;Books<br/>Call Number&#160;HV8290 N38 2015<br/>Publisher&#160;Syngress ,<br/>Publication Date&#160;2015<br/>ISBN&#160;9780128008997<br/> Information security analytics : finding security insights, patterns, and anomalies in big data ent://SD_ILS/0/SD_ILS:838366 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Talabis, Mark, author<br/>Author&#160;Talabis, Mark, author,&#160;McPherson, Robert, author,&#160;Miyamoto, I., author,&#160;Martin, Jason L., author<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 T355 2015<br/>Publisher&#160;Syngress,<br/>Publication Date&#160;2015<br/>ISBN&#160;9780128002070<br/> Computational network science : an algorithmic approach ent://SD_ILS/0/SD_ILS:838372 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Hexmoor, Henry, author<br/>Author&#160;Hexmoor, Henry, author<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 H49 2015<br/>Publisher&#160;Morgan Kaufmann,<br/>Publication Date&#160;2015<br/>ISBN&#160;9780128008911<br/> Managing risk in information systems ent://SD_ILS/0/SD_ILS:839128 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Gibson, Darril, author<br/>Author&#160;Gibson, Darril, author<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 G53 2015<br/>Edition&#160;Second edition<br/>Publisher&#160;Jones &amp; Bartlett Learning,<br/>Publication Date&#160;2015<br/>ISBN&#160;9781284055955<br/> Security policies and implementation issues ent://SD_ILS/0/SD_ILS:839131 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Johnson, Robert, 1946- author<br/>Author&#160;Johnson, Robert, 1946- author<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 J64 2015<br/>Publisher&#160;Jones &amp; Bartlett Learning,<br/>Publication Date&#160;2015<br/>ISBN&#160;9781284055993<br/> SECURITY IN COMPUTING &amp; NETWORKING. PART 1 ent://SD_ILS/0/SD_ILS:864380 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Hassan Chizari, 1975-, editor<br/>Author&#160;Hassan Chizari, 1975-, editor,&#160;Hazinah Kutty Mammi, editor,&#160;A. Ahmed Ibrahim Alkilary, contributor,&#160;Affandi Husain, contributor,&#160;Hassan Chizari, 1975-, contributor<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 S438 2015 a<br/>Edition&#160;First Edition 2015<br/>Publication Date&#160;2015<br/>ISBN&#160;35000000012313<br/> Guide to network defense and countermeasures ent://SD_ILS/0/SD_ILS:822586 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Weaver, Randy, author<br/>Author&#160;Weaver, Randy, author,&#160;Weaver, Dawn, author,&#160;Farwood, Dean, author<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 W424 2014<br/>Edition&#160;Third edition<br/>Publisher&#160;Cengage Learning,<br/>Publication Date&#160;2014<br/>ISBN&#160;9781133727941<br/> Hands-on information security lab manual ent://SD_ILS/0/SD_ILS:828287 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Whitman, Michael E., 1964-, author<br/>Author&#160;Whitman, Michael E., 1964-, author,&#160;Mattord, Herbert J., author,&#160;Green, Andrew, author<br/>Format:&#160;Books<br/>Call Number&#160;HD30.38 W45 2014 f<br/>Publisher&#160;Cengage Learning,<br/>Publication Date&#160;2014<br/>ISBN&#160;9781285167572<br/> Cyber security and IT infrastructure protection ent://SD_ILS/0/SD_ILS:831239 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Vacca, John R., editor<br/>Author&#160;Vacca, John R., editor<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 C934 2014<br/>Publisher&#160;Elsevier,<br/>Publication Date&#160;2014<br/>ISBN&#160;9780124166813<br/> Security management : a critical thinking approach ent://SD_ILS/0/SD_ILS:804186 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Land, Michael<br/>Author&#160;Land, Michael,&#160;Ricks, Truett,&#160;Rocks, Bobby<br/>Format:&#160;Books<br/>Call Number&#160;HD61.51 L36 2014<br/>Publisher&#160;CRC Press,<br/>Publication Date&#160;2014<br/>ISBN&#160;9781466561779<br/> Introduction to computer and network security : navigating shades of gray ent://SD_ILS/0/SD_ILS:805289 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Brooks, Richard R.<br/>Author&#160;Brooks, Richard R.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 B76 2014<br/>Publisher&#160;Chapman and Hall/CRC,<br/>Publication Date&#160;2014&#160;2013<br/>ISBN&#160;9781439860717<br/> Cryptography for security and privacy in cloud computing ent://SD_ILS/0/SD_ILS:814026 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Rass, Stefan<br/>Author&#160;Rass, Stefan,&#160;Slamanig, Daniel, author<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 R37 2014<br/>Publisher&#160;Artech House,<br/>Publication Date&#160;2014<br/>ISBN&#160;9781608075751<br/> Cryptography and network security : principles and practice ent://SD_ILS/0/SD_ILS:821152 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Stallings, William<br/>Author&#160;Stallings, William<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 S713 2014<br/>Edition&#160;6th ed.<br/>Publisher&#160;Prentice Hall,<br/>Publication Date&#160;2014&#160;2011<br/>ISBN&#160;9780133354690<br/> Network security essentials applications and standards ent://SD_ILS/0/SD_ILS:821220 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Stallings, William<br/>Author&#160;Stallings, William<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 S725 2014<br/>Edition&#160;5th ed.<br/>Publisher&#160;Prentice Hall,<br/>Publication Date&#160;2014<br/>ISBN&#160;9780133370430<br/> Security without obscurity : a guide to confidentiality, authentication, and integrity ent://SD_ILS/0/SD_ILS:821365 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Stapleton, J. J. (Jeffrey James)<br/>Author&#160;Stapleton, J. J. (Jeffrey James)<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 S84 2014<br/>Publisher&#160;CRC Press,<br/>Publication Date&#160;2014<br/>ISBN&#160;9781466592148<br/> Applied network security monitoring : collection, detection, and analysis ent://SD_ILS/0/SD_ILS:828438 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Sanders, Chris, 1986-<br/>Author&#160;Sanders, Chris, 1986-,&#160;Smith, Jason (Adjunct associate professor), author<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 S264 2014<br/>Publisher&#160;Syngress, an imprint of Elsevier,<br/>Publication Date&#160;2014<br/>ISBN&#160;9780124172081<br/> Security for service oriented architectures ent://SD_ILS/0/SD_ILS:837213 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Williams, Walter, author<br/>Author&#160;Williams, Walter, author<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.5828 W55 2014<br/>Publisher&#160;CRC Press,<br/>Publication Date&#160;2014<br/>ISBN&#160;9781466584020<br/> Core software security : security at the source ent://SD_ILS/0/SD_ILS:837216 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Ransome, James F., author<br/>Author&#160;Ransome, James F., author,&#160;Misra, Anmol, author,&#160;Schoenfield, Brook, author<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 R364 2014<br/>Publisher&#160;Taylor &amp; Francis,<br/>Publication Date&#160;2014<br/>ISBN&#160;9781466560956<br/> The science and technology of counterterrorism : measuring physical and electronic security risk ent://SD_ILS/0/SD_ILS:838145 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Young, Carl S., author<br/>Author&#160;Young, Carl S., author<br/>Format:&#160;Books<br/>Call Number&#160;HV6431 Y68 2014<br/>Publication Date&#160;2014<br/>ISBN&#160;9780124200562<br/> The basics of information security : understanding the fundamentals of InfoSec in theory and practice ent://SD_ILS/0/SD_ILS:838388 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Andress, Jason<br/>Author&#160;Andress, Jason<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 A535 2014<br/>Edition&#160;2nd ed.<br/>Publisher&#160;Elsevier/Syngress, Syngress is a imprint of Elsevier,<br/>Publication Date&#160;2014<br/>ISBN&#160;9780128007440<br/> Advances in secure computing, internet services, and applications ent://SD_ILS/0/SD_ILS:841203 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Tripathy, B. K. editor<br/>Author&#160;Tripathy, B. K. editor,&#160;Acharjya, D. P. editor<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 A38 2014 f<br/>Publisher&#160;Information Science Reference, an imprint of IGI Global,<br/>Publication Date&#160;2014<br/>ISBN&#160;9781466649408<br/> Analyzing security, trust, and crime in the digital world ent://SD_ILS/0/SD_ILS:841204 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Nemati, Hamid R., 1958- editor<br/>Author&#160;Nemati, Hamid R., 1958- editor<br/>Format:&#160;Books<br/>Call Number&#160;HF5548.37 A53 2014 f<br/>Publisher&#160;Information Science Reference,<br/>Publication Date&#160;2014<br/>ISBN&#160;9781466648562<br/> Organizational, legal, and technological dimensions of information system administration ent://SD_ILS/0/SD_ILS:841212 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Portela, Irene Maria, 1965-, editor<br/>Author&#160;Portela, Irene Maria, 1965-, editor,&#160;Almeida, Fernando, 1979-, editor<br/>Format:&#160;Books<br/>Call Number&#160;T58.64 O74 2014 f<br/>Publisher&#160;Information Science Reference,<br/>Publication Date&#160;2014<br/>ISBN&#160;9781466645264<br/> Cloud management and security ent://SD_ILS/0/SD_ILS:835570 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Abbadi, Imad M., author<br/>Author&#160;Abbadi, Imad M., author<br/>Format:&#160;Books<br/>Call Number&#160;QA76.585 A235 2014<br/>Publisher&#160;Wiley,<br/>Publication Date&#160;2014<br/>ISBN&#160;9781118817094<br/> A cryptography primer : secrets and promises ent://SD_ILS/0/SD_ILS:835848 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Klein, Philip N., author<br/>Author&#160;Klein, Philip N., author<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 K545 2014<br/>Publisher&#160;Cambridge University Press,<br/>Publication Date&#160;2014<br/>ISBN&#160;9781107017887<br/> What every engineer should know about cyber security and digital forensics ent://SD_ILS/0/SD_ILS:837282 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;DeFranco, Joanna F author<br/>Author&#160;DeFranco, Joanna F author<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 D44 2013<br/>Publisher&#160;CRC Press,<br/>Publication Date&#160;2014<br/>ISBN&#160;9781466564527<br/> The Intrusion detection networks : a key to collaborative security ent://SD_ILS/0/SD_ILS:837290 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Fung, Carol author<br/>Author&#160;Fung, Carol author,&#160;Boutaba, Raouf<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9 A25 F85 2014<br/>Publisher&#160;Auerbach Pub.,<br/>Publication Date&#160;2014<br/>ISBN&#160;9781466564121<br/> The art of memory forensics : detecting malware and threats in Windows, Linux, and Mac memory ent://SD_ILS/0/SD_ILS:837944 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Ligh, Michael Hale, author<br/>Author&#160;Ligh, Michael Hale, author,&#160;Case, Andrew, author,&#160;Levy, Jamie, author,&#160;Walters, Aaron, author<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 L54 2014<br/>Publication Date&#160;2014<br/>ISBN&#160;9781118825099<br/> Collaboration with cloud computing : security, social media, and unified communications ent://SD_ILS/0/SD_ILS:838073 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Messier, Ric, author<br/>Author&#160;Messier, Ric, author,&#160;Konar, Allan, editor<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 M475 2014<br/>Publisher&#160;Syngress,<br/>Publication Date&#160;2014<br/>ISBN&#160;9780124170407<br/> Windows forensic analysis toolkit : advanced analysis techniques for Windows 8 ent://SD_ILS/0/SD_ILS:838076 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Carvey, Harlan A., author<br/>Author&#160;Carvey, Harlan A., author<br/>Format:&#160;Books<br/>Call Number&#160;HV8079.C65 C374 2014<br/>Edition&#160;Fourth edition<br/>Publisher&#160;Syngress,<br/>Publication Date&#160;2014<br/>ISBN&#160;9780124171572<br/> Engineering safe and secure software systems ent://SD_ILS/0/SD_ILS:798047 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Axelrod, C. Warren<br/>Author&#160;Axelrod, C. Warren<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 A93 2013<br/>Publisher&#160;Artech House,<br/>Publication Date&#160;2013<br/>ISBN&#160;9781608074723<br/> Digital forensics for handheld devices ent://SD_ILS/0/SD_ILS:799569 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Doherty, Eamon P.<br/>Author&#160;Doherty, Eamon P.<br/>Format:&#160;Books<br/>Call Number&#160;HV8079.C65 D64 2013<br/>Publisher&#160;CRC Press,<br/>Publication Date&#160;2013<br/>ISBN&#160;9781439898772<br/> Information security ent://SD_ILS/0/SD_ILS:804293 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Rhodes-Ousley, Mark<br/>Author&#160;Rhodes-Ousley, Mark<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 R46 2013<br/>Edition&#160;2nd ed.<br/>Publisher&#160;McGraw Hill Education,<br/>Publication Date&#160;2013<br/>ISBN&#160;9780071784351<br/> Network and information security : issues, challenges and research trends ent://SD_ILS/0/SD_ILS:805429 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Sarma, Nityananda<br/>Author&#160;Sarma, Nityananda,&#160;Bhattacharyya, Dhruba K.<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 N484 2013<br/>Publisher&#160;Narosa Publishing House,<br/>Publication Date&#160;2013<br/>ISBN&#160;9788184873146<br/> Intelligent systems for security informatics ent://SD_ILS/0/SD_ILS:805697 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Yang, Christopher C.<br/>Author&#160;Yang, Christopher C.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 I58 2013<br/>Edition&#160;1st ed.<br/>Publisher&#160;Elsevier/Academic Press ; Zhejiang University Press,<br/>Publication Date&#160;2013<br/>ISBN&#160;9780124047020<br/> Safety management for software-based equipment ent://SD_ILS/0/SD_ILS:818636 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Boulanger, Jean-Louis<br/>Author&#160;Boulanger, Jean-Louis<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 B684 2013<br/>Publisher&#160;ISTE Ltd/John Wiley and Sons Inc,<br/>Publication Date&#160;2013<br/>ISBN&#160;9781848214521<br/> Digital forensics explained ent://SD_ILS/0/SD_ILS:821062 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Gogolin, Greg.<br/>Author&#160;Gogolin, Greg.<br/>Format:&#160;Books<br/>Call Number&#160;HV8079.C65 G64 2013<br/>Publisher&#160;Taylor &amp; Francis, CRC Press,<br/>Publication Date&#160;2013<br/>ISBN&#160;9781439874950<br/> Cryptography in C and C++ ent://SD_ILS/0/SD_ILS:829247 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Welschenbach, Michael, author<br/>Author&#160;Welschenbach, Michael, author<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 W45 2013<br/>Edition&#160;2nd ed.<br/>Publisher&#160;Apress,<br/>Publication Date&#160;2013<br/>ISBN&#160;9781430250982<br/> Cyber crime, security and digital intelligence ent://SD_ILS/0/SD_ILS:831351 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Johnson, Mark, 1959- author<br/>Author&#160;Johnson, Mark, 1959- author<br/>Format:&#160;Books<br/>Call Number&#160;HV6773 J64 2013<br/>Publisher&#160;Gower,<br/>Publication Date&#160;2013<br/>ISBN&#160;9781409454496&#160;9781409454502<br/> Information security policy development for compliance : ISO/IEC 27001, NIST SP 800-53, HIPAA standard, PCI DSS V2.0, and AUP V5.0 ent://SD_ILS/0/SD_ILS:805287 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Williams, Barry L.<br/>Author&#160;Williams, Barry L.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 W55 2013<br/>Publisher&#160;CRC Press, Taylor &amp; Francis Group,<br/>Publication Date&#160;2013<br/>ISBN&#160;9781466580589<br/> Web application defender's cookbook : battling hackers and protecting users ent://SD_ILS/0/SD_ILS:806507 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Barnett, Ryan C.<br/>Author&#160;Barnett, Ryan C.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 B377 2013<br/>Edition&#160;1st ed.<br/>Publisher&#160;Wiley Pub., Inc.,<br/>Publication Date&#160;2013&#160;2012<br/>ISBN&#160;9781118362181<br/> Data hiding : exposing concealed data in multimedia, operating systems, mobile devices and network protocols ent://SD_ILS/0/SD_ILS:818448 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Raggo, Michael T., author<br/>Author&#160;Raggo, Michael T., author,&#160;Hosmer, Chet, author,&#160;McGrew, Wesley, editor<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 R346 2013<br/>Edition&#160;1st ed.<br/>Publisher&#160;Syngress,<br/>Publication Date&#160;2013<br/>ISBN&#160;9781597497435<br/> Pragmatic security metrics : applying metametrics to information security ent://SD_ILS/0/SD_ILS:821158 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Brotby, W. Krag<br/>Author&#160;Brotby, W. Krag,&#160;Hinson, Gary,&#160;Kabay, M.E.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 B76 2013<br/>Publisher&#160;CRC Press,<br/>Publication Date&#160;2013<br/>ISBN&#160;9781439881521<br/> Management of information security ent://SD_ILS/0/SD_ILS:822690 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Whitman, Michael E.<br/>Author&#160;Whitman, Michael E.,&#160;Mattord, Herbert J.<br/>Format:&#160;Books<br/>Call Number&#160;T58.6 W45 2013<br/>Edition&#160;4th ed.<br/>Publisher&#160;Cengage Learning,<br/>Publication Date&#160;2013<br/>ISBN&#160;9781285062297<br/> Information security risk assessment toolkit : practical assessments through data collection and data analysis ent://SD_ILS/0/SD_ILS:797973 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Talabis, Mark<br/>Author&#160;Talabis, Mark,&#160;Martin, Jason<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 T354 2013<br/>Publisher&#160;Elsevier,<br/>Publication Date&#160;2013<br/>ISBN&#160;9781597497350<br/> The hacker's guide to OS X : exploiting OS X from the root-up ent://SD_ILS/0/SD_ILS:797987 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Bathurst, Robert<br/>Author&#160;Bathurst, Robert,&#160;Rogers, Russ,&#160;Ghassemlouei, Alijohn<br/>Format:&#160;Books<br/>Call Number&#160;QA76.774.M33 B38 2013<br/>Publisher&#160;Syngress,<br/>Publication Date&#160;2013<br/>ISBN&#160;9781597499507<br/> Discrete dynamical systems and chaotic machines : theory and applications ent://SD_ILS/0/SD_ILS:828823 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Bahi, Jacques Mohcine, author<br/>Author&#160;Bahi, Jacques Mohcine, author,&#160;Guyeux, Christophe, author<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 B344 2013<br/>Publisher&#160;CRC Press,<br/>Publication Date&#160;2013<br/>ISBN&#160;9781466554504<br/> Elementary information security ent://SD_ILS/0/SD_ILS:829121 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Smith, Richard E.<br/>Author&#160;Smith, Richard E.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 S658 2013<br/>Publisher&#160;Jones &amp; Bartlett Learning,<br/>Publication Date&#160;2013<br/>ISBN&#160;9781449648206<br/> Cyber security for educational leaders : a guide to understanding and implementing technology policies ent://SD_ILS/0/SD_ILS:830049 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Phillips, Richard A.<br/>Author&#160;Phillips, Richard A.,&#160;Sianjina, Rayton R.<br/>Format:&#160;Books<br/>Call Number&#160;LB1028.3 P454 2013<br/>Publisher&#160;Routledge,<br/>Publication Date&#160;2013<br/>ISBN&#160;9780415631969&#160;9780415631976<br/> Computer security literacy : staying safe in a digital world ent://SD_ILS/0/SD_ILS:837215 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Jacobson, Douglas, author<br/>Author&#160;Jacobson, Douglas, author,&#160;Idziorek, Joseph, author<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 J334 2013<br/>Publisher&#160;CRC Press / Taylor &amp; Francis Group,<br/>Publication Date&#160;2013<br/>ISBN&#160;9781439856185<br/> Security basics for computer architects ent://SD_ILS/0/SD_ILS:835912 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Lee, Ruby B., author<br/>Author&#160;Lee, Ruby B., author<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A73 L444 2013<br/>Publisher&#160;Morgan &amp; Claypool Publishers,<br/>Publication Date&#160;2013<br/>ISBN&#160;9781627051552<br/> Linux Malware Incident Response : a practitioner's guide to forensic collection and examination of volatile data : an excerpt from Malware Forensic Field Guide for Linux Systems ent://SD_ILS/0/SD_ILS:837986 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Malin, Cameron H., author<br/>Author&#160;Malin, Cameron H., author,&#160;Aquilina, James M.,&#160;Casey, Eoghan<br/>Format:&#160;Books<br/>Call Number&#160;QA76.3 M353 2013<br/>Publisher&#160;Elsevier Science,<br/>Publication Date&#160;2013<br/>ISBN&#160;9780124095076<br/> Hacking web apps : detecting and preventing web application security problems ent://SD_ILS/0/SD_ILS:797962 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Shema, Mike<br/>Author&#160;Shema, Mike<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 S545 2012<br/>Publisher&#160;Syngress,<br/>Publication Date&#160;2012<br/>ISBN&#160;9781597499514<br/> Advances in intelligence and security informatics ent://SD_ILS/0/SD_ILS:798923 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Mao, Wenji<br/>Author&#160;Mao, Wenji,&#160;Wang, Fei-Yue<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 M335 2012<br/>Edition&#160;1st ed.<br/>Publisher&#160;Academic Press ; Zhejiang University Press,<br/>Publication Date&#160;2012<br/>ISBN&#160;9780123972002<br/> Hacking exposed 7 : network security secrets &amp; solutions ent://SD_ILS/0/SD_ILS:801363 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;McClure, Stuart<br/>Author&#160;McClure, Stuart,&#160;McClure, Stuart,&#160;Scambray, Joel,&#160;Kurtz, George<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 M483 2012<br/>Edition&#160;7th ed.<br/>Publisher&#160;McGraw-Hill Osborne Media,<br/>Publication Date&#160;2012<br/>ISBN&#160;9780071780285<br/> Computer security : principles and practice ent://SD_ILS/0/SD_ILS:804149 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Stallings, William<br/>Author&#160;Stallings, William,&#160;Brown, Lawrie<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 S73 2012<br/>Edition&#160;2nd ed. International ed.<br/>Publisher&#160;Pearson,<br/>Publication Date&#160;2012<br/>ISBN&#160;9780273764496<br/> Network and application security fundamentals and practices ent://SD_ILS/0/SD_ILS:805301 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Ganguly, Debashis<br/>Author&#160;Ganguly, Debashis,&#160;Lahiri, Shibamouli<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 G365 2012<br/>Publisher&#160;Science Publishers ; Distributed by CRC Press,<br/>Publication Date&#160;2012<br/>ISBN&#160;9781578087556<br/> Embedded systems security : practical methods for safe and secure software and systems development ent://SD_ILS/0/SD_ILS:805596 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Kleidermacher, David<br/>Author&#160;Kleidermacher, David,&#160;Kleidermacher, Mike<br/>Format:&#160;Books<br/>Call Number&#160;QA76.76.D47 K564 2012<br/>Edition&#160;1st ed.<br/>Publisher&#160;Elsevier,<br/>Publication Date&#160;2012<br/>ISBN&#160;9780123868862<br/> Role mining in business : taming role-based access control administration ent://SD_ILS/0/SD_ILS:808318 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Colantonio, Alessandro<br/>Author&#160;Colantonio, Alessandro,&#160;Di Pietro, Roberto,&#160;Ocello, Alberto<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 C657 2012<br/>Publisher&#160;World Scientific,<br/>Publication Date&#160;2012<br/>ISBN&#160;9789814374002<br/> Reliability and availability of cloud computing ent://SD_ILS/0/SD_ILS:821145 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Bauer, Eric<br/>Author&#160;Bauer, Eric,&#160;Adams, Randee<br/>Format:&#160;Books<br/>Call Number&#160;QA76.585 B394 2012<br/>Publisher&#160;Wiley-IEEE Press,<br/>Publication Date&#160;2012<br/>ISBN&#160;9781118177013<br/> Analyzing computer security : a threat/vulnerability/countermeasure approach ent://SD_ILS/0/SD_ILS:780002 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Pfleeger, Charles P., 1948-<br/>Author&#160;Pfleeger, Charles P., 1948-,&#160;Pfleeger, Shari Lawrence<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 P45 2012<br/>Publisher&#160;Prentice Hall,<br/>Publication Date&#160;2012<br/>ISBN&#160;9780132789462<br/> Secure and resilient software : requirements, test cases, and testing methods ent://SD_ILS/0/SD_ILS:785387 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Merkow, Mark S.<br/>Author&#160;Merkow, Mark S.,&#160;Raghavan, Lakshmikanth<br/>Format:&#160;Books<br/>Call Number&#160;QA76.76.T48 M47 2012<br/>Publisher&#160;CRC Press,<br/>Publication Date&#160;2012<br/>ISBN&#160;9781439866214<br/> SQL injection attacks and defense ent://SD_ILS/0/SD_ILS:797984 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Clarke, Justin<br/>Author&#160;Clarke, Justin<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 C542 2012<br/>Publisher&#160;Elsevier,<br/>Publication Date&#160;2012<br/>ISBN&#160;9781597499637<br/> Cyber security standards, practices and industrial applications : systems and methodologies ent://SD_ILS/0/SD_ILS:772975 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Zubairi, Junaid Ahmed, 1961-<br/>Author&#160;Zubairi, Junaid Ahmed, 1961-,&#160;Mahboob, Athar, 1971-<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 C93 2012 f<br/>Publisher&#160;Information Science Reference,<br/>Publication Date&#160;2012<br/>ISBN&#160;9781609608514&#160;9781609608521&#160;9781609608538<br/> Principles of information security ent://SD_ILS/0/SD_ILS:838004 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Whitman, Michael E., 1964-, author<br/>Author&#160;Whitman, Michael E., 1964-, author,&#160;Mattord, Herbert J., author<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 W34 2012<br/>Edition&#160;Fourth edition<br/>Publisher&#160;Course Technology,<br/>Publication Date&#160;2012<br/>ISBN&#160;9781111138219<br/> Securing the cloud : cloud computer security techniques and tactics ent://SD_ILS/0/SD_ILS:748817 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Winkler, J. R. (Joachim R.)<br/>Author&#160;Winkler, J. R. (Joachim R.)<br/>Format:&#160;Books<br/>Call Number&#160;QA76.585 W56 2011<br/>Publisher&#160;Elsevier,<br/>Publication Date&#160;2011<br/>ISBN&#160;9781597495929<br/> Data mining and machine learning in cybersecurity ent://SD_ILS/0/SD_ILS:750220 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Dua, Sumeet<br/>Author&#160;Dua, Sumeet,&#160;Du, Xian<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.D343 D83 2011<br/>Publisher&#160;Taylor &amp; Francis,<br/>Publication Date&#160;2011<br/>ISBN&#160;9781439839423<br/> Security strategies in Linux platforms and applications ent://SD_ILS/0/SD_ILS:764154 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Jang, Michael H.<br/>Author&#160;Jang, Michael H.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.76.O63 J366 2011<br/>Publisher&#160;Jones &amp; Bartlett Learning,<br/>Publication Date&#160;2011<br/>ISBN&#160;9780763791896<br/> The basics of hacking and penetration testing : ethical hacking and penetration testing made easy ent://SD_ILS/0/SD_ILS:799110 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Engebretson, Pat (Patrick Henry), 1974-<br/>Author&#160;Engebretson, Pat (Patrick Henry), 1974-,&#160;Broad, James<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 E54 2011<br/>Publisher&#160;Syngress,<br/>Publication Date&#160;2011<br/>ISBN&#160;9781597496551<br/> Software engineering for secure systems : industrial and research perspectives ent://SD_ILS/0/SD_ILS:801907 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Mouratidis, Haralambos, 1977-<br/>Author&#160;Mouratidis, Haralambos, 1977-<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 S6537 2011 f<br/>Publisher&#160;Information Science Reference,<br/>Publication Date&#160;2011<br/>ISBN&#160;9781615208371&#160;9781615208388<br/> Information assurance and security ethics in complex systems : interdisciplinary perspectives ent://SD_ILS/0/SD_ILS:630427 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Dark, Melissa Jane, 1961-<br/>Author&#160;Dark, Melissa Jane, 1961-<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 I545 2011 f<br/>Publisher&#160;Information Science Reference,<br/>Publication Date&#160;2011<br/>ISBN&#160;9781616922450&#160;9781616922467<br/> Hacking exposed : web applications : web application security secrets and solutions ent://SD_ILS/0/SD_ILS:643191 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Scambray, Joel<br/>Author&#160;Scambray, Joel,&#160;Liu, Vincent,&#160;Sima, Caleb<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 S324 2011<br/>Edition&#160;3rd ed.<br/>Publisher&#160;McGraw-Hill Companies,<br/>Publication Date&#160;2011<br/>ISBN&#160;9780071740647<br/> Gray hat hacking : the ethical hacker's handbook ent://SD_ILS/0/SD_ILS:643947 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Harris, Shon<br/>Author&#160;Harris, Shon<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 G724 2011<br/>Edition&#160;3rd ed.<br/>Publisher&#160;McGraw-Hill,<br/>Publication Date&#160;2011<br/>ISBN&#160;9780071742559<br/> Physical-layer security : from information theory to security engineering ent://SD_ILS/0/SD_ILS:802330 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Bloch, Matthieu, 1981-<br/>Author&#160;Bloch, Matthieu, 1981-,&#160;Barros, Joao<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 B574 2011<br/>Publisher&#160;Cambridge University Press,<br/>Publication Date&#160;2011<br/>ISBN&#160;9780521516501<br/> Introduction to computer security ent://SD_ILS/0/SD_ILS:807356 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Goodrich, Michael T.<br/>Author&#160;Goodrich, Michael T.,&#160;Tamassia, Roberto, 1960-<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 G66 2011<br/>Publisher&#160;Addison-Wesley,<br/>Publication Date&#160;2011<br/>ISBN&#160;9780321512949<br/> Malware forensic field guide for windows systems : digital forensics field guides ent://SD_ILS/0/SD_ILS:748807 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Malin, Cameron H.<br/>Author&#160;Malin, Cameron H.,&#160;Casey, Eoghan,&#160;Aquilina, James M<br/>Format:&#160;Books<br/>Call Number&#160;QA76.76.C68 M322 2012<br/>Publisher&#160;Syngress,<br/>Publication Date&#160;2011<br/>ISBN&#160;9781597494724<br/> Computer security ent://SD_ILS/0/SD_ILS:756730 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Gollmann, Dieter<br/>Author&#160;Gollmann, Dieter<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 G65 2011<br/>Edition&#160;3rd ed.<br/>Publisher&#160;Wiley,<br/>Publication Date&#160;2011<br/>ISBN&#160;9780470741153<br/> Malware analyst's cookbook and DVD : tools and techniques for fighting malicious code ent://SD_ILS/0/SD_ILS:758506 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Ligh, Michael Hale<br/>Author&#160;Ligh, Michael Hale<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 M353 2011<br/>Publisher&#160;Wiley,<br/>Publication Date&#160;2011<br/>ISBN&#160;9780470613030<br/> A guide to kernel exploitation : attacking the core ent://SD_ILS/0/SD_ILS:758745 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Perla, Enrico<br/>Author&#160;Perla, Enrico,&#160;Massimiliano, Oldani<br/>Format:&#160;Books<br/>Call Number&#160;QA76.76.O63 P568 2011<br/>Publisher&#160;Syngress,<br/>Publication Date&#160;2011<br/>ISBN&#160;9781597494861<br/> Managed code rootkits : hooking into runtime environments ent://SD_ILS/0/SD_ILS:758778 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Metula, Erez<br/>Author&#160;Metula, Erez<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 M487 2011<br/>Publisher&#160;Syngress,<br/>Publication Date&#160;2011<br/>ISBN&#160;9781597495745<br/> IT auditing : using controls to protect information assets ent://SD_ILS/0/SD_ILS:761290 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Davis, Chris (Christopher Michael)<br/>Author&#160;Davis, Chris (Christopher Michael),&#160;Schiller, Mike,&#160;Wheeler, Kevin<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A93 D38 2011<br/>Edition&#160;2nd ed.<br/>Publisher&#160;McGraw-Hill,<br/>Publication Date&#160;2011<br/>ISBN&#160;9780071742382<br/> Mobile device security for dummies ent://SD_ILS/0/SD_ILS:778300 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Campagna, Rich R.<br/>Author&#160;Campagna, Rich R.,&#160;Iyer, Sibbu,&#160;Krishnan, Ashwin<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 C364 2011<br/>Publisher&#160;Wiley Pubishing, Inc.,<br/>Publication Date&#160;2011<br/>ISBN&#160;9780470927533<br/> Cryptography and network security : principles and practice ent://SD_ILS/0/SD_ILS:758256 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Stallings, William<br/>Author&#160;Stallings, William<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 S713 2011<br/>Edition&#160;5th ed.<br/>Publisher&#160;Prentice Hall,<br/>Publication Date&#160;2011<br/>ISBN&#160;9780136097044<br/> Computer forensics jumpstart ent://SD_ILS/0/SD_ILS:758605 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Solomon, Michael, (Michael G.), 1963-<br/>Author&#160;Solomon, Michael, (Michael G.), 1963-,&#160;Rudolph, K.,&#160;Tittel, Ed.,&#160;Broom, Neil,&#160;Barrett, Diane<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 S656 2011<br/>Edition&#160;Second edition.<br/>Publisher&#160;Wiley Publishing, Inc.<br/>Publication Date&#160;2011<br/>ISBN&#160;9780470931660<br/> Security 2020 : reduce security risks this decade ent://SD_ILS/0/SD_ILS:758608 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Howard, Doug<br/>Author&#160;Howard, Doug,&#160;Prince, Kevin<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 H6976 2011<br/>Edition&#160;1st ed.<br/>Publisher&#160;Wiley Pub.,<br/>Publication Date&#160;2011<br/>ISBN&#160;9780470639559<br/> Windows registry forensics : advanced digital forensic analysis of the Windows registry ent://SD_ILS/0/SD_ILS:758726 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Carvey, Harlan A.<br/>Author&#160;Carvey, Harlan A.<br/>Format:&#160;Books<br/>Call Number&#160;HV8079.C65 C373 2011<br/>Publisher&#160;Syngress,<br/>Publication Date&#160;2011<br/>ISBN&#160;9781597495806<br/> Web application obfuscation : -/WAFs..Evasion..Filters//alert (/Obfuscation/)- ent://SD_ILS/0/SD_ILS:758794 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Heiderich, Mario<br/>Author&#160;Heiderich, Mario<br/>Format:&#160;Books<br/>Call Number&#160;QA76.625 H46 2011<br/>Publisher&#160;Elsevier/Syngress,<br/>Publication Date&#160;2011<br/>ISBN&#160;9781597496049<br/> Securing SQL server : protecting your database from attackers ent://SD_ILS/0/SD_ILS:758811 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Cherry, Denny<br/>Author&#160;Cherry, Denny,&#160;Larock, Thomas<br/>Format:&#160;Books<br/>Call Number&#160;QA76.73.S67 C478 2011<br/>Publisher&#160;Syngress,<br/>Publication Date&#160;2011<br/>ISBN&#160;9781597496254<br/> Information security : principles and practice ent://SD_ILS/0/SD_ILS:779250 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Stamp, Mark<br/>Author&#160;Stamp, Mark<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 S75 2011<br/>Edition&#160;2nd ed.<br/>Publisher&#160;Wiley,<br/>Publication Date&#160;2011<br/>ISBN&#160;9780470626399<br/> Roadmap to information security : for IT and InfoSec managers ent://SD_ILS/0/SD_ILS:781102 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Whitman, Michael E.<br/>Author&#160;Whitman, Michael E.,&#160;Mattord, Herbert J.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 W45 2011<br/>Publisher&#160;Cengage Learning,<br/>Publication Date&#160;2011<br/>ISBN&#160;9781435480308<br/> Introduction to security and network forensics ent://SD_ILS/0/SD_ILS:785073 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Buchanan, William J.<br/>Author&#160;Buchanan, William J.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 B824 2011<br/>Publisher&#160;CRC Press,<br/>Publication Date&#160;2011<br/>ISBN&#160;9780849335686<br/> Cyber security, cyber crime and cyber forensics : applications and perspectives ent://SD_ILS/0/SD_ILS:772977 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Santanam, Raghu, 1969-<br/>Author&#160;Santanam, Raghu, 1969-,&#160;Sethumadhavan, M., 1966-,&#160;Virendra, Mohit<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 C93 2011 f<br/>Publisher&#160;Information Science Reference,<br/>Publication Date&#160;2011<br/>ISBN&#160;9781609601232&#160;9781609601256<br/> Intrusion detection : a machine learning approach ent://SD_ILS/0/SD_ILS:780736 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Yu, Zhenwei<br/>Author&#160;Yu, Zhenwei,&#160;Tsai, Jeffrey J. P.<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 Y89 2011<br/>Publisher&#160;Imperial College Press,<br/>Publication Date&#160;2011<br/>ISBN&#160;9781848164475<br/> Information security evaluation : a holistic approach ent://SD_ILS/0/SD_ILS:781151 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Tashi, Igli<br/>Author&#160;Tashi, Igli,&#160;Ghernaouti-Helie, Solange<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 T374 2011<br/>Publisher&#160;EFPL Pr.,<br/>Publication Date&#160;2011<br/>ISBN&#160;9781439879153<br/> Introduction to cryptography with open-source software ent://SD_ILS/0/SD_ILS:789125 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;McAndrew, Alasdair<br/>Author&#160;McAndrew, Alasdair<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9 .A25 M398 2011<br/>Publisher&#160;CRC Press,<br/>Publication Date&#160;2011<br/>ISBN&#160;9781439825709<br/> Machine learning forensics for law enforcement, security, and intelligence ent://SD_ILS/0/SD_ILS:789134 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Mena, Jesus.<br/>Author&#160;Mena, Jesus.<br/>Format:&#160;Books<br/>Call Number&#160;HV8073 M395 2011<br/>Publisher&#160;Taylor &amp; Francis,<br/>Publication Date&#160;2011<br/>ISBN&#160;9781439860694<br/> Network security essentials : applications and standards ent://SD_ILS/0/SD_ILS:377761 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Stallings, William<br/>Author&#160;Stallings, William<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 S72 2011<br/>Edition&#160;4th ed.<br/>Publisher&#160;Pearson Prentice Hall,<br/>Publication Date&#160;2011<br/>ISBN&#160;9780136108054<br/> The basics of information security : understanding the fundamentals of InfoSec in theory and practice ent://SD_ILS/0/SD_ILS:838401 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Andress, Jason<br/>Author&#160;Andress, Jason,&#160;Rogers, Russ, editor<br/>Format:&#160;Computer file<br/>Call Number&#160;QA76.9.A25 A535 2011<br/>Publisher&#160;Syngress,<br/>Publication Date&#160;2011<br/>ISBN&#160;9781597496537<br/> Computer security : protecting digital resources ent://SD_ILS/0/SD_ILS:374669 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Newman, Robert C.<br/>Author&#160;Newman, Robert C.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.D314 N48 2010<br/>Publisher&#160;Jones &amp; Bartlett Publishers,<br/>Publication Date&#160;2010<br/>ISBN&#160;9780763759940<br/> Hashing in computer science : fifty years of slicing and dicing ent://SD_ILS/0/SD_ILS:639636 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Konheim, Alan G., 1934-<br/>Author&#160;Konheim, Alan G., 1934-<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.H36 K65 2010<br/>Publisher&#160;John Wiley &amp; Sons,<br/>Publication Date&#160;2010<br/>ISBN&#160;9780470344736<br/> Safety of computer architectures ent://SD_ILS/0/SD_ILS:639717 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Boulanger, Jean-Louis<br/>Author&#160;Boulanger, Jean-Louis<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A73 S244 2010<br/>Publisher&#160;ISTE ;<br/>Publication Date&#160;2010<br/>ISBN&#160;9781848211971<br/> Digital forensics for network, internet, and cloud computing : a forensic evidence guide for moving targets and data ent://SD_ILS/0/SD_ILS:640462 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Lillard, Terrence V.<br/>Author&#160;Lillard, Terrence V.,&#160;Lillard, Terrence<br/>Format:&#160;Books<br/>Call Number&#160;HV8079.C65 D54 2010<br/>Publisher&#160;Syngress,<br/>Publication Date&#160;2010<br/>ISBN&#160;9781597495370<br/> Secure and resilient software development ent://SD_ILS/0/SD_ILS:736304 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Merkow, Mark S.<br/>Author&#160;Merkow, Mark S.,&#160;Raghavan, Lakshmikanth<br/>Format:&#160;Books<br/>Call Number&#160;QA76.76 .D47 M466 2010<br/>Publisher&#160;CRC Press,<br/>Publication Date&#160;2010<br/>ISBN&#160;9781439826966<br/> Information security risk analysis ent://SD_ILS/0/SD_ILS:804270 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Peltier, Thomas R.<br/>Author&#160;Peltier, Thomas R.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 P445 2010<br/>Edition&#160;3rd ed.<br/>Publisher&#160;Auerbach Publications,<br/>Publication Date&#160;2010<br/>ISBN&#160;9781439839560<br/> Guide to computer forensics and investigations ent://SD_ILS/0/SD_ILS:624345 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Nelson, Bill<br/>Author&#160;Nelson, Bill,&#160;Philips, Amelia,&#160;Steuart, Chris<br/>Format:&#160;Books<br/>Call Number&#160;HV8079.C65 G85 2010<br/>Edition&#160;4th Ed.<br/>Publisher&#160;Cengage Learning,<br/>Publication Date&#160;2010&#160;2009<br/>ISBN&#160;9781435498839<br/> Risk analysis and security countermeasure selection ent://SD_ILS/0/SD_ILS:625845 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Norman, Thomas L.<br/>Author&#160;Norman, Thomas L.<br/>Format:&#160;Books<br/>Call Number&#160;HV8290 N67 2010<br/>Publisher&#160;CRC Press,<br/>Publication Date&#160;2010<br/>ISBN&#160;9781420078701<br/> Collaborative computer security and trust management ent://SD_ILS/0/SD_ILS:631994 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Seigneur, Jean-Marc<br/>Author&#160;Seigneur, Jean-Marc,&#160;Slagell, Adam, 1977-<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 C656 2010 f<br/>Publisher&#160;Information Science Reference,<br/>Publication Date&#160;2010<br/>ISBN&#160;9781605664149&#160;9781605664156<br/> Relation based access control ent://SD_ILS/0/SD_ILS:637823 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Zhang, Rui<br/>Author&#160;Zhang, Rui<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 Z43 2010<br/>Publisher&#160;IOS Pr.,<br/>Publication Date&#160;2010<br/>ISBN&#160;9783898386265<br/> Journal of computer security ent://SD_ILS/0/SD_ILS:640207 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Jajodia, Sushil<br/>Author&#160;Jajodia, Sushil,&#160;Millen, Jonathan<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 J684 2010<br/>Publisher&#160;IOS Pr.,<br/>Publication Date&#160;2010<br/>ISBN&#160;9781607500889<br/> The executive MBA in information security ent://SD_ILS/0/SD_ILS:640346 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Trinckes, John J.<br/>Author&#160;Trinckes, John J.<br/>Format:&#160;Books<br/>Call Number&#160;HF5548.37 T75 2010<br/>Publisher&#160;CRC Press,<br/>Publication Date&#160;2010<br/>ISBN&#160;9781439810071<br/> Mobile device security : a comprehensive guide to securing your information in a moving world ent://SD_ILS/0/SD_ILS:640492 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Fried, Stephen, 1962-<br/>Author&#160;Fried, Stephen, 1962-<br/>Format:&#160;Books<br/>Call Number&#160;HF5548.37 F75 2010<br/>Publisher&#160;Auerbach Publications,<br/>Publication Date&#160;2010<br/>ISBN&#160;9781439820162<br/> Management of information security ent://SD_ILS/0/SD_ILS:813428 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Whitman, Michael E.<br/>Author&#160;Whitman, Michael E.,&#160;Mattord, Herbert J.<br/>Format:&#160;Books<br/>Call Number&#160;T58.6 W45 2010<br/>Edition&#160;3rd ed.<br/>Publisher&#160;Course Technology,<br/>Publication Date&#160;2010<br/>ISBN&#160;9780840031600<br/> Seven deadliest social network attacks ent://SD_ILS/0/SD_ILS:758898 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Timm, Carl<br/>Author&#160;Timm, Carl,&#160;Perez, Richard, 1969-,&#160;Ely, Adam<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.88817 T56 2010<br/>Publisher&#160;Syngress/Elsevier,<br/>Publication Date&#160;2010<br/>ISBN&#160;9781597495455<br/> Computer forensics jumpstart ent://SD_ILS/0/SD_ILS:761026 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Solomon, Michael, (Michael G.), 1963-<br/>Author&#160;Solomon, Michael, (Michael G.), 1963-,&#160;Barrett, Diane,&#160;Broom, Nell<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 S657 2010<br/>Publisher&#160;Wiley,<br/>Publication Date&#160;2010<br/>ISBN&#160;9780470936122<br/> Cloud security : a comprehensive guide to secure cloud computing ent://SD_ILS/0/SD_ILS:756726 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Krutz, Ronald L., 1938-<br/>Author&#160;Krutz, Ronald L., 1938-,&#160;Vines, Russell Dean, 1952-<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.88813 K78 2010<br/>Edition&#160;1st ed.<br/>Publisher&#160;Wiley Pub., Inc.,<br/>Publication Date&#160;2010<br/>ISBN&#160;9780470589878<br/> Virtualization and forensics : a digital forensic investigator's guide to virtual environments ent://SD_ILS/0/SD_ILS:756960 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Barrett, Diane<br/>Author&#160;Barrett, Diane,&#160;Kipper, Gregory<br/>Format:&#160;Books<br/>Call Number&#160;HV8079.C65 B37 2010<br/>Publisher&#160;Syngress/Elsevier,<br/>Publication Date&#160;2010<br/>ISBN&#160;9781597495578<br/> Dear Hacker : letters to the editor of 2600 ent://SD_ILS/0/SD_ILS:758618 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Goldstein, Emmanuel, 1959-<br/>Author&#160;Goldstein, Emmanuel, 1959-<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 G654 2010<br/>Edition&#160;1st ed.<br/>Publisher&#160;Wiley Pub., Inc.,<br/>Publication Date&#160;2010<br/>ISBN&#160;9780470620069<br/> Seven deadliest wireless technologies attacks ent://SD_ILS/0/SD_ILS:758825 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Haines, Brad<br/>Author&#160;Haines, Brad,&#160;Kramer, Tim<br/>Format:&#160;Books<br/>Call Number&#160;TK5103.2 H325 2010<br/>Publisher&#160;Syngress/Elsevier,<br/>Publication Date&#160;2010<br/>ISBN&#160;9781597495417<br/> Seven deadliest Microsoft attacks ent://SD_ILS/0/SD_ILS:758901 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Kraus, Rob<br/>Author&#160;Kraus, Rob<br/>Format:&#160;Books<br/>Call Number&#160;QA76.76.C68 S48 2010<br/>Publisher&#160;Syngress/Elsevier,<br/>Publication Date&#160;2010<br/>ISBN&#160;9781597495516<br/> IT audit, control, and security ent://SD_ILS/0/SD_ILS:781527 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Moeller, Robert R.<br/>Author&#160;Moeller, Robert R.<br/>Format:&#160;Books<br/>Call Number&#160;T58.5 M644 2010<br/>Publisher&#160;Wiley,<br/>Publication Date&#160;2010<br/>ISBN&#160;9780471406761<br/> 24 deadly sins of software security : programming flaws and how to fix them ent://SD_ILS/0/SD_ILS:387540 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Howard, Michael<br/>Author&#160;Howard, Michael,&#160;LeBlanc, David, 1960-,&#160;Viega, John<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 H68 2010<br/>Publisher&#160;McGraw-Hill Osborne Media,<br/>Publication Date&#160;2010<br/>ISBN&#160;9780071626750<br/> Hacking exposed computer forensics : secrets &amp; solutions ent://SD_ILS/0/SD_ILS:388051 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Philipp, Aaron<br/>Author&#160;Philipp, Aaron<br/>Format:&#160;Books<br/>Call Number&#160;HV8079.C65 P44 2010<br/>Edition&#160;2nd ed.<br/>Publisher&#160;McGraw-Hill/Osborne,<br/>Publication Date&#160;2010<br/>ISBN&#160;9780071626774<br/> Hacking exposed malware &amp; rootkits : malware &amp; rootkits security secrets &amp; solutions ent://SD_ILS/0/SD_ILS:388054 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Davis, Michael A.<br/>Author&#160;Davis, Michael A.,&#160;Bodmer, Sean,&#160;LeMasters, Aaron<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 D384 2010<br/>Publisher&#160;McGraw Hill,<br/>Publication Date&#160;2010<br/>ISBN&#160;9780071591188<br/> Digital signatures ent://SD_ILS/0/SD_ILS:401811 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Katz, Jonathan<br/>Author&#160;Katz, Jonathan<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 K374 2010<br/>Publisher&#160;Springer,<br/>Publication Date&#160;2010<br/>ISBN&#160;9780387277110<br/> Network intrusion detection and prevention : concepts and techniques ent://SD_ILS/0/SD_ILS:334955 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Ali A. Ghorbani<br/>Author&#160;Ali A. Ghorbani,&#160;Lu, Wei,&#160;Tavallaee, Mahbod<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 A43 2010<br/>Publisher&#160;Springer,<br/>Publication Date&#160;2010<br/>ISBN&#160;9780387887708<br/> SQL injection attacks and defense ent://SD_ILS/0/SD_ILS:640466 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Clarke, Justin<br/>Author&#160;Clarke, Justin<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 S654 2009<br/>Publisher&#160;Syngress Pub.,<br/>Publication Date&#160;2009<br/>ISBN&#160;9781597494243<br/> Cryptography research perspectives ent://SD_ILS/0/SD_ILS:642541 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Chen, Roland E.<br/>Author&#160;Chen, Roland E.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 C833 2009<br/>Publisher&#160;Nova Science Publishers,<br/>Publication Date&#160;2009<br/>ISBN&#160;9781604564921<br/> Data protection : governance, risk management, and compliance ent://SD_ILS/0/SD_ILS:736397 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Hill, David G. (David Gary), 1943-<br/>Author&#160;Hill, David G. (David Gary), 1943-<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 H52 2009<br/>Publisher&#160;Taylor &amp; Francis,<br/>Publication Date&#160;2009<br/>ISBN&#160;9781439806920<br/> CISSP guide to security essentials ent://SD_ILS/0/SD_ILS:621991 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Gregory, Peter<br/>Author&#160;Gregory, Peter<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 G74 2009<br/>Edition&#160;1st Ed.<br/>Publisher&#160;Course Technology Cengage Learning,<br/>Publication Date&#160;2009<br/>ISBN&#160;9781435428195<br/> Profiling hackers : the science of criminal profiling as applied to the world of hacking ent://SD_ILS/0/SD_ILS:624979 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Chiesa, Raoul, 1973-<br/>Author&#160;Chiesa, Raoul, 1973-,&#160;Ducci, Stefania,&#160;Ciappi, Silvio, 1965-<br/>Format:&#160;Books<br/>Call Number&#160;HV6773 C477 2009<br/>Publisher&#160;Auerbach Publications,<br/>Publication Date&#160;2009<br/>ISBN&#160;9781420086935<br/> Cyber fraud : tactics, techniques and procedures ent://SD_ILS/0/SD_ILS:374716 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Graham, James<br/>Author&#160;Graham, James,&#160;Howard, Rick<br/>Format:&#160;Books<br/>Call Number&#160;HV6773 C92 2009<br/>Publisher&#160;Auerbach Publications,<br/>Publication Date&#160;2009<br/>ISBN&#160;9781420091274<br/> Open source systems security certification ent://SD_ILS/0/SD_ILS:394792 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Damiani, Ernesto, 1960-<br/>Author&#160;Damiani, Ernesto, 1960-,&#160;Ardagna, Claudio Agostino,&#160;Ioini, Nabil El<br/>Format:&#160;Books<br/>Call Number&#160;QA76.76.S46 D35 2009<br/>Publisher&#160;Springer,<br/>Publication Date&#160;2009<br/>ISBN&#160;9780387773230<br/> Next generation SSH2 implementation : securing data in motion ent://SD_ILS/0/SD_ILS:282024 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Liu, Dale<br/>Author&#160;Liu, Dale<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 L58 2009<br/>Publisher&#160;Syngress,<br/>Publication Date&#160;2009<br/>ISBN&#160;9781597492836<br/> The mac hacker's handbook ent://SD_ILS/0/SD_ILS:282119 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Miller, Charlie, 1951-<br/>Author&#160;Miller, Charlie, 1951-,&#160;Dai Zovi, Dino A.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 M544 2009<br/>Publisher&#160;Wiley,<br/>Publication Date&#160;2009<br/>ISBN&#160;9780470395363<br/> Distributed systems security : issues, processes and solutions ent://SD_ILS/0/SD_ILS:282149 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Belapurkar, Abhijit<br/>Author&#160;Belapurkar, Abhijit<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 D57 2009<br/>Publisher&#160;Wiley,<br/>Publication Date&#160;2009<br/>ISBN&#160;9780470519882<br/> Hacking exposed 6 : network security secrets and solutions ent://SD_ILS/0/SD_ILS:287480 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;McClure, Stuart<br/>Author&#160;McClure, Stuart,&#160;Scambray, Joel,&#160;Kurtz, George<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 M325 2009<br/>Publisher&#160;McGraw-Hill,<br/>Publication Date&#160;2009<br/>ISBN&#160;9780071613743<br/> Enterprise information security and privacy ent://SD_ILS/0/SD_ILS:300373 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Axelrod, C. Warren<br/>Author&#160;Axelrod, C. Warren,&#160;Bayuk, Jennifer L.,&#160;Schutzer, Daniel, 1940-<br/>Format:&#160;Books<br/>Call Number&#160;HF5548.37 E57 2009<br/>Publisher&#160;Artech House,<br/>Publication Date&#160;2009<br/>ISBN&#160;9781596931909<br/> Social and human elements of information security : emerging trends and countermeasures ent://SD_ILS/0/SD_ILS:301118 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Gupta, Manish<br/>Author&#160;Gupta, Manish,&#160;Sharman, Raj<br/>Format:&#160;Books<br/>Call Number&#160;HV6773 S63 2009<br/>Publisher&#160;Information Science Reference,<br/>Publication Date&#160;2009<br/>ISBN&#160;9781605660363<br/> Mac OS X, iPod, and iPhone forensic analysis DVD toolkit ent://SD_ILS/0/SD_ILS:281555 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Varsalone, Jesse<br/>Author&#160;Varsalone, Jesse,&#160;Morrissey, Sean<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 V37 2009<br/>Publisher&#160;Syngress Publishing,<br/>Publication Date&#160;2009<br/>ISBN&#160;9781597492973<br/> Information security management metrics : a definitive guide to effective security monitoring and measurement ent://SD_ILS/0/SD_ILS:282895 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Brotby, W. Krag<br/>Author&#160;Brotby, W. Krag<br/>Format:&#160;Books<br/>Call Number&#160;HD30.2 B78 2009<br/>Publisher&#160;CRC Press,<br/>Publication Date&#160;2009<br/>ISBN&#160;9781420052855<br/> Professional ASP.NET 3.5 security, membership, and role management with C# and VB ent://SD_ILS/0/SD_ILS:284723 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Bilal Haidar<br/>Author&#160;Bilal Haidar,&#160;Schackow, Stefan, 1970-<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 H34 2008<br/>Publisher&#160;Wiley Publishing,<br/>Publication Date&#160;2009<br/>ISBN&#160;9780470379301<br/> Techniques and applications for advanced information privacy and security : emerging organizational, ethical, and human issues ent://SD_ILS/0/SD_ILS:331443 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Nemati, Hamid R., 1958-<br/>Author&#160;Nemati, Hamid R., 1958-<br/>Format:&#160;Books<br/>Call Number&#160;HF5548.37 T43 2009<br/>Publisher&#160;Information Science Reference,<br/>Publication Date&#160;2009<br/>ISBN&#160;9781605662107<br/> Primality testing and integer factorization in public-key cryptography ent://SD_ILS/0/SD_ILS:344752 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Yan, Song Y.<br/>Author&#160;Yan, Song Y.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 Y364 2009<br/>Edition&#160;2nd ed.<br/>Publisher&#160;Springer,<br/>Publication Date&#160;2009<br/>ISBN&#160;9780387772677<br/> Guide to strategic infrastructure security : becoming a security network professional ent://SD_ILS/0/SD_ILS:325499 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Weaver, Randy<br/>Author&#160;Weaver, Randy,&#160;Weaver, Dawn<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 W47 2009<br/>Publisher&#160;Course Technology,<br/>Publication Date&#160;2009<br/>ISBN&#160;9781418836610<br/> CISO soft skills : securing organizations impaired by employee politics, apathy, and intolerant perspectives ent://SD_ILS/0/SD_ILS:328129 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Collette, Ronald D.<br/>Author&#160;Collette, Ronald D.,&#160;Gentile, Michael,&#160;Gentile, Skye<br/>Format:&#160;Books<br/>Call Number&#160;HF5548.37 C64 2009<br/>Publisher&#160;CRC Press,<br/>Publication Date&#160;2009<br/>ISBN&#160;9781420089103<br/> Computer forensics and cyber crime : an introduction ent://SD_ILS/0/SD_ILS:328213 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Britz, Marjie T.<br/>Author&#160;Britz, Marjie T.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 B77 2009<br/>Edition&#160;2nd ed.<br/>Publisher&#160;Prentice Hall,<br/>Publication Date&#160;2009<br/>ISBN&#160;9780132447492<br/> Architecting secure software systems ent://SD_ILS/0/SD_ILS:328716 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Talukder, Asoke K.<br/>Author&#160;Talukder, Asoke K.,&#160;Chaitanya, Manish<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 T33 2009<br/>Publisher&#160;Auerbach Publications,<br/>Publication Date&#160;2009<br/>ISBN&#160;9781420087840<br/> Security software development : assessing and managing security risks ent://SD_ILS/0/SD_ILS:319416 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Ashbaugh, Douglas A.<br/>Author&#160;Ashbaugh, Douglas A.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 A84 2009<br/>Publisher&#160;Auerbach Publications,<br/>Publication Date&#160;2009<br/>ISBN&#160;9781420063806<br/> Security+ guide to network security fundamentals ent://SD_ILS/0/SD_ILS:334739 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Ciampa, Mark<br/>Author&#160;Ciampa, Mark<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 C524 2009<br/>Edition&#160;3rd ed.<br/>Publisher&#160;Course Technology,<br/>Publication Date&#160;2009<br/>ISBN&#160;9781428340664<br/> Understanding and applying cryptography and data security ent://SD_ILS/0/SD_ILS:337579 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Elbirt, Adam J.<br/>Author&#160;Elbirt, Adam J.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 E43 2009<br/>Publisher&#160;Auerbach Publications,<br/>Publication Date&#160;2009<br/>ISBN&#160;9781420061604<br/> Network security bible ent://SD_ILS/0/SD_ILS:333037 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Cole, Eric<br/>Author&#160;Cole, Eric,&#160;Krutz, Ronald L., 1938-,&#160;Conley, James W.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 C645 2009<br/>Edition&#160;2nd ed.<br/>Publisher&#160;Wiley Publishing,<br/>Publication Date&#160;2009<br/>ISBN&#160;9780470502495&#160;9780764573972<br/> Introduction to network security ent://SD_ILS/0/SD_ILS:334687 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Jacobson, Douglas<br/>Author&#160;Jacobson, Douglas<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 J32 2009<br/>Publisher&#160;Chapman &amp; Hall/CRC,<br/>Publication Date&#160;2009<br/>ISBN&#160;9781584885436<br/> Statistical techniques for network security : modern statistically-based intrusion detection and protection ent://SD_ILS/0/SD_ILS:334973 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Wang, Yun<br/>Author&#160;Wang, Yun<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 W364 2009<br/>Publisher&#160;IGI Global,<br/>Publication Date&#160;2009<br/>ISBN&#160;9781599047089<br/> Principles of information security ent://SD_ILS/0/SD_ILS:252460 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Whitman, Michael E.<br/>Author&#160;Whitman, Michael E.,&#160;Mattord, Herbert J.<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 W444 2009<br/>Edition&#160;3rd ed.<br/>Publisher&#160;Thomson Course Technology,<br/>Publication Date&#160;2009<br/>ISBN&#160;9781423901778<br/> Geekonomics : the real cost of insecure software ent://SD_ILS/0/SD_ILS:197534 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Rice, David , 1971-<br/>Author&#160;Rice, David , 1971-<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 R52 2008<br/>Publisher&#160;Pearson Education,<br/>Publication Date&#160;2008<br/>ISBN&#160;9780321477897<br/> IPTV security : protecting high value digital contents ent://SD_ILS/0/SD_ILS:232217 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Ramirez, David H.<br/>Author&#160;Ramirez, David H.<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.887 R35 2008<br/>Publisher&#160;John Wiley,<br/>Publication Date&#160;2008<br/>ISBN&#160;9780470519240<br/> Insider computer fraud : an in-depth framework for detecting and defending against insider IT attacks ent://SD_ILS/0/SD_ILS:199523 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Brancik, Kenneth C.<br/>Author&#160;Brancik, Kenneth C.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 B72 2008<br/>Publisher&#160;Auerbach Publications,<br/>Publication Date&#160;2008<br/>ISBN&#160;9781420046595<br/> Trust and security in collaborative computing ent://SD_ILS/0/SD_ILS:232187 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Zou, Xukai, 1963-<br/>Author&#160;Zou, Xukai, 1963-,&#160;Dai, Yuan-Shun,&#160;Pan, Yi, 1960-<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 Z68 2008<br/>Publisher&#160;World Scientific,<br/>Publication Date&#160;2008<br/>ISBN&#160;9789812703682<br/> Web 2.0 security : defending AJAX, RIA and SOA ent://SD_ILS/0/SD_ILS:249343 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Shah, Shreeraj<br/>Author&#160;Shah, Shreeraj<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 S53 2008<br/>Publisher&#160;Charles River Media,<br/>Publication Date&#160;2008<br/>ISBN&#160;9781584505501<br/> Computer forensics for dummies ent://SD_ILS/0/SD_ILS:253312 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Volonino, Linda<br/>Author&#160;Volonino, Linda,&#160;Anzaldua, Reynaldo<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 V65 2008<br/>Publisher&#160;Wiley Publishing Inc.,<br/>Publication Date&#160;2008<br/>ISBN&#160;9780470371916<br/> Information security and ethics : concepts, methodologies, tools and applications ent://SD_ILS/0/SD_ILS:623820 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Nemati, Hamid R., 1958-<br/>Author&#160;Nemati, Hamid R., 1958-<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 I535 2008 v.1<br/>Publisher&#160;Information Science Reference,<br/>Publication Date&#160;2008<br/>ISBN&#160;9781599049373<br/> &quot;Notes.Com&quot; berpandukan pengesahan mengunakan teknik fungsi cincangan dan pangkalan data teragih ent://SD_ILS/0/SD_ILS:779094 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Mazura Mat Din<br/>Author&#160;Mazura Mat Din,&#160;Universiti Teknologi Malaysia. Fakulti Komputeran<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 M393 2008 af<br/>Publisher&#160;Penerbit UTM,<br/>Publication Date&#160;2008<br/>ISBN&#160;9789673541027<br/> Security engineering : a guide to building dependable distributed systems ent://SD_ILS/0/SD_ILS:276957 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Anderson, Ross J.<br/>Author&#160;Anderson, Ross J.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 A56 2008<br/>Edition&#160;2nd ed.<br/>Publisher&#160;John Wiley &amp; Sons,<br/>Publication Date&#160;2008<br/>ISBN&#160;9780470068526<br/> Information assurance architecture ent://SD_ILS/0/SD_ILS:282892 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;WIllett, Keith D.<br/>Author&#160;WIllett, Keith D.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 W54 2008<br/>Publisher&#160;CRC Press,<br/>Publication Date&#160;2008<br/>ISBN&#160;9780849380679<br/> Introduction to modern cryptography ent://SD_ILS/0/SD_ILS:284442 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Katz, Jonathan, 1974-<br/>Author&#160;Katz, Jonathan, 1974-,&#160;Lindell, Yehuda<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 K37 2008<br/>Publisher&#160;Chapman &amp; Hall,<br/>Publication Date&#160;2008<br/>ISBN&#160;9781584885511<br/> Mastering system center data protection manager 2007 ent://SD_ILS/0/SD_ILS:286619 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Ganger, Devin L.<br/>Author&#160;Ganger, Devin L.,&#160;Femling, Ryan, 1975-<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 G36 2008<br/>Publisher&#160;Wiley Publishing,<br/>Publication Date&#160;2008<br/>ISBN&#160;9780470181522<br/> Gray hat hacking : the ethical hacker's handbook ent://SD_ILS/0/SD_ILS:290406 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Harris, Shon<br/>Author&#160;Harris, Shon<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 G724 2008<br/>Edition&#160;2nd ed.<br/>Publisher&#160;McGraw-Hill,<br/>Publication Date&#160;2008<br/>ISBN&#160;9780071495684<br/> Hacking exposed windows : windows security secrets and solutions ent://SD_ILS/0/SD_ILS:290412 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Scambray, Joel<br/>Author&#160;Scambray, Joel,&#160;McClure, Stuart<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 S325 2008<br/>Edition&#160;3rd ed.<br/>Publisher&#160;McGraw-Hill,<br/>Publication Date&#160;2008<br/>ISBN&#160;9780071494267<br/> Privacy-preserving data mining : models and algorithms ent://SD_ILS/0/SD_ILS:292409 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Aggarwal, Charu C.<br/>Author&#160;Aggarwal, Charu C.,&#160;Yu, Philip S.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.D343 P74 2008<br/>Publisher&#160;Springer,<br/>Publication Date&#160;2008<br/>ISBN&#160;9780387709918<br/> Security and software for cybercafes ent://SD_ILS/0/SD_ILS:302415 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Adomi, Esharenana E.<br/>Author&#160;Adomi, Esharenana E.<br/>Format:&#160;Books<br/>Call Number&#160;HE7581.5 S42 2008<br/>Publisher&#160;Information Science Reference,<br/>Publication Date&#160;2008<br/>ISBN&#160;9781599049038<br/> Information security : a practical approach ent://SD_ILS/0/SD_ILS:349781 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Bhaskar, S. M.<br/>Author&#160;Bhaskar, S. M.,&#160;Ahson, S. I.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.6.A25 B52 2008<br/>Publisher&#160;Alpha Science Intl Ltd,<br/>Publication Date&#160;2008<br/>ISBN&#160;9781842654583<br/> Digital privacy : theory, technologies and practices ent://SD_ILS/0/SD_ILS:248071 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Acquisti, Alessandro<br/>Author&#160;Acquisti, Alessandro<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 D58 2008<br/>Publisher&#160;Auerbach Publications,<br/>Publication Date&#160;2008&#160;2007<br/>ISBN&#160;9781420052176<br/> Information assurance : dependability and security in networked systems ent://SD_ILS/0/SD_ILS:248086 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Qian, Yi, 1962-<br/>Author&#160;Qian, Yi, 1962-<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 I58 2008<br/>Publisher&#160;Elsevier/Morgan Kaufmann,<br/>Publication Date&#160;2008<br/>ISBN&#160;9780123735669<br/> Software security engineering : a guide for project managers ent://SD_ILS/0/SD_ILS:262077 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Allen, Julia H.<br/>Author&#160;Allen, Julia H.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 S535 2008<br/>Publisher&#160;Addison-Wesley,<br/>Publication Date&#160;2008<br/>ISBN&#160;9780321509178<br/> Virtual honeypots : from botnet tracking to intrusion detection ent://SD_ILS/0/SD_ILS:272218 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Provos, Niels<br/>Author&#160;Provos, Niels,&#160;Holz, Thorsten<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 P78 2007<br/>Publisher&#160;Addison Wesley,<br/>Publication Date&#160;2008<br/>ISBN&#160;9780321336323<br/> The craft of system security ent://SD_ILS/0/SD_ILS:272348 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Smith, Sean<br/>Author&#160;Smith, Sean,&#160;Marchesini, John<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 S65 2008<br/>Publisher&#160;Addison Wesley,<br/>Publication Date&#160;2008<br/>ISBN&#160;9780321434838<br/> OSSEC host-based intrusion detection guide ent://SD_ILS/0/SD_ILS:281392 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Hay, Andrew<br/>Author&#160;Hay, Andrew,&#160;Cid, Daniel,&#160;Bray, Rory<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 H39 2008<br/>Publisher&#160;Syngress Publishing Inc.,<br/>Publication Date&#160;2008<br/>ISBN&#160;9781597492409<br/> Creating the secure managed desktop : using group policy, softGrid, microsoft deployment toolkit, and other management tools ent://SD_ILS/0/SD_ILS:284610 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Moskowitz, Jeremy<br/>Author&#160;Moskowitz, Jeremy<br/>Format:&#160;Books<br/>Call Number&#160;QA76.76.W56 M67 2008<br/>Publisher&#160;Sybex,<br/>Publication Date&#160;2008<br/>ISBN&#160;9780470277645<br/> Secure computer and network systems : modeling, analysis and design ent://SD_ILS/0/SD_ILS:286763 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Ye, Nong<br/>Author&#160;Ye, Nong<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 Y464 2008<br/>Publisher&#160;Hoboken, NJ : J. Wiley &amp; Sons,<br/>Publication Date&#160;2008<br/>ISBN&#160;9780470023242<br/> The web application hacker's handbook : discovering and exploiting security flaws ent://SD_ILS/0/SD_ILS:286727 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Stuttard, Dafydd<br/>Author&#160;Stuttard, Dafydd,&#160;Pinto, Marcus, 1978-<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.875.I57 S78 2008<br/>Publisher&#160;Wiley Publishing,<br/>Publication Date&#160;2008<br/>ISBN&#160;9780470170779<br/> Implementing email and security tokens : current standards, tools, and practices ent://SD_ILS/0/SD_ILS:286730 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Turner, Sean<br/>Author&#160;Turner, Sean,&#160;Housely, Russ<br/>Format:&#160;Books<br/>Call Number&#160;TK5102.85 T87 2008<br/>Publisher&#160;Wiley Publishing,<br/>Publication Date&#160;2008<br/>ISBN&#160;9780470254639<br/> Group policy : fundamentals, security, and troubleshooting ent://SD_ILS/0/SD_ILS:262991 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Moskowitz, Jeremy<br/>Author&#160;Moskowitz, Jeremy<br/>Format:&#160;Books<br/>Call Number&#160;QA76.76.O63 M69 2008<br/>Publisher&#160;Wiley Publishing,<br/>Publication Date&#160;2008<br/>ISBN&#160;9780470275894<br/> SUSE linux enterprise server security ent://SD_ILS/0/SD_ILS:269067 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Eckert, Jason W.<br/>Author&#160;Eckert, Jason W.,&#160;Novell, Inc.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 E24 2008<br/>Publisher&#160;Thomson Course Technology,<br/>Publication Date&#160;2008<br/>ISBN&#160;9781428322233<br/> Smart cards, tokens, security and applications ent://SD_ILS/0/SD_ILS:271615 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Mayes, Keith E.<br/>Author&#160;Mayes, Keith E.,&#160;Markantonakis, Konstantinos<br/>Format:&#160;Books<br/>Call Number&#160;TK7895.S62 S62 2008<br/>Publisher&#160;Springer-Verlag,<br/>Publication Date&#160;2008<br/>ISBN&#160;9780387721972<br/> Modern cryptanalysis : techniques for advanced code breaking ent://SD_ILS/0/SD_ILS:287325 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Swenson, Christopher<br/>Author&#160;Swenson, Christopher<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 S932 2008<br/>Publisher&#160;Wiley Publishing,<br/>Publication Date&#160;2008<br/>ISBN&#160;9780470135938<br/> Advanced computer network and security ent://SD_ILS/0/SD_ILS:342700 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Mohd. Aizaini Maarof<br/>Author&#160;Mohd. Aizaini Maarof,&#160;Muhammad Shafie Abd. Latiff,&#160;Subariah Ibrahim,&#160;Shukor Abd. Razak,&#160;Ali Selamat<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.5 A39 2008 a<br/>Publisher&#160;Penerbit Universiti Teknologi Malaysia,<br/>Publication Date&#160;2008<br/>ISBN&#160;9789835206139<br/> Hacking exposed Linux : Linux security secrets and solutions ent://SD_ILS/0/SD_ILS:319819 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;ISECOM (Organization)<br/>Author&#160;ISECOM (Organization)<br/>Format:&#160;Books<br/>Call Number&#160;QA76.76.O63 H324 2008<br/>Edition&#160;3rd ed.<br/>Publisher&#160;Mcgraw-Hill,<br/>Publication Date&#160;2008<br/>ISBN&#160;9780072262575<br/> Crimeware : understanding new attacks and defenses ent://SD_ILS/0/SD_ILS:319886 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Jakobsson, Markus<br/>Author&#160;Jakobsson, Markus,&#160;Ramzan, Zulfikar<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 J344 2008<br/>Publisher&#160;Addison-Wesley,<br/>Publication Date&#160;2008<br/>ISBN&#160;9780321501950<br/> Guide to computer forensics and investigations ent://SD_ILS/0/SD_ILS:325496 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Nelson, Bill<br/>Author&#160;Nelson, Bill<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 G84 2008<br/>Edition&#160;3rd ed.<br/>Publisher&#160;Course Technology,<br/>Publication Date&#160;2008<br/>ISBN&#160;9781418067335<br/> Biometrics for dummies ent://SD_ILS/0/SD_ILS:327058 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Gregory, Peter H.<br/>Author&#160;Gregory, Peter H.,&#160;Simon, Michael A.<br/>Format:&#160;Books<br/>Call Number&#160;TK7882.B56 G73 2008<br/>Publisher&#160;Wiley Publishing,<br/>Publication Date&#160;2008<br/>ISBN&#160;9780470292884<br/> Scene of the cybercrime ent://SD_ILS/0/SD_ILS:335048 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Cross, Michael<br/>Author&#160;Cross, Michael<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 C765 2008<br/>Edition&#160;2nd ed.<br/>Publisher&#160;Syngress,<br/>Publication Date&#160;2008<br/>ISBN&#160;9781597492768<br/> Malware forensics : investigating and analyzing malicious code ent://SD_ILS/0/SD_ILS:335050 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Aquilina, James M.<br/>Author&#160;Aquilina, James M.,&#160;Casey, Eoghan,&#160;Malin, Cameron H.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.76.C68 A68 2008<br/>Publisher&#160;Syngress,<br/>Publication Date&#160;2008<br/>ISBN&#160;9781597492683<br/> Software deployment, updating, and patching ent://SD_ILS/0/SD_ILS:337593 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Stackpole, Bill<br/>Author&#160;Stackpole, Bill,&#160;Hanrion, Patrick<br/>Format:&#160;Books<br/>Call Number&#160;QA76.76.C69 S74 2008<br/>Publisher&#160;CRC,<br/>Publication Date&#160;2008<br/>ISBN&#160;9780849358005<br/> Building an effective information security policy architecture ent://SD_ILS/0/SD_ILS:337596 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Bacik, Sandy<br/>Author&#160;Bacik, Sandy<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 B36 2008<br/>Publisher&#160;CRC Press,<br/>Publication Date&#160;2008<br/>ISBN&#160;9781420059052<br/> Network security : private communications in a public world ent://SD_ILS/0/SD_ILS:328860 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Kaufman, Charlie<br/>Author&#160;Kaufman, Charlie,&#160;Perlman, Radia,&#160;Speciner, Michael<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 K34 2008<br/>Edition&#160;2nd ed.<br/>Publisher&#160;Prentice Hall of India,<br/>Publication Date&#160;2008<br/>ISBN&#160;9788120322134<br/> Building an effective information security policy architecture ent://SD_ILS/0/SD_ILS:334683 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Bacik, Sandy<br/>Author&#160;Bacik, Sandy<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 B32 2008<br/>Publisher&#160;CRC,<br/>Publication Date&#160;2008<br/>ISBN&#160;9781420059052<br/> Secure software development : a security programmer's guide ent://SD_ILS/0/SD_ILS:334737 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Grembi, Jason<br/>Author&#160;Grembi, Jason<br/>Format:&#160;Books<br/>Call Number&#160;QA76.76.D47 G73 2008<br/>Publisher&#160;Delmar Cengage Learning,<br/>Publication Date&#160;2008<br/>ISBN&#160;9781418065478<br/> Oracle identity management : governance, risk, and compliance architecture ent://SD_ILS/0/SD_ILS:334767 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Pohlman, Marlin B.<br/>Author&#160;Pohlman, Marlin B.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 P63 2008<br/>Publisher&#160;Auerbach Publications,<br/>Publication Date&#160;2008<br/>ISBN&#160;9781420072471<br/> Securing information and communications systems : principles, technologies, and applications ent://SD_ILS/0/SD_ILS:263795 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Furnell, Steven M.<br/>Author&#160;Furnell, Steven M.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 S4244 2008<br/>Publisher&#160;Artech House Publishers,<br/>Publication Date&#160;2008<br/>ISBN&#160;9781596932289<br/> Fuzzing for software security testing and quality assurance ent://SD_ILS/0/SD_ILS:263804 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Takanen, Ari<br/>Author&#160;Takanen, Ari,&#160;Demott, Jared D.,&#160;Miller, Charles, 1951-<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 T344 2008<br/>Publisher&#160;Artech House Publishers,<br/>Publication Date&#160;2008<br/>ISBN&#160;9781596932142<br/> MANAGEMENT OF INFORMATION SECURITY ent://SD_ILS/0/SD_ILS:885900 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Whitman, Michael E., Dr., 1964-, author<br/>Author&#160;Whitman, Michael E., Dr., 1964-, author,&#160;Mattord, Herbert J., author<br/>Format:&#160;Books<br/>Call Number&#160;T58.6 W45 2008<br/>Edition&#160;Second edition<br/>Publication Date&#160;2008<br/>ISBN&#160;9781423901303<br/> Computational intelligence in information assurance and security ent://SD_ILS/0/SD_ILS:196712 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Nedjah, Nadia<br/>Author&#160;Nedjah, Nadia,&#160;Abraham, Ajith, 1968-,&#160;Mourelle, Luiza de Macedo<br/>Format:&#160;Books<br/>Call Number&#160;Q342 C657 2007<br/>Publisher&#160;Springer,<br/>Publication Date&#160;2007<br/>ISBN&#160;9783540710776<br/><a href="http://dx.doi.org/10.1007/978-3-540-71078-3">Full Text</a><br/> Secure programming with static analysis ent://SD_ILS/0/SD_ILS:203553 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Chess, Brian<br/>Author&#160;Chess, Brian,&#160;West, Jacob<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 C43 2007<br/>Publisher&#160;Addison Wesley,<br/>Publication Date&#160;2007<br/>ISBN&#160;9780321424778<br/> Malware detection ent://SD_ILS/0/SD_ILS:212138 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Christodorescu, Mihai<br/>Author&#160;Christodorescu, Mihai<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 M344 2006<br/>Publisher&#160;Springer,<br/>Publication Date&#160;2007&#160;2006<br/>ISBN&#160;9780387327204<br/><a href="http://dx.doi.org/10.1007/978-0-387-44599-1">FullText</a><br/> Network security essentials : applications and standards ent://SD_ILS/0/SD_ILS:225112 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Stallings, William<br/>Author&#160;Stallings, William<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 S72 2007<br/>Edition&#160;3rd ed.<br/>Publisher&#160;Pearson Education,<br/>Publication Date&#160;2007<br/>ISBN&#160;9780132380331<br/> Simple computer security : disinfect your PC ent://SD_ILS/0/SD_ILS:170952 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Geier, Eric, 1984-<br/>Author&#160;Geier, Eric, 1984-,&#160;Geier, James T.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 G44 2007<br/>Publisher&#160;Wiley Publishing,<br/>Publication Date&#160;2007<br/>ISBN&#160;9780470068540<br/> Cryptography for developers ent://SD_ILS/0/SD_ILS:170967 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;St. Denis, Tom<br/>Author&#160;St. Denis, Tom,&#160;Johnson, Simon<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 S725 2007<br/>Publisher&#160;Syngrees Publishing,<br/>Publication Date&#160;2007<br/>ISBN&#160;9781597491044<br/> Computer security and cryptography ent://SD_ILS/0/SD_ILS:195334 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Konheim, Alan G., 1934-<br/>Author&#160;Konheim, Alan G., 1934-<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 K664 2007<br/>Publisher&#160;Wiley-Interscience,<br/>Publication Date&#160;2007<br/>ISBN&#160;9780471947837<br/> Intelligent multimedia data hiding : new directions ent://SD_ILS/0/SD_ILS:196806 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Pan, Jeng-Shyang<br/>Author&#160;Pan, Jeng-Shyang<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 I578 2007<br/>Publisher&#160;Springer,<br/>Publication Date&#160;2007<br/>ISBN&#160;9783540711681<br/><a href="http://dx.doi.org/10.1007/978-3-540-71169-8">Fulltext</a><br/> Information assurance for the enterprise : a roadmap to information security ent://SD_ILS/0/SD_ILS:103417 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Schou, Corey<br/>Author&#160;Schou, Corey,&#160;Shoemaker, Dan<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 S365 2007<br/>Publisher&#160;McGraw-Hill/Irwin,<br/>Publication Date&#160;2007<br/>ISBN&#160;9780072255249<br/> Preserving privacy for on-line analytical processing ent://SD_ILS/0/SD_ILS:225793 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Wang, Lingyu<br/>Author&#160;Wang, Lingyu,&#160;Jajodia, Sushil,&#160;Wijesekera, Duminda<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.D343 W364 2007<br/>Publisher&#160;Springer-Verlag,<br/>Publication Date&#160;2007<br/>ISBN&#160;9780387462738<br/><a href="http://dx.doi.org/10.1007/978-0-387-46274-5">FullText</a><br/> Journal of computer security ent://SD_ILS/0/SD_ILS:155568 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 J68 2007<br/>Publisher&#160;IOS Press,<br/>Publication Date&#160;2007<br/>ISSN&#160;0926227X<br/><a href="http://search.ebscohost.com/login.aspx?direct=true&db=a3h&jid=LCY&site=ehost-live">Online via EBSCOhost</a><br/>Accessible within UTM campus<br/> Botnets : the killer web app ent://SD_ILS/0/SD_ILS:155922 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Schiller, Craig A.<br/>Author&#160;Schiller, Craig A.<br/>Format:&#160;Books<br/>Call Number&#160;TK 5105.59 B67 2007<br/>Publisher&#160;Syngress Publishing,<br/>Publication Date&#160;2007<br/>ISBN&#160;9781597491358<br/> Security in distributed, grid, mobile and pervasive computing ent://SD_ILS/0/SD_ILS:156667 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Xiao, Yang<br/>Author&#160;Xiao, Yang<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 X52 2007<br/>Publisher&#160;Auerbach Publications,<br/>Publication Date&#160;2007<br/>ISBN&#160;9780849379215<br/> Risks, controls, and security : concepts and applications ent://SD_ILS/0/SD_ILS:163959 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Raval, Vasant H. (Vasant Harishanker), 1940-<br/>Author&#160;Raval, Vasant H. (Vasant Harishanker), 1940-,&#160;Fichadia, Ashok<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 R38 2007<br/>Publisher&#160;John Wiley &amp; Sons,<br/>Publication Date&#160;2007<br/>ISBN&#160;9780471485797<br/> Testing code security ent://SD_ILS/0/SD_ILS:167923 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;van der Linden, Maura A.<br/>Author&#160;van der Linden, Maura A.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 V364 2007<br/>Publisher&#160;Auerbach Publication,<br/>Publication Date&#160;2007<br/>ISBN&#160;9780849392511<br/> Applied cryptanalysis : breaking ciphers in the real world ent://SD_ILS/0/SD_ILS:155893 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Stamp, Mark<br/>Author&#160;Stamp, Mark,&#160;Low, Richard M., 1967-<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 S68 2007<br/>Publisher&#160;Wiley-IEEE Press,<br/>Publication Date&#160;2007<br/>ISBN&#160;9780470114865<br/> Stealing the network : how to own a shadow ent://SD_ILS/0/SD_ILS:155915 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Long, Johnny<br/>Author&#160;Long, Johnny,&#160;Russell, Ryan,&#160;Mullen, Timothy<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 L67 2007<br/>Publisher&#160;Syngress,<br/>Publication Date&#160;2007<br/>ISBN&#160;9781597490818<br/> Decrypted secrets : methods and maxims of cryptology ent://SD_ILS/0/SD_ILS:158035 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Bauer, Friedrich Ludwig, 1924-<br/>Author&#160;Bauer, Friedrich Ludwig, 1924-<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 B38 2007<br/>Edition&#160;4th, rev. and extended ed.<br/>Publisher&#160;Springer,<br/>Publication Date&#160;2007<br/>ISBN&#160;9783540245025<br/><a href="http://dx.doi.org/10.1007/978-3-540-48121-8">FullText</a><br/> Secure data management in decentralized systems ent://SD_ILS/0/SD_ILS:158052 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Yu, Ting<br/>Author&#160;Yu, Ting,&#160;Jajodia, Sushil<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 S424 2007<br/>Publisher&#160;Springer,<br/>Publication Date&#160;2007<br/>ISBN&#160;9780387276946<br/><a href="http://dx.doi.org/10.1007/978-0-387-27696-0">Fulltext</a><br/> Network security policies and procedures ent://SD_ILS/0/SD_ILS:158167 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Frye, Douglas W.<br/>Author&#160;Frye, Douglas W.<br/>Format:&#160;Books<br/>Call Number&#160;HF5548.37 F79 2007<br/>Publisher&#160;Springer-Verlag,<br/>Publication Date&#160;2007<br/>ISBN&#160;9780387309378<br/><a href="http://dx.doi.org/10.1007/978-0-387-47955-2">FullText</a><br/> Microsoft windows security fundamentals ent://SD_ILS/0/SD_ILS:160897 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Clercq, Jan de, 1968-<br/>Author&#160;Clercq, Jan de, 1968-,&#160;Grillenmeier, Guido<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 C53 2007<br/>Publisher&#160;Elsevier Digital Press,<br/>Publication Date&#160;2007<br/>ISBN&#160;9781555583408<br/> WarDriving and wireless penetration testing ent://SD_ILS/0/SD_ILS:160952 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Hurley, Chris<br/>Author&#160;Hurley, Chris<br/>Format:&#160;Books<br/>Call Number&#160;TK5103.2 W38 2007<br/>Publisher&#160;Syngress Publishing,<br/>Publication Date&#160;2007<br/>ISBN&#160;9781597491112<br/> Data warehousing and data mining techniques for cyber security ent://SD_ILS/0/SD_ILS:164067 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Singhal, Anoop, 1958-<br/>Author&#160;Singhal, Anoop, 1958-<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 S56 2007<br/>Publisher&#160;Springer,<br/>Publication Date&#160;2007<br/>ISBN&#160;9780387264097<br/><a href="http://dx.doi.org/10.1007/978-0-387-47653-7">Full Text</a><br/> Introduction to cryptography : principles and applications ent://SD_ILS/0/SD_ILS:164219 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Delfs, Hans<br/>Author&#160;Delfs, Hans,&#160;Knebl, Helmut<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 D44 2007<br/>Edition&#160;2nd ed.<br/>Publisher&#160;Springer,<br/>Publication Date&#160;2007<br/>ISBN&#160;9783540492436<br/><a href="http://dx.doi.org/10.1007/3-540-49244-5">Fulltext</a><br/> Electronic postage systems : technology, security, economics ent://SD_ILS/0/SD_ILS:187565 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Bleumer, Gerrit<br/>Author&#160;Bleumer, Gerrit<br/>Format:&#160;Books<br/>Call Number&#160;HE6125 B53 2007<br/>Publisher&#160;Springer,<br/>Publication Date&#160;2007<br/>ISBN&#160;9780387293134<br/><a href="http://dx.doi.org/10.1007/978-0-387-44606-6">Full Text</a><br/>Accessible within UTM campus<br/> Hacking for dummies ent://SD_ILS/0/SD_ILS:132699 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Beaver, Kevin<br/>Author&#160;Beaver, Kevin,&#160;McClure, Stuart<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 B42 2007<br/>Edition&#160;2nd ed.<br/>Publisher&#160;Wiley,<br/>Publication Date&#160;2007<br/>ISBN&#160;9780470052358<br/> Phishing and countermeasures : understanding the increasing problem of electronic identity theft ent://SD_ILS/0/SD_ILS:137859 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Jakobsson, Markus<br/>Author&#160;Jakobsson, Markus,&#160;Myers, Steven, 1975-<br/>Format:&#160;Books<br/>Call Number&#160;HV6773 J34 2007<br/>Publisher&#160;John Wiley &amp; Sons,<br/>Publication Date&#160;2007<br/>ISBN&#160;9780471782452&#160;978047178245<br/> Administering Windows Vista security : the big surprises ent://SD_ILS/0/SD_ILS:137899 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Minasi, Mark<br/>Author&#160;Minasi, Mark<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 M566 2007<br/>Publisher&#160;Wiley Pub.,<br/>Publication Date&#160;2007<br/>ISBN&#160;9780470108321<br/> Computer forensics : principles and practices ent://SD_ILS/0/SD_ILS:138496 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Volonino, Linda<br/>Author&#160;Volonino, Linda,&#160;Anzaldua, Reynaldo,&#160;Godwin, Jana<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 V64 2007<br/>Publisher&#160;Pearson/Prentice Hall,<br/>Publication Date&#160;2007<br/>ISBN&#160;9780131547278<br/> IT security interviews exposed : secrets to landing your next information security job ent://SD_ILS/0/SD_ILS:245311 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Butler, Christopher<br/>Author&#160;Butler, Christopher,&#160;Rogers, Russ,&#160;Ferratt, Mason,&#160;Miles, Greg,&#160;Hurley, Chris<br/>Format:&#160;Books<br/>Call Number&#160;T58.5 I84 2007<br/>Publisher&#160;Wiley,<br/>Publication Date&#160;2007<br/>ISBN&#160;9780471779872<br/> Endpoint security ent://SD_ILS/0/SD_ILS:248041 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Kadrich, Mark<br/>Author&#160;Kadrich, Mark<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 K325 2007<br/>Publisher&#160;Addison-Wesley Professional,<br/>Publication Date&#160;2007<br/>ISBN&#160;9780321436955<br/> Security layer on top of the node operating system to secure active network ent://SD_ILS/0/SD_ILS:771077 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Satria Mandala<br/>Author&#160;Satria Mandala,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 S28 2007 af<br/>Publisher&#160;Penerbit Universiti Teknologi Malaysia,<br/>Publication Date&#160;2007<br/>ISBN&#160;9789673536887<br/> Evaluation of system requirements specification compliance to corporate information security policy : case study of risk and incident reporting system ent://SD_ILS/0/SD_ILS:771290 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Zailani Mohamed Sidek, Assoc.Prof.Dr.<br/>Author&#160;Zailani Mohamed Sidek, Assoc.Prof.Dr.,&#160;Universiti Teknologi Malaysia. Fakulti Komputeran<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 Z353 2007 af<br/>Publisher&#160;Penerbit UTM,<br/>Publication Date&#160;2007<br/>ISBN&#160;9789673536993<br/> Trustworthy computing : analytical and quantitative engineering evaluation ent://SD_ILS/0/SD_ILS:286724 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Sahinoglu, M.<br/>Author&#160;Sahinoglu, M.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 S49 2007<br/>Publisher&#160;John Wiley &amp; Sons,<br/>Publication Date&#160;2007<br/>ISBN&#160;9780470085127<br/> Mechanics of user identification and authentication : fundamentals of identity management ent://SD_ILS/0/SD_ILS:248074 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Todorov, Dobromir<br/>Author&#160;Todorov, Dobromir<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 T62 2007<br/>Publisher&#160;Auerbach Publications,<br/>Publication Date&#160;2007<br/>ISBN&#160;9781420052190<br/> Integrating security and software engineering : advances and future vision ent://SD_ILS/0/SD_ILS:284669 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Mouratidis, Haralambos<br/>Author&#160;Mouratidis, Haralambos,&#160;Giorgini, Paolo<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 I55 2007<br/>Publisher&#160;IGI Global,<br/>Publication Date&#160;2007<br/>ISBN&#160;9781599041476<br/> Fuzzing : brute force vulnerability discovery ent://SD_ILS/0/SD_ILS:272289 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Sutton, Michael<br/>Author&#160;Sutton, Michael,&#160;Greene, Adam,&#160;Amini, Pedram<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 S89 2007<br/>Edition&#160;1st ed.<br/>Publisher&#160;Addison Wesley,<br/>Publication Date&#160;2007<br/>ISBN&#160;9780321446114<br/> Professional rootkits ent://SD_ILS/0/SD_ILS:272327 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Vieler, Ric<br/>Author&#160;Vieler, Ric<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 V56 2007<br/>Publisher&#160;Wiley Publishing,<br/>Publication Date&#160;2007&#160;2004<br/>ISBN&#160;9780470101544<br/> Advances in enterprise information technology security ent://SD_ILS/0/SD_ILS:301112 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Khadraoui, Djamel<br/>Author&#160;Khadraoui, Djamel,&#160;Herrmann, Francine<br/>Format:&#160;Books<br/>Call Number&#160;HF5548.37 A38 2007<br/>Publisher&#160;IGI Global,<br/>Publication Date&#160;2007<br/>ISBN&#160;9781599040905<br/> Digital watermarking and steganography : fundamentals and techniques ent://SD_ILS/0/SD_ILS:337558 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Shih, Frank Y.<br/>Author&#160;Shih, Frank Y.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 S447 2008<br/>Publisher&#160;CRC Press,<br/>Publication Date&#160;2007<br/>ISBN&#160;9781420047578<br/> Critical information infrastructures : resilience and protection ent://SD_ILS/0/SD_ILS:254481 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Hyslop, Maitland<br/>Author&#160;Hyslop, Maitland<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 H97 2007<br/>Publisher&#160;Springer,<br/>Publication Date&#160;2007<br/>ISBN&#160;9780387718613<br/><a href="http://dx.doi.org/10.1007/978-0-387-71862-0">Fulltext</a><br/>Remote access restricted to users with a valid UTM ID via VPN<br/> Trust, complexity and control : confidence in a convergent world ent://SD_ILS/0/SD_ILS:270494 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Cofta, Piotr<br/>Author&#160;Cofta, Piotr<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 C59 2007<br/>Publisher&#160;John Wiley &amp; Sons,<br/>Publication Date&#160;2007<br/>ISBN&#160;9780470061305<br/> Privacy-respecting intrusion detection ent://SD_ILS/0/SD_ILS:271638 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Flegel, Ulrich<br/>Author&#160;Flegel, Ulrich<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 F53 2007<br/>Publisher&#160;Springer-Verlag,<br/>Publication Date&#160;2007<br/>ISBN&#160;9780387343464<br/> Guide to network defense and countermeasures ent://SD_ILS/0/SD_ILS:115036 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Weaver, Randy<br/>Author&#160;Weaver, Randy<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 W424 2007<br/>Edition&#160;2nd ed.<br/>Publisher&#160;Thomson/Course Technology,<br/>Publication Date&#160;2007&#160;2006<br/>ISBN&#160;9781418836795<br/> Grid computing security ent://SD_ILS/0/SD_ILS:142211 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Chakrabarti, Anirban<br/>Author&#160;Chakrabarti, Anirban<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.C58 C42 2007<br/>Publisher&#160;Springer,<br/>Publication Date&#160;2007<br/>ISBN&#160;9783540444923<br/><a href="http://dx.doi.org/10.1007/978-3-540-44493-0">Fulltext</a><br/> Information security : design, implementation, measurement and compliance ent://SD_ILS/0/SD_ILS:102187 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Layton, Timothy P.<br/>Author&#160;Layton, Timothy P.<br/>Format:&#160;Books<br/>Call Number&#160;HF5548.37 L39 2007<br/>Publisher&#160;Auerbach Pub.,<br/>Publication Date&#160;2007<br/>ISBN&#160;9780849370878<br/> Principles of information systems security : text and cases ent://SD_ILS/0/SD_ILS:108025 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Dhillon, Gurpreet, 1963-<br/>Author&#160;Dhillon, Gurpreet, 1963-<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 D54 2007<br/>Publisher&#160;John Wiley &amp; Sons,<br/>Publication Date&#160;2007<br/>ISBN&#160;9780471450566<br/> Cybersecurity for SCADA systems ent://SD_ILS/0/SD_ILS:195026 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Shaw, William T.<br/>Author&#160;Shaw, William T.<br/>Format:&#160;Books<br/>Call Number&#160;TJ222 S52 2006<br/>Publisher&#160;PennWell Corporation,<br/>Publication Date&#160;2006<br/>ISBN&#160;9781593700683<br/> Biometrics, computer security systems and artificial intelligence applications ent://SD_ILS/0/SD_ILS:191280 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Saeed, Khalid<br/>Author&#160;Saeed, Khalid,&#160;Pejas, Jerzy, 1954-,&#160;Mosdorf, Romuald<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 B56 2006<br/>Publisher&#160;Springer,<br/>Publication Date&#160;2006<br/>ISBN&#160;9780387362328<br/> Protecting information : from classical error correction to quantum cryptography ent://SD_ILS/0/SD_ILS:195047 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Loepp, Susan<br/>Author&#160;Loepp, Susan,&#160;Wootters, William Kent<br/>Format:&#160;Books<br/>Call Number&#160;QA76.889 L63 2006<br/>Publisher&#160;Cambridge University Press,<br/>Publication Date&#160;2006<br/>ISBN&#160;9780521534765&#160;9780521827409<br/> How personal and internet security works ent://SD_ILS/0/SD_ILS:101895 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Gralla, Preston<br/>Author&#160;Gralla, Preston<br/>Format:&#160;Books<br/>Call Number&#160;HV6773 G72 2006<br/>Publisher&#160;Que Publishing,<br/>Publication Date&#160;2006<br/>ISBN&#160;9780789735539<br/> Enterprise information systems assurance and system security : managerial and technical issues ent://SD_ILS/0/SD_ILS:104558 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Warkentin, Merrill<br/>Author&#160;Warkentin, Merrill,&#160;Vaughn, Rayford, 1947-<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 E574 2006<br/>Publisher&#160;Idea Group Publishing,<br/>Publication Date&#160;2006<br/>ISBN&#160;9781591409113<br/> Privacy protection for e-services ent://SD_ILS/0/SD_ILS:107901 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Yee, George<br/>Author&#160;Yee, George<br/>Format:&#160;Books<br/>Call Number&#160;HF5548.37 P74 2006<br/>Publisher&#160;Idea Group Publishing,<br/>Publication Date&#160;2006<br/>ISBN&#160;9781591409144<br/> Cryptography and network security : principles and practices ent://SD_ILS/0/SD_ILS:109602 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Stallings, William<br/>Author&#160;Stallings, William<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 S713 2006<br/>Edition&#160;4th. ed.<br/>Publisher&#160;Pearson,<br/>Publication Date&#160;2006<br/>ISBN&#160;9780131873162<br/> Digital watermarking, challenges and applications ent://SD_ILS/0/SD_ILS:159903 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Akram Mohd. Zeki<br/>Author&#160;Akram Mohd. Zeki,&#160;Azizah Abdul Manaf,&#160;Regional Postgraduate Conference on Engineering and Science (1st : 2006 : Johor Bahru)<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 A37 2006<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2006<br/> Securing HP NonStop servers in an open systems world : TCP/IP, OSS &amp; SQL ent://SD_ILS/0/SD_ILS:160900 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;XYPRO Technology Corporation<br/>Author&#160;XYPRO Technology Corporation<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.C55 S42 2006<br/>Publisher&#160;Elsevier Digital Press,<br/>Publication Date&#160;2006<br/>ISBN&#160;9781555583446<br/> Information security : a strategic approach ent://SD_ILS/0/SD_ILS:171334 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;LeVeque, Vincent<br/>Author&#160;LeVeque, Vincent<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 L484 2006<br/>Publisher&#160;John Wiley &amp; Sons,<br/>Publication Date&#160;2006<br/>ISBN&#160;9780471736127<br/> The Ciso handbook : a practical guide to securing your company ent://SD_ILS/0/SD_ILS:156649 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Gentile, Mike<br/>Author&#160;Gentile, Mike,&#160;Collette, Ronald D.,&#160;August, Thomas D.<br/>Format:&#160;Books<br/>Call Number&#160;HF5548.37 G46 2006<br/>Publisher&#160;Auerbach Publications,<br/>Publication Date&#160;2006<br/>ISBN&#160;9780849319525<br/> Multivariate public key cryptosystems ent://SD_ILS/0/SD_ILS:158164 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Ding, Jintai<br/>Author&#160;Ding, Jintai,&#160;Gower, Jason E.,&#160;Schmidt, Dieter S.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 D56 2006<br/>Publisher&#160;Springer-Verlag,<br/>Publication Date&#160;2006<br/>ISBN&#160;9780387322292<br/> Syngress force emerging threat analysis : from mischief to malicious ent://SD_ILS/0/SD_ILS:160905 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Maynor, David<br/>Author&#160;Maynor, David<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 S96 2006<br/>Publisher&#160;Syngress Publishing,<br/>Publication Date&#160;2006<br/>ISBN&#160;9781597490566<br/> Combating spyware in the enterprise ent://SD_ILS/0/SD_ILS:160908 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Baskin, Brian<br/>Author&#160;Baskin, Brian,&#160;Piltzecker, Tony, 1975-<br/>Format:&#160;Books<br/>Call Number&#160;QA76.76.S69 C65 2006<br/>Publisher&#160;Syngress,<br/>Publication Date&#160;2006<br/>ISBN&#160;9781597490641<br/> Trusted platform module basics : using TPM in embedded systems ent://SD_ILS/0/SD_ILS:161027 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Kinney, Steven<br/>Author&#160;Kinney, Steven<br/>Format:&#160;Books<br/>Call Number&#160;TK7895.E42 K56 2006<br/>Publisher&#160;Newnes,<br/>Publication Date&#160;2006<br/>ISBN&#160;9780750679602&#160;9780750679527<br/> Information security architecture : an integrated approach to security in the organization ent://SD_ILS/0/SD_ILS:143233 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Tudor, Jan Killmeyer<br/>Author&#160;Tudor, Jan Killmeyer<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 T82 2006<br/>Edition&#160;2nd ed.<br/>Publisher&#160;Auerbach Publications,<br/>Publication Date&#160;2006<br/>ISBN&#160;9780849315497<br/> Public key infrastructure : building trusted applications and Web services ent://SD_ILS/0/SD_ILS:144142 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Vacca, John R.<br/>Author&#160;Vacca, John R.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 P82 2004<br/>Publisher&#160;Taylor &amp; Francis,<br/>Publication Date&#160;2006&#160;2004<br/>ISBN&#160;9780849308222<br/> Firewalls and VPNs : principles and practices ent://SD_ILS/0/SD_ILS:151136 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Tibbs, Richard W.<br/>Author&#160;Tibbs, Richard W.,&#160;Oakes, Edward B.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 T52 2006<br/>Publisher&#160;Pearson/Prentice Hall,<br/>Publication Date&#160;2006<br/>ISBN&#160;9780131547315<br/> Securing SCADA systems ent://SD_ILS/0/SD_ILS:112146 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Krutz, Ronald L., 1938-<br/>Author&#160;Krutz, Ronald L., 1938-<br/>Format:&#160;Books<br/>Call Number&#160;TS156.8 K78 2006<br/>Publisher&#160;Wiley Publishing,<br/>Publication Date&#160;2006<br/>ISBN&#160;9780764597879<br/> Understanding intrusion detection through visualization ent://SD_ILS/0/SD_ILS:143436 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Axelsson, Stefan, 1968-<br/>Author&#160;Axelsson, Stefan, 1968-,&#160;Sands, David, 1965-<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 A93 2006<br/>Publisher&#160;Springer,<br/>Publication Date&#160;2006<br/>ISBN&#160;9780387276342<br/> Provider independent cryptographic tools ent://SD_ILS/0/SD_ILS:373731 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Subariah Ibrahim<br/>Author&#160;Subariah Ibrahim,&#160;Universiti Teknologi Malaysia. Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 S8337 2006 af<br/>Publisher&#160;Penerbit UTM,<br/>Publication Date&#160;2006<br/>ISBN&#160;9789673531097<br/> Secured multimedia data communication system ent://SD_ILS/0/SD_ILS:376035 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Ahmad Zuri Sha'meri<br/>Author&#160;Ahmad Zuri Sha'meri,&#160;Universiti Teknologi Malaysia. Fakulti Kejuruteraan Elektrik,&#160;Universiti Teknologi Malaysia. Pusat Pengurusan Penyelidikan<br/>Format:&#160;Books<br/>Call Number&#160;QA76.575 A983 2006 af<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2006<br/> Software security : building security in ent://SD_ILS/0/SD_ILS:641191 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;McGraw, Gary, 1966-<br/>Author&#160;McGraw, Gary, 1966-<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 M33 2006<br/>Publisher&#160;Addison-Wesley,<br/>Publication Date&#160;2006<br/>ISBN&#160;9780321356703<br/> Information technology security ent://SD_ILS/0/SD_ILS:490044 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Siti Rahayu Selamat<br/>Author&#160;Siti Rahayu Selamat<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9 A25 I53 2006<br/>Publisher&#160;Prentice Hall,<br/>Publication Date&#160;2006<br/>ISBN&#160;9789833655472<br/> The security risk assessment handbook : a complete guide for performing security risk assessments ent://SD_ILS/0/SD_ILS:424028 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Landoll, Douglas J.<br/>Author&#160;Landoll, Douglas J.<br/>Format:&#160;Books<br/>Call Number&#160;HE5548.37 L36 2006<br/>Publisher&#160;Auerbach Publications,<br/>Publication Date&#160;2006<br/>ISBN&#160;9780849329982<br/> Computer security fundamentals ent://SD_ILS/0/SD_ILS:430484 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Easttom, Chuck<br/>Author&#160;Easttom, Chuck<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 E27 2006<br/>Publisher&#160;Pearson Prentice Hall,<br/>Publication Date&#160;2006<br/>ISBN&#160;9780131711297<br/> Security issues in electronic voting system ent://SD_ILS/0/SD_ILS:373575 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Subariah Ibrahim<br/>Author&#160;Subariah Ibrahim,&#160;Universiti Teknologi Malaysia. Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 S83 2006 af<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2006<br/>ISBN&#160;9789673534098<br/> Risk analysis of cyber-campus modules (security guidelines of electronic academic assets) ent://SD_ILS/0/SD_ILS:373697 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Subariah Ibrahim<br/>Author&#160;Subariah Ibrahim,&#160;Universiti Teknologi Malaysia. Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 S833 2006 af<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2006<br/> Guide to computer forensics and investigations ent://SD_ILS/0/SD_ILS:437494 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Nelson, Bill<br/>Author&#160;Nelson, Bill<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 G84 2006<br/>Edition&#160;2nd ed.<br/>Publisher&#160;Course Technology,<br/>Publication Date&#160;2006<br/>ISBN&#160;9780619217068<br/> The unofficial guide to ethical hacking ent://SD_ILS/0/SD_ILS:454319 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Fadia, Ankit, 1985-<br/>Author&#160;Fadia, Ankit, 1985-<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 A54 2006<br/>Edition&#160;2nd ed.<br/>Publisher&#160;Thomson Course Technology,<br/>Publication Date&#160;2006<br/>ISBN&#160;9781598630626<br/> Hands-on ethical hacking and network defense ent://SD_ILS/0/SD_ILS:454393 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Simpson, Michael T.<br/>Author&#160;Simpson, Michael T.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 S55 2006<br/>Publisher&#160;Thomson/Course Technology,<br/>Publication Date&#160;2006<br/>ISBN&#160;9780619217082<br/> Computer security ent://SD_ILS/0/SD_ILS:461636 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Gollmann, Dieter<br/>Author&#160;Gollmann, Dieter<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 G65 2006<br/>Edition&#160;2nd ed.<br/>Publisher&#160;John Wiley &amp; Sons,<br/>Publication Date&#160;2006<br/>ISBN&#160;9780470862933<br/> Web and information security ent://SD_ILS/0/SD_ILS:462689 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Ferrari, Elena, 1968-<br/>Author&#160;Ferrari, Elena, 1968-,&#160;Thuraisingham, Bhavani M.<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 W42 2006<br/>Publisher&#160;IRM Press,<br/>Publication Date&#160;2006<br/>ISBN&#160;9781591405887<br/> Information security : principles and practice ent://SD_ILS/0/SD_ILS:462746 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Stamp, Mark<br/>Author&#160;Stamp, Mark<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 S75 2006<br/>Publisher&#160;Wiley-Interscience,<br/>Publication Date&#160;2006<br/>ISBN&#160;9780471738480<br/> Machine learning and data mining for computer security : methods and applications ent://SD_ILS/0/SD_ILS:470519 2024-05-24T20:45:01Z 2024-05-24T20:45:01Z by&#160;Maloof , Marcus A.<br/>Author&#160;Maloof , Marcus A.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 M34 2006<br/>Publisher&#160;Springer,<br/>Publication Date&#160;2006<br/>ISBN&#160;9781846280290<br/>