Search Results for - Narrowed by: Computer security - Open Access Book
SirsiDynix Enterprise
http://portal.utm.my/client/en_AU/main/main/qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity$002509Computer$002bsecurity$0026qf$003dITYPE$002509Material$002bType$0025091$00253AOPEN_BK$002509Open$002bAccess$002bBook$0026ps$003d300$0026isd$003dtrue?dt=list
2024-05-24T20:45:01Z
Computer Security Fundamentals
ent://SD_ILS/0/SD_ILS:886135
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Easttom, Chuck, author<br/>Author Easttom, Chuck, author<br/>Format: Books<br/>Call Number QA76.9.A25 E27 2020<br/>Edition Fourth Edition<br/>Publication Date 2020<br/>ISBN 9780135774779<br/>
Cybersecurity Analytics
ent://SD_ILS/0/SD_ILS:887246
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Verma, Rakesh M., author<br/>Author Verma, Rakesh M., author, Marchette, David J., author<br/>Format: Books<br/>Call Number QA76.9.A25 V47 2020<br/>Publication Date 2020<br/>ISBN 9780367346010<br/>
CYBER INFLUENCE AND COGNITIVE THREATS
ent://SD_ILS/0/SD_ILS:887935
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Benson, Vladlena, editor<br/>Author Benson, Vladlena, editor, McAlaney, John, editor<br/>Format: Books<br/>Call Number QA76.9.A25 C933 2020<br/>Publication Date 2020<br/>ISBN 9780128192047<br/>
Computer and Cyber Security : Principles, Algorithm, Applications, and Perspectives
ent://SD_ILS/0/SD_ILS:882324
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Gupta, Brij, Dr., 1982-, editor<br/>Author Gupta, Brij, Dr., 1982-, editor, Agrawal, Dharma P., Dr., editor, Wang, Haoxiang, Dr., editor<br/>Format: Books<br/>Call Number QA76.9.A25 C668 2019<br/>Publication Date 2019<br/>ISBN 9780815371335<br/>
GUIDE TO COMPUTER FORENSICS AND INVESTIGATIONS
ent://SD_ILS/0/SD_ILS:888152
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Nelson, Bill, author<br/>Author Nelson, Bill, author, Phillips, Amelia, author, Steuart, Christopher, author<br/>Format: Books<br/>Call Number QA76.9.A25 G84 2019<br/>Edition Sixth edition<br/>Publication Date 2019<br/>ISBN 9781337568944<br/>
CompTIA security+ guide to network security fundamentals
ent://SD_ILS/0/SD_ILS:873229
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Ciampa, Mark D., author<br/>Author Ciampa, Mark D., author<br/>Format: Books<br/>Call Number TK5105.59 C574 2018<br/>Edition Sixth edition<br/>Publication Date 2018<br/>ISBN 9781337288781<br/>
CYBERSECURITY ESSENTIALS
ent://SD_ILS/0/SD_ILS:882336
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Brooks, Charles J., author<br/>Author Brooks, Charles J., author, Grow, Christophe, author, Craig, Philip, author, Short, Donald, author<br/>Format: Books<br/>Call Number TK5105.59 B76 2018<br/>Publication Date 2018<br/>ISBN 9781119362395<br/>
Digital Forensics and Investigations : People, Processes, and Technologies to Defend the Enterprise
ent://SD_ILS/0/SD_ILS:887256
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Sachowski, Jason, author<br/>Author Sachowski, Jason, author<br/>Format: Books<br/>Call Number HV8079.C65 S23 2018<br/>Publication Date 2018<br/>ISBN 9781138720930<br/>
Advanced Persistent Security : A Cyberwarfare Approach to Implementing Adaptive Enterprise Protection, Detection, and Reaction Strategies
ent://SD_ILS/0/SD_ILS:873236
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Winkler, Ira, author<br/>Author Winkler, Ira, author, Gomes, Araceli Treu, author, Shackleford, Dave, editor<br/>Format: Books<br/>Call Number TK5105.59 W56 2017<br/>Publication Date 2017<br/>ISBN 9780128093160<br/>
Industrial network security : securing critical infrastructure networks for smart grid, SCADA, and other industrial control systems
ent://SD_ILS/0/SD_ILS:841037
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Knapp, Eric D.<br/>Author Knapp, Eric D., Langill, Joel Thomas<br/>Format: Books<br/>Call Number TS156.8 K53 2015<br/>Edition 2nd ed.<br/>Publisher Syngress ,<br/>Publication Date 2015<br/>ISBN 9780124201149<br/>
Pervasive Computing and Communications. Part II : QOS & SECURITY
ent://SD_ILS/0/SD_ILS:864714
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Yahaya Coulibaly, editor<br/>Author Yahaya Coulibaly, editor, Mohammad Abdur Razzaque, editor, Adekemi Adedokun, contributor, Chong, Yuh Chwen, contributor, Fauziah Abdul Razak, contributor<br/>Format: Books<br/>Call Number QA76.9.A25 P473 2015 a<br/>Edition First Edition 2015<br/>Publication Date 2015<br/>ISBN 9789835210501<br/>
SECURITY IN COMPUTING & NETWORKING. PART II
ent://SD_ILS/0/SD_ILS:865839
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Hassan Chizari, 1975-, editor<br/>Author Hassan Chizari, 1975-, editor, Hazinah Kutty Mammi, editor, Hassan Chizari, 1975-, contributor, Mahnoush Babaeizadeh, 1988-, contributor, Majid Bakhtiari, 1961-, contributor<br/>Format: Books<br/>Call Number QA76.9.A25 S439 2015 a<br/>Edition First Edition 2015<br/>Publication Date 2015<br/>ISBN 9789835211515<br/>
Introduction to modern cryptography
ent://SD_ILS/0/SD_ILS:835855
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Katz, Jonathan, 1974- author<br/>Author Katz, Jonathan, 1974- author, Lindell, Yehuda, author<br/>Format: Books<br/>Call Number QA76.9.A25 K38 2015<br/>Edition Second edition<br/>Publisher CRC Press/Taylor & Francis,<br/>Publication Date 2015<br/>ISBN 9781466570269<br/>
Web security : a WhiteHat perspective
ent://SD_ILS/0/SD_ILS:835869
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Hanqing, Wu, author<br/>Author Hanqing, Wu, author, Zhao, Liz, author<br/>Format: Books<br/>Call Number TK5105.59 H363 2015<br/>Publisher CRC Press is an imprint of Taylor & Francis ; Publishing House of Electronics Industry,<br/>Publication Date 2015<br/>ISBN 9781466592612<br/>
Information security : principles and new concepts
ent://SD_ILS/0/SD_ILS:837058
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Hobbs, Fiona, editor<br/>Author Hobbs, Fiona, editor<br/>Format: Books<br/>Call Number QA76.9.A25 I549 2015 f v.1<br/>Publisher Clanrye Intl.,<br/>Publication Date 2015<br/>ISBN 9781632403063 9781632403070 9781632403087 9781632403094<br/>
Integrated researh in steganography
ent://SD_ILS/0/SD_ILS:837102
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Coon, Audrey, editor<br/>Author Coon, Audrey, editor<br/>Format: Books<br/>Call Number TK5102.94 I58 2015<br/>Publisher Clanrye Intl.,<br/>Publication Date 2015<br/>ISBN 9781632403131<br/>
Hardware security : design, threats, and safeguards
ent://SD_ILS/0/SD_ILS:837219
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Mukhopadhyay, Debdeep, author<br/>Author Mukhopadhyay, Debdeep, author, Chakraborty, Rajat Subhra, author<br/>Format: Books<br/>Call Number QA76.9.A25 M85 2015<br/>Publisher CRC Press,<br/>Publication Date 2015<br/>ISBN 9781439895832<br/>
Designing and building security operations center
ent://SD_ILS/0/SD_ILS:838365
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Nathans, David<br/>Author Nathans, David<br/>Format: Books<br/>Call Number HV8290 N38 2015<br/>Publisher Syngress ,<br/>Publication Date 2015<br/>ISBN 9780128008997<br/>
Information security analytics : finding security insights, patterns, and anomalies in big data
ent://SD_ILS/0/SD_ILS:838366
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Talabis, Mark, author<br/>Author Talabis, Mark, author, McPherson, Robert, author, Miyamoto, I., author, Martin, Jason L., author<br/>Format: Books<br/>Call Number QA76.9.A25 T355 2015<br/>Publisher Syngress,<br/>Publication Date 2015<br/>ISBN 9780128002070<br/>
Computational network science : an algorithmic approach
ent://SD_ILS/0/SD_ILS:838372
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Hexmoor, Henry, author<br/>Author Hexmoor, Henry, author<br/>Format: Books<br/>Call Number TK5105.59 H49 2015<br/>Publisher Morgan Kaufmann,<br/>Publication Date 2015<br/>ISBN 9780128008911<br/>
Managing risk in information systems
ent://SD_ILS/0/SD_ILS:839128
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Gibson, Darril, author<br/>Author Gibson, Darril, author<br/>Format: Books<br/>Call Number QA76.9.A25 G53 2015<br/>Edition Second edition<br/>Publisher Jones & Bartlett Learning,<br/>Publication Date 2015<br/>ISBN 9781284055955<br/>
Security policies and implementation issues
ent://SD_ILS/0/SD_ILS:839131
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Johnson, Robert, 1946- author<br/>Author Johnson, Robert, 1946- author<br/>Format: Books<br/>Call Number TK5105.59 J64 2015<br/>Publisher Jones & Bartlett Learning,<br/>Publication Date 2015<br/>ISBN 9781284055993<br/>
SECURITY IN COMPUTING & NETWORKING. PART 1
ent://SD_ILS/0/SD_ILS:864380
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Hassan Chizari, 1975-, editor<br/>Author Hassan Chizari, 1975-, editor, Hazinah Kutty Mammi, editor, A. Ahmed Ibrahim Alkilary, contributor, Affandi Husain, contributor, Hassan Chizari, 1975-, contributor<br/>Format: Books<br/>Call Number QA76.9.A25 S438 2015 a<br/>Edition First Edition 2015<br/>Publication Date 2015<br/>ISBN 35000000012313<br/>
Guide to network defense and countermeasures
ent://SD_ILS/0/SD_ILS:822586
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Weaver, Randy, author<br/>Author Weaver, Randy, author, Weaver, Dawn, author, Farwood, Dean, author<br/>Format: Books<br/>Call Number TK5105.59 W424 2014<br/>Edition Third edition<br/>Publisher Cengage Learning,<br/>Publication Date 2014<br/>ISBN 9781133727941<br/>
Hands-on information security lab manual
ent://SD_ILS/0/SD_ILS:828287
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Whitman, Michael E., 1964-, author<br/>Author Whitman, Michael E., 1964-, author, Mattord, Herbert J., author, Green, Andrew, author<br/>Format: Books<br/>Call Number HD30.38 W45 2014 f<br/>Publisher Cengage Learning,<br/>Publication Date 2014<br/>ISBN 9781285167572<br/>
Cyber security and IT infrastructure protection
ent://SD_ILS/0/SD_ILS:831239
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Vacca, John R., editor<br/>Author Vacca, John R., editor<br/>Format: Books<br/>Call Number QA76.9.A25 C934 2014<br/>Publisher Elsevier,<br/>Publication Date 2014<br/>ISBN 9780124166813<br/>
Security management : a critical thinking approach
ent://SD_ILS/0/SD_ILS:804186
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Land, Michael<br/>Author Land, Michael, Ricks, Truett, Rocks, Bobby<br/>Format: Books<br/>Call Number HD61.51 L36 2014<br/>Publisher CRC Press,<br/>Publication Date 2014<br/>ISBN 9781466561779<br/>
Introduction to computer and network security : navigating shades of gray
ent://SD_ILS/0/SD_ILS:805289
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Brooks, Richard R.<br/>Author Brooks, Richard R.<br/>Format: Books<br/>Call Number QA76.9.A25 B76 2014<br/>Publisher Chapman and Hall/CRC,<br/>Publication Date 2014 2013<br/>ISBN 9781439860717<br/>
Cryptography for security and privacy in cloud computing
ent://SD_ILS/0/SD_ILS:814026
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Rass, Stefan<br/>Author Rass, Stefan, Slamanig, Daniel, author<br/>Format: Books<br/>Call Number QA76.9.A25 R37 2014<br/>Publisher Artech House,<br/>Publication Date 2014<br/>ISBN 9781608075751<br/>
Cryptography and network security : principles and practice
ent://SD_ILS/0/SD_ILS:821152
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Stallings, William<br/>Author Stallings, William<br/>Format: Books<br/>Call Number TK5105.59 S713 2014<br/>Edition 6th ed.<br/>Publisher Prentice Hall,<br/>Publication Date 2014 2011<br/>ISBN 9780133354690<br/>
Network security essentials applications and standards
ent://SD_ILS/0/SD_ILS:821220
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Stallings, William<br/>Author Stallings, William<br/>Format: Books<br/>Call Number TK5105.59 S725 2014<br/>Edition 5th ed.<br/>Publisher Prentice Hall,<br/>Publication Date 2014<br/>ISBN 9780133370430<br/>
Security without obscurity : a guide to confidentiality, authentication, and integrity
ent://SD_ILS/0/SD_ILS:821365
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Stapleton, J. J. (Jeffrey James)<br/>Author Stapleton, J. J. (Jeffrey James)<br/>Format: Books<br/>Call Number QA76.9.A25 S84 2014<br/>Publisher CRC Press,<br/>Publication Date 2014<br/>ISBN 9781466592148<br/>
Applied network security monitoring : collection, detection, and analysis
ent://SD_ILS/0/SD_ILS:828438
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Sanders, Chris, 1986-<br/>Author Sanders, Chris, 1986-, Smith, Jason (Adjunct associate professor), author<br/>Format: Books<br/>Call Number QA76.9.A25 S264 2014<br/>Publisher Syngress, an imprint of Elsevier,<br/>Publication Date 2014<br/>ISBN 9780124172081<br/>
Security for service oriented architectures
ent://SD_ILS/0/SD_ILS:837213
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Williams, Walter, author<br/>Author Williams, Walter, author<br/>Format: Books<br/>Call Number TK5105.5828 W55 2014<br/>Publisher CRC Press,<br/>Publication Date 2014<br/>ISBN 9781466584020<br/>
Core software security : security at the source
ent://SD_ILS/0/SD_ILS:837216
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Ransome, James F., author<br/>Author Ransome, James F., author, Misra, Anmol, author, Schoenfield, Brook, author<br/>Format: Books<br/>Call Number QA76.9.A25 R364 2014<br/>Publisher Taylor & Francis,<br/>Publication Date 2014<br/>ISBN 9781466560956<br/>
The science and technology of counterterrorism : measuring physical and electronic security risk
ent://SD_ILS/0/SD_ILS:838145
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Young, Carl S., author<br/>Author Young, Carl S., author<br/>Format: Books<br/>Call Number HV6431 Y68 2014<br/>Publication Date 2014<br/>ISBN 9780124200562<br/>
The basics of information security : understanding the fundamentals of InfoSec in theory and practice
ent://SD_ILS/0/SD_ILS:838388
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Andress, Jason<br/>Author Andress, Jason<br/>Format: Books<br/>Call Number QA76.9.A25 A535 2014<br/>Edition 2nd ed.<br/>Publisher Elsevier/Syngress, Syngress is a imprint of Elsevier,<br/>Publication Date 2014<br/>ISBN 9780128007440<br/>
Advances in secure computing, internet services, and applications
ent://SD_ILS/0/SD_ILS:841203
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Tripathy, B. K. editor<br/>Author Tripathy, B. K. editor, Acharjya, D. P. editor<br/>Format: Books<br/>Call Number TK5105.59 A38 2014 f<br/>Publisher Information Science Reference, an imprint of IGI Global,<br/>Publication Date 2014<br/>ISBN 9781466649408<br/>
Analyzing security, trust, and crime in the digital world
ent://SD_ILS/0/SD_ILS:841204
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Nemati, Hamid R., 1958- editor<br/>Author Nemati, Hamid R., 1958- editor<br/>Format: Books<br/>Call Number HF5548.37 A53 2014 f<br/>Publisher Information Science Reference,<br/>Publication Date 2014<br/>ISBN 9781466648562<br/>
Organizational, legal, and technological dimensions of information system administration
ent://SD_ILS/0/SD_ILS:841212
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Portela, Irene Maria, 1965-, editor<br/>Author Portela, Irene Maria, 1965-, editor, Almeida, Fernando, 1979-, editor<br/>Format: Books<br/>Call Number T58.64 O74 2014 f<br/>Publisher Information Science Reference,<br/>Publication Date 2014<br/>ISBN 9781466645264<br/>
Cloud management and security
ent://SD_ILS/0/SD_ILS:835570
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Abbadi, Imad M., author<br/>Author Abbadi, Imad M., author<br/>Format: Books<br/>Call Number QA76.585 A235 2014<br/>Publisher Wiley,<br/>Publication Date 2014<br/>ISBN 9781118817094<br/>
A cryptography primer : secrets and promises
ent://SD_ILS/0/SD_ILS:835848
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Klein, Philip N., author<br/>Author Klein, Philip N., author<br/>Format: Books<br/>Call Number QA76.9.A25 K545 2014<br/>Publisher Cambridge University Press,<br/>Publication Date 2014<br/>ISBN 9781107017887<br/>
What every engineer should know about cyber security and digital forensics
ent://SD_ILS/0/SD_ILS:837282
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by DeFranco, Joanna F author<br/>Author DeFranco, Joanna F author<br/>Format: Books<br/>Call Number TK5105.59 D44 2013<br/>Publisher CRC Press,<br/>Publication Date 2014<br/>ISBN 9781466564527<br/>
The Intrusion detection networks : a key to collaborative security
ent://SD_ILS/0/SD_ILS:837290
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Fung, Carol author<br/>Author Fung, Carol author, Boutaba, Raouf<br/>Format: Books<br/>Call Number QA76.9 A25 F85 2014<br/>Publisher Auerbach Pub.,<br/>Publication Date 2014<br/>ISBN 9781466564121<br/>
The art of memory forensics : detecting malware and threats in Windows, Linux, and Mac memory
ent://SD_ILS/0/SD_ILS:837944
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Ligh, Michael Hale, author<br/>Author Ligh, Michael Hale, author, Case, Andrew, author, Levy, Jamie, author, Walters, Aaron, author<br/>Format: Books<br/>Call Number QA76.9.A25 L54 2014<br/>Publication Date 2014<br/>ISBN 9781118825099<br/>
Collaboration with cloud computing : security, social media, and unified communications
ent://SD_ILS/0/SD_ILS:838073
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Messier, Ric, author<br/>Author Messier, Ric, author, Konar, Allan, editor<br/>Format: Books<br/>Call Number QA76.9.A25 M475 2014<br/>Publisher Syngress,<br/>Publication Date 2014<br/>ISBN 9780124170407<br/>
Windows forensic analysis toolkit : advanced analysis techniques for Windows 8
ent://SD_ILS/0/SD_ILS:838076
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Carvey, Harlan A., author<br/>Author Carvey, Harlan A., author<br/>Format: Books<br/>Call Number HV8079.C65 C374 2014<br/>Edition Fourth edition<br/>Publisher Syngress,<br/>Publication Date 2014<br/>ISBN 9780124171572<br/>
Engineering safe and secure software systems
ent://SD_ILS/0/SD_ILS:798047
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Axelrod, C. Warren<br/>Author Axelrod, C. Warren<br/>Format: Books<br/>Call Number QA76.9.A25 A93 2013<br/>Publisher Artech House,<br/>Publication Date 2013<br/>ISBN 9781608074723<br/>
Digital forensics for handheld devices
ent://SD_ILS/0/SD_ILS:799569
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Doherty, Eamon P.<br/>Author Doherty, Eamon P.<br/>Format: Books<br/>Call Number HV8079.C65 D64 2013<br/>Publisher CRC Press,<br/>Publication Date 2013<br/>ISBN 9781439898772<br/>
Information security
ent://SD_ILS/0/SD_ILS:804293
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Rhodes-Ousley, Mark<br/>Author Rhodes-Ousley, Mark<br/>Format: Books<br/>Call Number TK5105.59 R46 2013<br/>Edition 2nd ed.<br/>Publisher McGraw Hill Education,<br/>Publication Date 2013<br/>ISBN 9780071784351<br/>
Network and information security : issues, challenges and research trends
ent://SD_ILS/0/SD_ILS:805429
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Sarma, Nityananda<br/>Author Sarma, Nityananda, Bhattacharyya, Dhruba K.<br/>Format: Books<br/>Call Number TK5105.59 N484 2013<br/>Publisher Narosa Publishing House,<br/>Publication Date 2013<br/>ISBN 9788184873146<br/>
Intelligent systems for security informatics
ent://SD_ILS/0/SD_ILS:805697
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Yang, Christopher C.<br/>Author Yang, Christopher C.<br/>Format: Books<br/>Call Number QA76.9.A25 I58 2013<br/>Edition 1st ed.<br/>Publisher Elsevier/Academic Press ; Zhejiang University Press,<br/>Publication Date 2013<br/>ISBN 9780124047020<br/>
Safety management for software-based equipment
ent://SD_ILS/0/SD_ILS:818636
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Boulanger, Jean-Louis<br/>Author Boulanger, Jean-Louis<br/>Format: Books<br/>Call Number QA76.9.A25 B684 2013<br/>Publisher ISTE Ltd/John Wiley and Sons Inc,<br/>Publication Date 2013<br/>ISBN 9781848214521<br/>
Digital forensics explained
ent://SD_ILS/0/SD_ILS:821062
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Gogolin, Greg.<br/>Author Gogolin, Greg.<br/>Format: Books<br/>Call Number HV8079.C65 G64 2013<br/>Publisher Taylor & Francis, CRC Press,<br/>Publication Date 2013<br/>ISBN 9781439874950<br/>
Cryptography in C and C++
ent://SD_ILS/0/SD_ILS:829247
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Welschenbach, Michael, author<br/>Author Welschenbach, Michael, author<br/>Format: Books<br/>Call Number QA76.9.A25 W45 2013<br/>Edition 2nd ed.<br/>Publisher Apress,<br/>Publication Date 2013<br/>ISBN 9781430250982<br/>
Cyber crime, security and digital intelligence
ent://SD_ILS/0/SD_ILS:831351
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Johnson, Mark, 1959- author<br/>Author Johnson, Mark, 1959- author<br/>Format: Books<br/>Call Number HV6773 J64 2013<br/>Publisher Gower,<br/>Publication Date 2013<br/>ISBN 9781409454496 9781409454502<br/>
Information security policy development for compliance : ISO/IEC 27001, NIST SP 800-53, HIPAA standard, PCI DSS V2.0, and AUP V5.0
ent://SD_ILS/0/SD_ILS:805287
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Williams, Barry L.<br/>Author Williams, Barry L.<br/>Format: Books<br/>Call Number QA76.9.A25 W55 2013<br/>Publisher CRC Press, Taylor & Francis Group,<br/>Publication Date 2013<br/>ISBN 9781466580589<br/>
Web application defender's cookbook : battling hackers and protecting users
ent://SD_ILS/0/SD_ILS:806507
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Barnett, Ryan C.<br/>Author Barnett, Ryan C.<br/>Format: Books<br/>Call Number QA76.9.A25 B377 2013<br/>Edition 1st ed.<br/>Publisher Wiley Pub., Inc.,<br/>Publication Date 2013 2012<br/>ISBN 9781118362181<br/>
Data hiding : exposing concealed data in multimedia, operating systems, mobile devices and network protocols
ent://SD_ILS/0/SD_ILS:818448
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Raggo, Michael T., author<br/>Author Raggo, Michael T., author, Hosmer, Chet, author, McGrew, Wesley, editor<br/>Format: Books<br/>Call Number QA76.9.A25 R346 2013<br/>Edition 1st ed.<br/>Publisher Syngress,<br/>Publication Date 2013<br/>ISBN 9781597497435<br/>
Pragmatic security metrics : applying metametrics to information security
ent://SD_ILS/0/SD_ILS:821158
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Brotby, W. Krag<br/>Author Brotby, W. Krag, Hinson, Gary, Kabay, M.E.<br/>Format: Books<br/>Call Number QA76.9.A25 B76 2013<br/>Publisher CRC Press,<br/>Publication Date 2013<br/>ISBN 9781439881521<br/>
Management of information security
ent://SD_ILS/0/SD_ILS:822690
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Whitman, Michael E.<br/>Author Whitman, Michael E., Mattord, Herbert J.<br/>Format: Books<br/>Call Number T58.6 W45 2013<br/>Edition 4th ed.<br/>Publisher Cengage Learning,<br/>Publication Date 2013<br/>ISBN 9781285062297<br/>
Information security risk assessment toolkit : practical assessments through data collection and data analysis
ent://SD_ILS/0/SD_ILS:797973
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Talabis, Mark<br/>Author Talabis, Mark, Martin, Jason<br/>Format: Books<br/>Call Number QA76.9.A25 T354 2013<br/>Publisher Elsevier,<br/>Publication Date 2013<br/>ISBN 9781597497350<br/>
The hacker's guide to OS X : exploiting OS X from the root-up
ent://SD_ILS/0/SD_ILS:797987
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Bathurst, Robert<br/>Author Bathurst, Robert, Rogers, Russ, Ghassemlouei, Alijohn<br/>Format: Books<br/>Call Number QA76.774.M33 B38 2013<br/>Publisher Syngress,<br/>Publication Date 2013<br/>ISBN 9781597499507<br/>
Discrete dynamical systems and chaotic machines : theory and applications
ent://SD_ILS/0/SD_ILS:828823
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Bahi, Jacques Mohcine, author<br/>Author Bahi, Jacques Mohcine, author, Guyeux, Christophe, author<br/>Format: Books<br/>Call Number QA76.9.A25 B344 2013<br/>Publisher CRC Press,<br/>Publication Date 2013<br/>ISBN 9781466554504<br/>
Elementary information security
ent://SD_ILS/0/SD_ILS:829121
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Smith, Richard E.<br/>Author Smith, Richard E.<br/>Format: Books<br/>Call Number QA76.9.A25 S658 2013<br/>Publisher Jones & Bartlett Learning,<br/>Publication Date 2013<br/>ISBN 9781449648206<br/>
Cyber security for educational leaders : a guide to understanding and implementing technology policies
ent://SD_ILS/0/SD_ILS:830049
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Phillips, Richard A.<br/>Author Phillips, Richard A., Sianjina, Rayton R.<br/>Format: Books<br/>Call Number LB1028.3 P454 2013<br/>Publisher Routledge,<br/>Publication Date 2013<br/>ISBN 9780415631969 9780415631976<br/>
Computer security literacy : staying safe in a digital world
ent://SD_ILS/0/SD_ILS:837215
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Jacobson, Douglas, author<br/>Author Jacobson, Douglas, author, Idziorek, Joseph, author<br/>Format: Books<br/>Call Number QA76.9.A25 J334 2013<br/>Publisher CRC Press / Taylor & Francis Group,<br/>Publication Date 2013<br/>ISBN 9781439856185<br/>
Security basics for computer architects
ent://SD_ILS/0/SD_ILS:835912
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Lee, Ruby B., author<br/>Author Lee, Ruby B., author<br/>Format: Books<br/>Call Number QA76.9.A73 L444 2013<br/>Publisher Morgan & Claypool Publishers,<br/>Publication Date 2013<br/>ISBN 9781627051552<br/>
Linux Malware Incident Response : a practitioner's guide to forensic collection and examination of volatile data : an excerpt from Malware Forensic Field Guide for Linux Systems
ent://SD_ILS/0/SD_ILS:837986
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Malin, Cameron H., author<br/>Author Malin, Cameron H., author, Aquilina, James M., Casey, Eoghan<br/>Format: Books<br/>Call Number QA76.3 M353 2013<br/>Publisher Elsevier Science,<br/>Publication Date 2013<br/>ISBN 9780124095076<br/>
Hacking web apps : detecting and preventing web application security problems
ent://SD_ILS/0/SD_ILS:797962
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Shema, Mike<br/>Author Shema, Mike<br/>Format: Books<br/>Call Number TK5105.59 S545 2012<br/>Publisher Syngress,<br/>Publication Date 2012<br/>ISBN 9781597499514<br/>
Advances in intelligence and security informatics
ent://SD_ILS/0/SD_ILS:798923
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Mao, Wenji<br/>Author Mao, Wenji, Wang, Fei-Yue<br/>Format: Books<br/>Call Number QA76.9.A25 M335 2012<br/>Edition 1st ed.<br/>Publisher Academic Press ; Zhejiang University Press,<br/>Publication Date 2012<br/>ISBN 9780123972002<br/>
Hacking exposed 7 : network security secrets & solutions
ent://SD_ILS/0/SD_ILS:801363
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by McClure, Stuart<br/>Author McClure, Stuart, McClure, Stuart, Scambray, Joel, Kurtz, George<br/>Format: Books<br/>Call Number TK5105.59 M483 2012<br/>Edition 7th ed.<br/>Publisher McGraw-Hill Osborne Media,<br/>Publication Date 2012<br/>ISBN 9780071780285<br/>
Computer security : principles and practice
ent://SD_ILS/0/SD_ILS:804149
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Stallings, William<br/>Author Stallings, William, Brown, Lawrie<br/>Format: Books<br/>Call Number QA76.9.A25 S73 2012<br/>Edition 2nd ed. International ed.<br/>Publisher Pearson,<br/>Publication Date 2012<br/>ISBN 9780273764496<br/>
Network and application security fundamentals and practices
ent://SD_ILS/0/SD_ILS:805301
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Ganguly, Debashis<br/>Author Ganguly, Debashis, Lahiri, Shibamouli<br/>Format: Books<br/>Call Number TK5105.59 G365 2012<br/>Publisher Science Publishers ; Distributed by CRC Press,<br/>Publication Date 2012<br/>ISBN 9781578087556<br/>
Embedded systems security : practical methods for safe and secure software and systems development
ent://SD_ILS/0/SD_ILS:805596
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Kleidermacher, David<br/>Author Kleidermacher, David, Kleidermacher, Mike<br/>Format: Books<br/>Call Number QA76.76.D47 K564 2012<br/>Edition 1st ed.<br/>Publisher Elsevier,<br/>Publication Date 2012<br/>ISBN 9780123868862<br/>
Role mining in business : taming role-based access control administration
ent://SD_ILS/0/SD_ILS:808318
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Colantonio, Alessandro<br/>Author Colantonio, Alessandro, Di Pietro, Roberto, Ocello, Alberto<br/>Format: Books<br/>Call Number QA76.9.A25 C657 2012<br/>Publisher World Scientific,<br/>Publication Date 2012<br/>ISBN 9789814374002<br/>
Reliability and availability of cloud computing
ent://SD_ILS/0/SD_ILS:821145
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Bauer, Eric<br/>Author Bauer, Eric, Adams, Randee<br/>Format: Books<br/>Call Number QA76.585 B394 2012<br/>Publisher Wiley-IEEE Press,<br/>Publication Date 2012<br/>ISBN 9781118177013<br/>
Analyzing computer security : a threat/vulnerability/countermeasure approach
ent://SD_ILS/0/SD_ILS:780002
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Pfleeger, Charles P., 1948-<br/>Author Pfleeger, Charles P., 1948-, Pfleeger, Shari Lawrence<br/>Format: Books<br/>Call Number QA76.9.A25 P45 2012<br/>Publisher Prentice Hall,<br/>Publication Date 2012<br/>ISBN 9780132789462<br/>
Secure and resilient software : requirements, test cases, and testing methods
ent://SD_ILS/0/SD_ILS:785387
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Merkow, Mark S.<br/>Author Merkow, Mark S., Raghavan, Lakshmikanth<br/>Format: Books<br/>Call Number QA76.76.T48 M47 2012<br/>Publisher CRC Press,<br/>Publication Date 2012<br/>ISBN 9781439866214<br/>
SQL injection attacks and defense
ent://SD_ILS/0/SD_ILS:797984
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Clarke, Justin<br/>Author Clarke, Justin<br/>Format: Books<br/>Call Number QA76.9.A25 C542 2012<br/>Publisher Elsevier,<br/>Publication Date 2012<br/>ISBN 9781597499637<br/>
Cyber security standards, practices and industrial applications : systems and methodologies
ent://SD_ILS/0/SD_ILS:772975
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Zubairi, Junaid Ahmed, 1961-<br/>Author Zubairi, Junaid Ahmed, 1961-, Mahboob, Athar, 1971-<br/>Format: Books<br/>Call Number TK5105.59 C93 2012 f<br/>Publisher Information Science Reference,<br/>Publication Date 2012<br/>ISBN 9781609608514 9781609608521 9781609608538<br/>
Principles of information security
ent://SD_ILS/0/SD_ILS:838004
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Whitman, Michael E., 1964-, author<br/>Author Whitman, Michael E., 1964-, author, Mattord, Herbert J., author<br/>Format: Books<br/>Call Number QA76.9.A25 W34 2012<br/>Edition Fourth edition<br/>Publisher Course Technology,<br/>Publication Date 2012<br/>ISBN 9781111138219<br/>
Securing the cloud : cloud computer security techniques and tactics
ent://SD_ILS/0/SD_ILS:748817
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Winkler, J. R. (Joachim R.)<br/>Author Winkler, J. R. (Joachim R.)<br/>Format: Books<br/>Call Number QA76.585 W56 2011<br/>Publisher Elsevier,<br/>Publication Date 2011<br/>ISBN 9781597495929<br/>
Data mining and machine learning in cybersecurity
ent://SD_ILS/0/SD_ILS:750220
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Dua, Sumeet<br/>Author Dua, Sumeet, Du, Xian<br/>Format: Books<br/>Call Number QA76.9.D343 D83 2011<br/>Publisher Taylor & Francis,<br/>Publication Date 2011<br/>ISBN 9781439839423<br/>
Security strategies in Linux platforms and applications
ent://SD_ILS/0/SD_ILS:764154
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Jang, Michael H.<br/>Author Jang, Michael H.<br/>Format: Books<br/>Call Number QA76.76.O63 J366 2011<br/>Publisher Jones & Bartlett Learning,<br/>Publication Date 2011<br/>ISBN 9780763791896<br/>
The basics of hacking and penetration testing : ethical hacking and penetration testing made easy
ent://SD_ILS/0/SD_ILS:799110
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Engebretson, Pat (Patrick Henry), 1974-<br/>Author Engebretson, Pat (Patrick Henry), 1974-, Broad, James<br/>Format: Books<br/>Call Number QA76.9.A25 E54 2011<br/>Publisher Syngress,<br/>Publication Date 2011<br/>ISBN 9781597496551<br/>
Software engineering for secure systems : industrial and research perspectives
ent://SD_ILS/0/SD_ILS:801907
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Mouratidis, Haralambos, 1977-<br/>Author Mouratidis, Haralambos, 1977-<br/>Format: Books<br/>Call Number QA76.9.A25 S6537 2011 f<br/>Publisher Information Science Reference,<br/>Publication Date 2011<br/>ISBN 9781615208371 9781615208388<br/>
Information assurance and security ethics in complex systems : interdisciplinary perspectives
ent://SD_ILS/0/SD_ILS:630427
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Dark, Melissa Jane, 1961-<br/>Author Dark, Melissa Jane, 1961-<br/>Format: Books<br/>Call Number QA76.9.A25 I545 2011 f<br/>Publisher Information Science Reference,<br/>Publication Date 2011<br/>ISBN 9781616922450 9781616922467<br/>
Hacking exposed : web applications : web application security secrets and solutions
ent://SD_ILS/0/SD_ILS:643191
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Scambray, Joel<br/>Author Scambray, Joel, Liu, Vincent, Sima, Caleb<br/>Format: Books<br/>Call Number TK5105.59 S324 2011<br/>Edition 3rd ed.<br/>Publisher McGraw-Hill Companies,<br/>Publication Date 2011<br/>ISBN 9780071740647<br/>
Gray hat hacking : the ethical hacker's handbook
ent://SD_ILS/0/SD_ILS:643947
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Harris, Shon<br/>Author Harris, Shon<br/>Format: Books<br/>Call Number QA76.9.A25 G724 2011<br/>Edition 3rd ed.<br/>Publisher McGraw-Hill,<br/>Publication Date 2011<br/>ISBN 9780071742559<br/>
Physical-layer security : from information theory to security engineering
ent://SD_ILS/0/SD_ILS:802330
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Bloch, Matthieu, 1981-<br/>Author Bloch, Matthieu, 1981-, Barros, Joao<br/>Format: Books<br/>Call Number TK5105.59 B574 2011<br/>Publisher Cambridge University Press,<br/>Publication Date 2011<br/>ISBN 9780521516501<br/>
Introduction to computer security
ent://SD_ILS/0/SD_ILS:807356
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Goodrich, Michael T.<br/>Author Goodrich, Michael T., Tamassia, Roberto, 1960-<br/>Format: Books<br/>Call Number QA76.9.A25 G66 2011<br/>Publisher Addison-Wesley,<br/>Publication Date 2011<br/>ISBN 9780321512949<br/>
Malware forensic field guide for windows systems : digital forensics field guides
ent://SD_ILS/0/SD_ILS:748807
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Malin, Cameron H.<br/>Author Malin, Cameron H., Casey, Eoghan, Aquilina, James M<br/>Format: Books<br/>Call Number QA76.76.C68 M322 2012<br/>Publisher Syngress,<br/>Publication Date 2011<br/>ISBN 9781597494724<br/>
Computer security
ent://SD_ILS/0/SD_ILS:756730
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Gollmann, Dieter<br/>Author Gollmann, Dieter<br/>Format: Books<br/>Call Number QA76.9.A25 G65 2011<br/>Edition 3rd ed.<br/>Publisher Wiley,<br/>Publication Date 2011<br/>ISBN 9780470741153<br/>
Malware analyst's cookbook and DVD : tools and techniques for fighting malicious code
ent://SD_ILS/0/SD_ILS:758506
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Ligh, Michael Hale<br/>Author Ligh, Michael Hale<br/>Format: Books<br/>Call Number QA76.9.A25 M353 2011<br/>Publisher Wiley,<br/>Publication Date 2011<br/>ISBN 9780470613030<br/>
A guide to kernel exploitation : attacking the core
ent://SD_ILS/0/SD_ILS:758745
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Perla, Enrico<br/>Author Perla, Enrico, Massimiliano, Oldani<br/>Format: Books<br/>Call Number QA76.76.O63 P568 2011<br/>Publisher Syngress,<br/>Publication Date 2011<br/>ISBN 9781597494861<br/>
Managed code rootkits : hooking into runtime environments
ent://SD_ILS/0/SD_ILS:758778
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Metula, Erez<br/>Author Metula, Erez<br/>Format: Books<br/>Call Number QA76.9.A25 M487 2011<br/>Publisher Syngress,<br/>Publication Date 2011<br/>ISBN 9781597495745<br/>
IT auditing : using controls to protect information assets
ent://SD_ILS/0/SD_ILS:761290
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Davis, Chris (Christopher Michael)<br/>Author Davis, Chris (Christopher Michael), Schiller, Mike, Wheeler, Kevin<br/>Format: Books<br/>Call Number QA76.9.A93 D38 2011<br/>Edition 2nd ed.<br/>Publisher McGraw-Hill,<br/>Publication Date 2011<br/>ISBN 9780071742382<br/>
Mobile device security for dummies
ent://SD_ILS/0/SD_ILS:778300
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Campagna, Rich R.<br/>Author Campagna, Rich R., Iyer, Sibbu, Krishnan, Ashwin<br/>Format: Books<br/>Call Number QA76.9.A25 C364 2011<br/>Publisher Wiley Pubishing, Inc.,<br/>Publication Date 2011<br/>ISBN 9780470927533<br/>
Cryptography and network security : principles and practice
ent://SD_ILS/0/SD_ILS:758256
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Stallings, William<br/>Author Stallings, William<br/>Format: Books<br/>Call Number TK5105.59 S713 2011<br/>Edition 5th ed.<br/>Publisher Prentice Hall,<br/>Publication Date 2011<br/>ISBN 9780136097044<br/>
Computer forensics jumpstart
ent://SD_ILS/0/SD_ILS:758605
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Solomon, Michael, (Michael G.), 1963-<br/>Author Solomon, Michael, (Michael G.), 1963-, Rudolph, K., Tittel, Ed., Broom, Neil, Barrett, Diane<br/>Format: Books<br/>Call Number QA76.9.A25 S656 2011<br/>Edition Second edition.<br/>Publisher Wiley Publishing, Inc.<br/>Publication Date 2011<br/>ISBN 9780470931660<br/>
Security 2020 : reduce security risks this decade
ent://SD_ILS/0/SD_ILS:758608
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Howard, Doug<br/>Author Howard, Doug, Prince, Kevin<br/>Format: Books<br/>Call Number QA76.9.A25 H6976 2011<br/>Edition 1st ed.<br/>Publisher Wiley Pub.,<br/>Publication Date 2011<br/>ISBN 9780470639559<br/>
Windows registry forensics : advanced digital forensic analysis of the Windows registry
ent://SD_ILS/0/SD_ILS:758726
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Carvey, Harlan A.<br/>Author Carvey, Harlan A.<br/>Format: Books<br/>Call Number HV8079.C65 C373 2011<br/>Publisher Syngress,<br/>Publication Date 2011<br/>ISBN 9781597495806<br/>
Web application obfuscation : -/WAFs..Evasion..Filters//alert (/Obfuscation/)-
ent://SD_ILS/0/SD_ILS:758794
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Heiderich, Mario<br/>Author Heiderich, Mario<br/>Format: Books<br/>Call Number QA76.625 H46 2011<br/>Publisher Elsevier/Syngress,<br/>Publication Date 2011<br/>ISBN 9781597496049<br/>
Securing SQL server : protecting your database from attackers
ent://SD_ILS/0/SD_ILS:758811
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Cherry, Denny<br/>Author Cherry, Denny, Larock, Thomas<br/>Format: Books<br/>Call Number QA76.73.S67 C478 2011<br/>Publisher Syngress,<br/>Publication Date 2011<br/>ISBN 9781597496254<br/>
Information security : principles and practice
ent://SD_ILS/0/SD_ILS:779250
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Stamp, Mark<br/>Author Stamp, Mark<br/>Format: Books<br/>Call Number QA76.9.A25 S75 2011<br/>Edition 2nd ed.<br/>Publisher Wiley,<br/>Publication Date 2011<br/>ISBN 9780470626399<br/>
Roadmap to information security : for IT and InfoSec managers
ent://SD_ILS/0/SD_ILS:781102
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Whitman, Michael E.<br/>Author Whitman, Michael E., Mattord, Herbert J.<br/>Format: Books<br/>Call Number QA76.9.A25 W45 2011<br/>Publisher Cengage Learning,<br/>Publication Date 2011<br/>ISBN 9781435480308<br/>
Introduction to security and network forensics
ent://SD_ILS/0/SD_ILS:785073
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Buchanan, William J.<br/>Author Buchanan, William J.<br/>Format: Books<br/>Call Number QA76.9.A25 B824 2011<br/>Publisher CRC Press,<br/>Publication Date 2011<br/>ISBN 9780849335686<br/>
Cyber security, cyber crime and cyber forensics : applications and perspectives
ent://SD_ILS/0/SD_ILS:772977
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Santanam, Raghu, 1969-<br/>Author Santanam, Raghu, 1969-, Sethumadhavan, M., 1966-, Virendra, Mohit<br/>Format: Books<br/>Call Number QA76.9.A25 C93 2011 f<br/>Publisher Information Science Reference,<br/>Publication Date 2011<br/>ISBN 9781609601232 9781609601256<br/>
Intrusion detection : a machine learning approach
ent://SD_ILS/0/SD_ILS:780736
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Yu, Zhenwei<br/>Author Yu, Zhenwei, Tsai, Jeffrey J. P.<br/>Format: Books<br/>Call Number TK5105.59 Y89 2011<br/>Publisher Imperial College Press,<br/>Publication Date 2011<br/>ISBN 9781848164475<br/>
Information security evaluation : a holistic approach
ent://SD_ILS/0/SD_ILS:781151
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Tashi, Igli<br/>Author Tashi, Igli, Ghernaouti-Helie, Solange<br/>Format: Books<br/>Call Number TK5105.59 T374 2011<br/>Publisher EFPL Pr.,<br/>Publication Date 2011<br/>ISBN 9781439879153<br/>
Introduction to cryptography with open-source software
ent://SD_ILS/0/SD_ILS:789125
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by McAndrew, Alasdair<br/>Author McAndrew, Alasdair<br/>Format: Books<br/>Call Number QA76.9 .A25 M398 2011<br/>Publisher CRC Press,<br/>Publication Date 2011<br/>ISBN 9781439825709<br/>
Machine learning forensics for law enforcement, security, and intelligence
ent://SD_ILS/0/SD_ILS:789134
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Mena, Jesus.<br/>Author Mena, Jesus.<br/>Format: Books<br/>Call Number HV8073 M395 2011<br/>Publisher Taylor & Francis,<br/>Publication Date 2011<br/>ISBN 9781439860694<br/>
Network security essentials : applications and standards
ent://SD_ILS/0/SD_ILS:377761
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Stallings, William<br/>Author Stallings, William<br/>Format: Books<br/>Call Number TK5105.59 S72 2011<br/>Edition 4th ed.<br/>Publisher Pearson Prentice Hall,<br/>Publication Date 2011<br/>ISBN 9780136108054<br/>
The basics of information security : understanding the fundamentals of InfoSec in theory and practice
ent://SD_ILS/0/SD_ILS:838401
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Andress, Jason<br/>Author Andress, Jason, Rogers, Russ, editor<br/>Format: Computer file<br/>Call Number QA76.9.A25 A535 2011<br/>Publisher Syngress,<br/>Publication Date 2011<br/>ISBN 9781597496537<br/>
Computer security : protecting digital resources
ent://SD_ILS/0/SD_ILS:374669
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Newman, Robert C.<br/>Author Newman, Robert C.<br/>Format: Books<br/>Call Number QA76.9.D314 N48 2010<br/>Publisher Jones & Bartlett Publishers,<br/>Publication Date 2010<br/>ISBN 9780763759940<br/>
Hashing in computer science : fifty years of slicing and dicing
ent://SD_ILS/0/SD_ILS:639636
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Konheim, Alan G., 1934-<br/>Author Konheim, Alan G., 1934-<br/>Format: Books<br/>Call Number QA76.9.H36 K65 2010<br/>Publisher John Wiley & Sons,<br/>Publication Date 2010<br/>ISBN 9780470344736<br/>
Safety of computer architectures
ent://SD_ILS/0/SD_ILS:639717
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Boulanger, Jean-Louis<br/>Author Boulanger, Jean-Louis<br/>Format: Books<br/>Call Number QA76.9.A73 S244 2010<br/>Publisher ISTE ;<br/>Publication Date 2010<br/>ISBN 9781848211971<br/>
Digital forensics for network, internet, and cloud computing : a forensic evidence guide for moving targets and data
ent://SD_ILS/0/SD_ILS:640462
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Lillard, Terrence V.<br/>Author Lillard, Terrence V., Lillard, Terrence<br/>Format: Books<br/>Call Number HV8079.C65 D54 2010<br/>Publisher Syngress,<br/>Publication Date 2010<br/>ISBN 9781597495370<br/>
Secure and resilient software development
ent://SD_ILS/0/SD_ILS:736304
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Merkow, Mark S.<br/>Author Merkow, Mark S., Raghavan, Lakshmikanth<br/>Format: Books<br/>Call Number QA76.76 .D47 M466 2010<br/>Publisher CRC Press,<br/>Publication Date 2010<br/>ISBN 9781439826966<br/>
Information security risk analysis
ent://SD_ILS/0/SD_ILS:804270
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Peltier, Thomas R.<br/>Author Peltier, Thomas R.<br/>Format: Books<br/>Call Number QA76.9.A25 P445 2010<br/>Edition 3rd ed.<br/>Publisher Auerbach Publications,<br/>Publication Date 2010<br/>ISBN 9781439839560<br/>
Guide to computer forensics and investigations
ent://SD_ILS/0/SD_ILS:624345
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Nelson, Bill<br/>Author Nelson, Bill, Philips, Amelia, Steuart, Chris<br/>Format: Books<br/>Call Number HV8079.C65 G85 2010<br/>Edition 4th Ed.<br/>Publisher Cengage Learning,<br/>Publication Date 2010 2009<br/>ISBN 9781435498839<br/>
Risk analysis and security countermeasure selection
ent://SD_ILS/0/SD_ILS:625845
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Norman, Thomas L.<br/>Author Norman, Thomas L.<br/>Format: Books<br/>Call Number HV8290 N67 2010<br/>Publisher CRC Press,<br/>Publication Date 2010<br/>ISBN 9781420078701<br/>
Collaborative computer security and trust management
ent://SD_ILS/0/SD_ILS:631994
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Seigneur, Jean-Marc<br/>Author Seigneur, Jean-Marc, Slagell, Adam, 1977-<br/>Format: Books<br/>Call Number QA76.9.A25 C656 2010 f<br/>Publisher Information Science Reference,<br/>Publication Date 2010<br/>ISBN 9781605664149 9781605664156<br/>
Relation based access control
ent://SD_ILS/0/SD_ILS:637823
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Zhang, Rui<br/>Author Zhang, Rui<br/>Format: Books<br/>Call Number QA76.9.A25 Z43 2010<br/>Publisher IOS Pr.,<br/>Publication Date 2010<br/>ISBN 9783898386265<br/>
Journal of computer security
ent://SD_ILS/0/SD_ILS:640207
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Jajodia, Sushil<br/>Author Jajodia, Sushil, Millen, Jonathan<br/>Format: Books<br/>Call Number QA76.9.A25 J684 2010<br/>Publisher IOS Pr.,<br/>Publication Date 2010<br/>ISBN 9781607500889<br/>
The executive MBA in information security
ent://SD_ILS/0/SD_ILS:640346
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Trinckes, John J.<br/>Author Trinckes, John J.<br/>Format: Books<br/>Call Number HF5548.37 T75 2010<br/>Publisher CRC Press,<br/>Publication Date 2010<br/>ISBN 9781439810071<br/>
Mobile device security : a comprehensive guide to securing your information in a moving world
ent://SD_ILS/0/SD_ILS:640492
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Fried, Stephen, 1962-<br/>Author Fried, Stephen, 1962-<br/>Format: Books<br/>Call Number HF5548.37 F75 2010<br/>Publisher Auerbach Publications,<br/>Publication Date 2010<br/>ISBN 9781439820162<br/>
Management of information security
ent://SD_ILS/0/SD_ILS:813428
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Whitman, Michael E.<br/>Author Whitman, Michael E., Mattord, Herbert J.<br/>Format: Books<br/>Call Number T58.6 W45 2010<br/>Edition 3rd ed.<br/>Publisher Course Technology,<br/>Publication Date 2010<br/>ISBN 9780840031600<br/>
Seven deadliest social network attacks
ent://SD_ILS/0/SD_ILS:758898
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Timm, Carl<br/>Author Timm, Carl, Perez, Richard, 1969-, Ely, Adam<br/>Format: Books<br/>Call Number TK5105.88817 T56 2010<br/>Publisher Syngress/Elsevier,<br/>Publication Date 2010<br/>ISBN 9781597495455<br/>
Computer forensics jumpstart
ent://SD_ILS/0/SD_ILS:761026
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Solomon, Michael, (Michael G.), 1963-<br/>Author Solomon, Michael, (Michael G.), 1963-, Barrett, Diane, Broom, Nell<br/>Format: Books<br/>Call Number QA76.9.A25 S657 2010<br/>Publisher Wiley,<br/>Publication Date 2010<br/>ISBN 9780470936122<br/>
Cloud security : a comprehensive guide to secure cloud computing
ent://SD_ILS/0/SD_ILS:756726
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Krutz, Ronald L., 1938-<br/>Author Krutz, Ronald L., 1938-, Vines, Russell Dean, 1952-<br/>Format: Books<br/>Call Number TK5105.88813 K78 2010<br/>Edition 1st ed.<br/>Publisher Wiley Pub., Inc.,<br/>Publication Date 2010<br/>ISBN 9780470589878<br/>
Virtualization and forensics : a digital forensic investigator's guide to virtual environments
ent://SD_ILS/0/SD_ILS:756960
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Barrett, Diane<br/>Author Barrett, Diane, Kipper, Gregory<br/>Format: Books<br/>Call Number HV8079.C65 B37 2010<br/>Publisher Syngress/Elsevier,<br/>Publication Date 2010<br/>ISBN 9781597495578<br/>
Dear Hacker : letters to the editor of 2600
ent://SD_ILS/0/SD_ILS:758618
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Goldstein, Emmanuel, 1959-<br/>Author Goldstein, Emmanuel, 1959-<br/>Format: Books<br/>Call Number QA76.9.A25 G654 2010<br/>Edition 1st ed.<br/>Publisher Wiley Pub., Inc.,<br/>Publication Date 2010<br/>ISBN 9780470620069<br/>
Seven deadliest wireless technologies attacks
ent://SD_ILS/0/SD_ILS:758825
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Haines, Brad<br/>Author Haines, Brad, Kramer, Tim<br/>Format: Books<br/>Call Number TK5103.2 H325 2010<br/>Publisher Syngress/Elsevier,<br/>Publication Date 2010<br/>ISBN 9781597495417<br/>
Seven deadliest Microsoft attacks
ent://SD_ILS/0/SD_ILS:758901
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Kraus, Rob<br/>Author Kraus, Rob<br/>Format: Books<br/>Call Number QA76.76.C68 S48 2010<br/>Publisher Syngress/Elsevier,<br/>Publication Date 2010<br/>ISBN 9781597495516<br/>
IT audit, control, and security
ent://SD_ILS/0/SD_ILS:781527
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Moeller, Robert R.<br/>Author Moeller, Robert R.<br/>Format: Books<br/>Call Number T58.5 M644 2010<br/>Publisher Wiley,<br/>Publication Date 2010<br/>ISBN 9780471406761<br/>
24 deadly sins of software security : programming flaws and how to fix them
ent://SD_ILS/0/SD_ILS:387540
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Howard, Michael<br/>Author Howard, Michael, LeBlanc, David, 1960-, Viega, John<br/>Format: Books<br/>Call Number QA76.9.A25 H68 2010<br/>Publisher McGraw-Hill Osborne Media,<br/>Publication Date 2010<br/>ISBN 9780071626750<br/>
Hacking exposed computer forensics : secrets & solutions
ent://SD_ILS/0/SD_ILS:388051
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Philipp, Aaron<br/>Author Philipp, Aaron<br/>Format: Books<br/>Call Number HV8079.C65 P44 2010<br/>Edition 2nd ed.<br/>Publisher McGraw-Hill/Osborne,<br/>Publication Date 2010<br/>ISBN 9780071626774<br/>
Hacking exposed malware & rootkits : malware & rootkits security secrets & solutions
ent://SD_ILS/0/SD_ILS:388054
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Davis, Michael A.<br/>Author Davis, Michael A., Bodmer, Sean, LeMasters, Aaron<br/>Format: Books<br/>Call Number QA76.9.A25 D384 2010<br/>Publisher McGraw Hill,<br/>Publication Date 2010<br/>ISBN 9780071591188<br/>
Digital signatures
ent://SD_ILS/0/SD_ILS:401811
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Katz, Jonathan<br/>Author Katz, Jonathan<br/>Format: Books<br/>Call Number QA76.9.A25 K374 2010<br/>Publisher Springer,<br/>Publication Date 2010<br/>ISBN 9780387277110<br/>
Network intrusion detection and prevention : concepts and techniques
ent://SD_ILS/0/SD_ILS:334955
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Ali A. Ghorbani<br/>Author Ali A. Ghorbani, Lu, Wei, Tavallaee, Mahbod<br/>Format: Books<br/>Call Number TK5105.59 A43 2010<br/>Publisher Springer,<br/>Publication Date 2010<br/>ISBN 9780387887708<br/>
SQL injection attacks and defense
ent://SD_ILS/0/SD_ILS:640466
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Clarke, Justin<br/>Author Clarke, Justin<br/>Format: Books<br/>Call Number QA76.9.A25 S654 2009<br/>Publisher Syngress Pub.,<br/>Publication Date 2009<br/>ISBN 9781597494243<br/>
Cryptography research perspectives
ent://SD_ILS/0/SD_ILS:642541
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Chen, Roland E.<br/>Author Chen, Roland E.<br/>Format: Books<br/>Call Number QA76.9.A25 C833 2009<br/>Publisher Nova Science Publishers,<br/>Publication Date 2009<br/>ISBN 9781604564921<br/>
Data protection : governance, risk management, and compliance
ent://SD_ILS/0/SD_ILS:736397
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Hill, David G. (David Gary), 1943-<br/>Author Hill, David G. (David Gary), 1943-<br/>Format: Books<br/>Call Number QA76.9.A25 H52 2009<br/>Publisher Taylor & Francis,<br/>Publication Date 2009<br/>ISBN 9781439806920<br/>
CISSP guide to security essentials
ent://SD_ILS/0/SD_ILS:621991
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Gregory, Peter<br/>Author Gregory, Peter<br/>Format: Books<br/>Call Number QA76.9.A25 G74 2009<br/>Edition 1st Ed.<br/>Publisher Course Technology Cengage Learning,<br/>Publication Date 2009<br/>ISBN 9781435428195<br/>
Profiling hackers : the science of criminal profiling as applied to the world of hacking
ent://SD_ILS/0/SD_ILS:624979
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Chiesa, Raoul, 1973-<br/>Author Chiesa, Raoul, 1973-, Ducci, Stefania, Ciappi, Silvio, 1965-<br/>Format: Books<br/>Call Number HV6773 C477 2009<br/>Publisher Auerbach Publications,<br/>Publication Date 2009<br/>ISBN 9781420086935<br/>
Cyber fraud : tactics, techniques and procedures
ent://SD_ILS/0/SD_ILS:374716
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Graham, James<br/>Author Graham, James, Howard, Rick<br/>Format: Books<br/>Call Number HV6773 C92 2009<br/>Publisher Auerbach Publications,<br/>Publication Date 2009<br/>ISBN 9781420091274<br/>
Open source systems security certification
ent://SD_ILS/0/SD_ILS:394792
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Damiani, Ernesto, 1960-<br/>Author Damiani, Ernesto, 1960-, Ardagna, Claudio Agostino, Ioini, Nabil El<br/>Format: Books<br/>Call Number QA76.76.S46 D35 2009<br/>Publisher Springer,<br/>Publication Date 2009<br/>ISBN 9780387773230<br/>
Next generation SSH2 implementation : securing data in motion
ent://SD_ILS/0/SD_ILS:282024
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Liu, Dale<br/>Author Liu, Dale<br/>Format: Books<br/>Call Number QA76.9.A25 L58 2009<br/>Publisher Syngress,<br/>Publication Date 2009<br/>ISBN 9781597492836<br/>
The mac hacker's handbook
ent://SD_ILS/0/SD_ILS:282119
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Miller, Charlie, 1951-<br/>Author Miller, Charlie, 1951-, Dai Zovi, Dino A.<br/>Format: Books<br/>Call Number QA76.9.A25 M544 2009<br/>Publisher Wiley,<br/>Publication Date 2009<br/>ISBN 9780470395363<br/>
Distributed systems security : issues, processes and solutions
ent://SD_ILS/0/SD_ILS:282149
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Belapurkar, Abhijit<br/>Author Belapurkar, Abhijit<br/>Format: Books<br/>Call Number QA76.9.A25 D57 2009<br/>Publisher Wiley,<br/>Publication Date 2009<br/>ISBN 9780470519882<br/>
Hacking exposed 6 : network security secrets and solutions
ent://SD_ILS/0/SD_ILS:287480
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by McClure, Stuart<br/>Author McClure, Stuart, Scambray, Joel, Kurtz, George<br/>Format: Books<br/>Call Number QA76.9.A25 M325 2009<br/>Publisher McGraw-Hill,<br/>Publication Date 2009<br/>ISBN 9780071613743<br/>
Enterprise information security and privacy
ent://SD_ILS/0/SD_ILS:300373
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Axelrod, C. Warren<br/>Author Axelrod, C. Warren, Bayuk, Jennifer L., Schutzer, Daniel, 1940-<br/>Format: Books<br/>Call Number HF5548.37 E57 2009<br/>Publisher Artech House,<br/>Publication Date 2009<br/>ISBN 9781596931909<br/>
Social and human elements of information security : emerging trends and countermeasures
ent://SD_ILS/0/SD_ILS:301118
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Gupta, Manish<br/>Author Gupta, Manish, Sharman, Raj<br/>Format: Books<br/>Call Number HV6773 S63 2009<br/>Publisher Information Science Reference,<br/>Publication Date 2009<br/>ISBN 9781605660363<br/>
Mac OS X, iPod, and iPhone forensic analysis DVD toolkit
ent://SD_ILS/0/SD_ILS:281555
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Varsalone, Jesse<br/>Author Varsalone, Jesse, Morrissey, Sean<br/>Format: Books<br/>Call Number QA76.9.A25 V37 2009<br/>Publisher Syngress Publishing,<br/>Publication Date 2009<br/>ISBN 9781597492973<br/>
Information security management metrics : a definitive guide to effective security monitoring and measurement
ent://SD_ILS/0/SD_ILS:282895
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Brotby, W. Krag<br/>Author Brotby, W. Krag<br/>Format: Books<br/>Call Number HD30.2 B78 2009<br/>Publisher CRC Press,<br/>Publication Date 2009<br/>ISBN 9781420052855<br/>
Professional ASP.NET 3.5 security, membership, and role management with C# and VB
ent://SD_ILS/0/SD_ILS:284723
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Bilal Haidar<br/>Author Bilal Haidar, Schackow, Stefan, 1970-<br/>Format: Books<br/>Call Number QA76.9.A25 H34 2008<br/>Publisher Wiley Publishing,<br/>Publication Date 2009<br/>ISBN 9780470379301<br/>
Techniques and applications for advanced information privacy and security : emerging organizational, ethical, and human issues
ent://SD_ILS/0/SD_ILS:331443
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Nemati, Hamid R., 1958-<br/>Author Nemati, Hamid R., 1958-<br/>Format: Books<br/>Call Number HF5548.37 T43 2009<br/>Publisher Information Science Reference,<br/>Publication Date 2009<br/>ISBN 9781605662107<br/>
Primality testing and integer factorization in public-key cryptography
ent://SD_ILS/0/SD_ILS:344752
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Yan, Song Y.<br/>Author Yan, Song Y.<br/>Format: Books<br/>Call Number QA76.9.A25 Y364 2009<br/>Edition 2nd ed.<br/>Publisher Springer,<br/>Publication Date 2009<br/>ISBN 9780387772677<br/>
Guide to strategic infrastructure security : becoming a security network professional
ent://SD_ILS/0/SD_ILS:325499
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Weaver, Randy<br/>Author Weaver, Randy, Weaver, Dawn<br/>Format: Books<br/>Call Number TK5105.59 W47 2009<br/>Publisher Course Technology,<br/>Publication Date 2009<br/>ISBN 9781418836610<br/>
CISO soft skills : securing organizations impaired by employee politics, apathy, and intolerant perspectives
ent://SD_ILS/0/SD_ILS:328129
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Collette, Ronald D.<br/>Author Collette, Ronald D., Gentile, Michael, Gentile, Skye<br/>Format: Books<br/>Call Number HF5548.37 C64 2009<br/>Publisher CRC Press,<br/>Publication Date 2009<br/>ISBN 9781420089103<br/>
Computer forensics and cyber crime : an introduction
ent://SD_ILS/0/SD_ILS:328213
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Britz, Marjie T.<br/>Author Britz, Marjie T.<br/>Format: Books<br/>Call Number QA76.9.A25 B77 2009<br/>Edition 2nd ed.<br/>Publisher Prentice Hall,<br/>Publication Date 2009<br/>ISBN 9780132447492<br/>
Architecting secure software systems
ent://SD_ILS/0/SD_ILS:328716
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Talukder, Asoke K.<br/>Author Talukder, Asoke K., Chaitanya, Manish<br/>Format: Books<br/>Call Number QA76.9.A25 T33 2009<br/>Publisher Auerbach Publications,<br/>Publication Date 2009<br/>ISBN 9781420087840<br/>
Security software development : assessing and managing security risks
ent://SD_ILS/0/SD_ILS:319416
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Ashbaugh, Douglas A.<br/>Author Ashbaugh, Douglas A.<br/>Format: Books<br/>Call Number QA76.9.A25 A84 2009<br/>Publisher Auerbach Publications,<br/>Publication Date 2009<br/>ISBN 9781420063806<br/>
Security+ guide to network security fundamentals
ent://SD_ILS/0/SD_ILS:334739
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Ciampa, Mark<br/>Author Ciampa, Mark<br/>Format: Books<br/>Call Number QA76.9.A25 C524 2009<br/>Edition 3rd ed.<br/>Publisher Course Technology,<br/>Publication Date 2009<br/>ISBN 9781428340664<br/>
Understanding and applying cryptography and data security
ent://SD_ILS/0/SD_ILS:337579
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Elbirt, Adam J.<br/>Author Elbirt, Adam J.<br/>Format: Books<br/>Call Number QA76.9.A25 E43 2009<br/>Publisher Auerbach Publications,<br/>Publication Date 2009<br/>ISBN 9781420061604<br/>
Network security bible
ent://SD_ILS/0/SD_ILS:333037
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Cole, Eric<br/>Author Cole, Eric, Krutz, Ronald L., 1938-, Conley, James W.<br/>Format: Books<br/>Call Number QA76.9.A25 C645 2009<br/>Edition 2nd ed.<br/>Publisher Wiley Publishing,<br/>Publication Date 2009<br/>ISBN 9780470502495 9780764573972<br/>
Introduction to network security
ent://SD_ILS/0/SD_ILS:334687
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Jacobson, Douglas<br/>Author Jacobson, Douglas<br/>Format: Books<br/>Call Number TK5105.59 J32 2009<br/>Publisher Chapman & Hall/CRC,<br/>Publication Date 2009<br/>ISBN 9781584885436<br/>
Statistical techniques for network security : modern statistically-based intrusion detection and protection
ent://SD_ILS/0/SD_ILS:334973
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Wang, Yun<br/>Author Wang, Yun<br/>Format: Books<br/>Call Number TK5105.59 W364 2009<br/>Publisher IGI Global,<br/>Publication Date 2009<br/>ISBN 9781599047089<br/>
Principles of information security
ent://SD_ILS/0/SD_ILS:252460
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Whitman, Michael E.<br/>Author Whitman, Michael E., Mattord, Herbert J.<br/>Format: Books<br/>Call Number TK5105.59 W444 2009<br/>Edition 3rd ed.<br/>Publisher Thomson Course Technology,<br/>Publication Date 2009<br/>ISBN 9781423901778<br/>
Geekonomics : the real cost of insecure software
ent://SD_ILS/0/SD_ILS:197534
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Rice, David , 1971-<br/>Author Rice, David , 1971-<br/>Format: Books<br/>Call Number QA76.9.A25 R52 2008<br/>Publisher Pearson Education,<br/>Publication Date 2008<br/>ISBN 9780321477897<br/>
IPTV security : protecting high value digital contents
ent://SD_ILS/0/SD_ILS:232217
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Ramirez, David H.<br/>Author Ramirez, David H.<br/>Format: Books<br/>Call Number TK5105.887 R35 2008<br/>Publisher John Wiley,<br/>Publication Date 2008<br/>ISBN 9780470519240<br/>
Insider computer fraud : an in-depth framework for detecting and defending against insider IT attacks
ent://SD_ILS/0/SD_ILS:199523
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Brancik, Kenneth C.<br/>Author Brancik, Kenneth C.<br/>Format: Books<br/>Call Number QA76.9.A25 B72 2008<br/>Publisher Auerbach Publications,<br/>Publication Date 2008<br/>ISBN 9781420046595<br/>
Trust and security in collaborative computing
ent://SD_ILS/0/SD_ILS:232187
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Zou, Xukai, 1963-<br/>Author Zou, Xukai, 1963-, Dai, Yuan-Shun, Pan, Yi, 1960-<br/>Format: Books<br/>Call Number QA76.9.A25 Z68 2008<br/>Publisher World Scientific,<br/>Publication Date 2008<br/>ISBN 9789812703682<br/>
Web 2.0 security : defending AJAX, RIA and SOA
ent://SD_ILS/0/SD_ILS:249343
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Shah, Shreeraj<br/>Author Shah, Shreeraj<br/>Format: Books<br/>Call Number TK5105.59 S53 2008<br/>Publisher Charles River Media,<br/>Publication Date 2008<br/>ISBN 9781584505501<br/>
Computer forensics for dummies
ent://SD_ILS/0/SD_ILS:253312
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Volonino, Linda<br/>Author Volonino, Linda, Anzaldua, Reynaldo<br/>Format: Books<br/>Call Number QA76.9.A25 V65 2008<br/>Publisher Wiley Publishing Inc.,<br/>Publication Date 2008<br/>ISBN 9780470371916<br/>
Information security and ethics : concepts, methodologies, tools and applications
ent://SD_ILS/0/SD_ILS:623820
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Nemati, Hamid R., 1958-<br/>Author Nemati, Hamid R., 1958-<br/>Format: Books<br/>Call Number QA76.9.A25 I535 2008 v.1<br/>Publisher Information Science Reference,<br/>Publication Date 2008<br/>ISBN 9781599049373<br/>
"Notes.Com" berpandukan pengesahan mengunakan teknik fungsi cincangan dan pangkalan data teragih
ent://SD_ILS/0/SD_ILS:779094
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Mazura Mat Din<br/>Author Mazura Mat Din, Universiti Teknologi Malaysia. Fakulti Komputeran<br/>Format: Books<br/>Call Number QA76.9.A25 M393 2008 af<br/>Publisher Penerbit UTM,<br/>Publication Date 2008<br/>ISBN 9789673541027<br/>
Security engineering : a guide to building dependable distributed systems
ent://SD_ILS/0/SD_ILS:276957
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Anderson, Ross J.<br/>Author Anderson, Ross J.<br/>Format: Books<br/>Call Number QA76.9.A25 A56 2008<br/>Edition 2nd ed.<br/>Publisher John Wiley & Sons,<br/>Publication Date 2008<br/>ISBN 9780470068526<br/>
Information assurance architecture
ent://SD_ILS/0/SD_ILS:282892
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by WIllett, Keith D.<br/>Author WIllett, Keith D.<br/>Format: Books<br/>Call Number QA76.9.A25 W54 2008<br/>Publisher CRC Press,<br/>Publication Date 2008<br/>ISBN 9780849380679<br/>
Introduction to modern cryptography
ent://SD_ILS/0/SD_ILS:284442
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Katz, Jonathan, 1974-<br/>Author Katz, Jonathan, 1974-, Lindell, Yehuda<br/>Format: Books<br/>Call Number QA76.9.A25 K37 2008<br/>Publisher Chapman & Hall,<br/>Publication Date 2008<br/>ISBN 9781584885511<br/>
Mastering system center data protection manager 2007
ent://SD_ILS/0/SD_ILS:286619
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Ganger, Devin L.<br/>Author Ganger, Devin L., Femling, Ryan, 1975-<br/>Format: Books<br/>Call Number QA76.9.A25 G36 2008<br/>Publisher Wiley Publishing,<br/>Publication Date 2008<br/>ISBN 9780470181522<br/>
Gray hat hacking : the ethical hacker's handbook
ent://SD_ILS/0/SD_ILS:290406
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Harris, Shon<br/>Author Harris, Shon<br/>Format: Books<br/>Call Number QA76.9.A25 G724 2008<br/>Edition 2nd ed.<br/>Publisher McGraw-Hill,<br/>Publication Date 2008<br/>ISBN 9780071495684<br/>
Hacking exposed windows : windows security secrets and solutions
ent://SD_ILS/0/SD_ILS:290412
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Scambray, Joel<br/>Author Scambray, Joel, McClure, Stuart<br/>Format: Books<br/>Call Number QA76.9.A25 S325 2008<br/>Edition 3rd ed.<br/>Publisher McGraw-Hill,<br/>Publication Date 2008<br/>ISBN 9780071494267<br/>
Privacy-preserving data mining : models and algorithms
ent://SD_ILS/0/SD_ILS:292409
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Aggarwal, Charu C.<br/>Author Aggarwal, Charu C., Yu, Philip S.<br/>Format: Books<br/>Call Number QA76.9.D343 P74 2008<br/>Publisher Springer,<br/>Publication Date 2008<br/>ISBN 9780387709918<br/>
Security and software for cybercafes
ent://SD_ILS/0/SD_ILS:302415
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Adomi, Esharenana E.<br/>Author Adomi, Esharenana E.<br/>Format: Books<br/>Call Number HE7581.5 S42 2008<br/>Publisher Information Science Reference,<br/>Publication Date 2008<br/>ISBN 9781599049038<br/>
Information security : a practical approach
ent://SD_ILS/0/SD_ILS:349781
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Bhaskar, S. M.<br/>Author Bhaskar, S. M., Ahson, S. I.<br/>Format: Books<br/>Call Number QA76.6.A25 B52 2008<br/>Publisher Alpha Science Intl Ltd,<br/>Publication Date 2008<br/>ISBN 9781842654583<br/>
Digital privacy : theory, technologies and practices
ent://SD_ILS/0/SD_ILS:248071
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Acquisti, Alessandro<br/>Author Acquisti, Alessandro<br/>Format: Books<br/>Call Number QA76.9.A25 D58 2008<br/>Publisher Auerbach Publications,<br/>Publication Date 2008 2007<br/>ISBN 9781420052176<br/>
Information assurance : dependability and security in networked systems
ent://SD_ILS/0/SD_ILS:248086
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Qian, Yi, 1962-<br/>Author Qian, Yi, 1962-<br/>Format: Books<br/>Call Number TK5105.59 I58 2008<br/>Publisher Elsevier/Morgan Kaufmann,<br/>Publication Date 2008<br/>ISBN 9780123735669<br/>
Software security engineering : a guide for project managers
ent://SD_ILS/0/SD_ILS:262077
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Allen, Julia H.<br/>Author Allen, Julia H.<br/>Format: Books<br/>Call Number QA76.9.A25 S535 2008<br/>Publisher Addison-Wesley,<br/>Publication Date 2008<br/>ISBN 9780321509178<br/>
Virtual honeypots : from botnet tracking to intrusion detection
ent://SD_ILS/0/SD_ILS:272218
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Provos, Niels<br/>Author Provos, Niels, Holz, Thorsten<br/>Format: Books<br/>Call Number QA76.9.A25 P78 2007<br/>Publisher Addison Wesley,<br/>Publication Date 2008<br/>ISBN 9780321336323<br/>
The craft of system security
ent://SD_ILS/0/SD_ILS:272348
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Smith, Sean<br/>Author Smith, Sean, Marchesini, John<br/>Format: Books<br/>Call Number QA76.9.A25 S65 2008<br/>Publisher Addison Wesley,<br/>Publication Date 2008<br/>ISBN 9780321434838<br/>
OSSEC host-based intrusion detection guide
ent://SD_ILS/0/SD_ILS:281392
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Hay, Andrew<br/>Author Hay, Andrew, Cid, Daniel, Bray, Rory<br/>Format: Books<br/>Call Number QA76.9.A25 H39 2008<br/>Publisher Syngress Publishing Inc.,<br/>Publication Date 2008<br/>ISBN 9781597492409<br/>
Creating the secure managed desktop : using group policy, softGrid, microsoft deployment toolkit, and other management tools
ent://SD_ILS/0/SD_ILS:284610
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Moskowitz, Jeremy<br/>Author Moskowitz, Jeremy<br/>Format: Books<br/>Call Number QA76.76.W56 M67 2008<br/>Publisher Sybex,<br/>Publication Date 2008<br/>ISBN 9780470277645<br/>
Secure computer and network systems : modeling, analysis and design
ent://SD_ILS/0/SD_ILS:286763
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Ye, Nong<br/>Author Ye, Nong<br/>Format: Books<br/>Call Number TK5105.59 Y464 2008<br/>Publisher Hoboken, NJ : J. Wiley & Sons,<br/>Publication Date 2008<br/>ISBN 9780470023242<br/>
The web application hacker's handbook : discovering and exploiting security flaws
ent://SD_ILS/0/SD_ILS:286727
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Stuttard, Dafydd<br/>Author Stuttard, Dafydd, Pinto, Marcus, 1978-<br/>Format: Books<br/>Call Number TK5105.875.I57 S78 2008<br/>Publisher Wiley Publishing,<br/>Publication Date 2008<br/>ISBN 9780470170779<br/>
Implementing email and security tokens : current standards, tools, and practices
ent://SD_ILS/0/SD_ILS:286730
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Turner, Sean<br/>Author Turner, Sean, Housely, Russ<br/>Format: Books<br/>Call Number TK5102.85 T87 2008<br/>Publisher Wiley Publishing,<br/>Publication Date 2008<br/>ISBN 9780470254639<br/>
Group policy : fundamentals, security, and troubleshooting
ent://SD_ILS/0/SD_ILS:262991
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Moskowitz, Jeremy<br/>Author Moskowitz, Jeremy<br/>Format: Books<br/>Call Number QA76.76.O63 M69 2008<br/>Publisher Wiley Publishing,<br/>Publication Date 2008<br/>ISBN 9780470275894<br/>
SUSE linux enterprise server security
ent://SD_ILS/0/SD_ILS:269067
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Eckert, Jason W.<br/>Author Eckert, Jason W., Novell, Inc.<br/>Format: Books<br/>Call Number QA76.9.A25 E24 2008<br/>Publisher Thomson Course Technology,<br/>Publication Date 2008<br/>ISBN 9781428322233<br/>
Smart cards, tokens, security and applications
ent://SD_ILS/0/SD_ILS:271615
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Mayes, Keith E.<br/>Author Mayes, Keith E., Markantonakis, Konstantinos<br/>Format: Books<br/>Call Number TK7895.S62 S62 2008<br/>Publisher Springer-Verlag,<br/>Publication Date 2008<br/>ISBN 9780387721972<br/>
Modern cryptanalysis : techniques for advanced code breaking
ent://SD_ILS/0/SD_ILS:287325
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Swenson, Christopher<br/>Author Swenson, Christopher<br/>Format: Books<br/>Call Number QA76.9.A25 S932 2008<br/>Publisher Wiley Publishing,<br/>Publication Date 2008<br/>ISBN 9780470135938<br/>
Advanced computer network and security
ent://SD_ILS/0/SD_ILS:342700
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Mohd. Aizaini Maarof<br/>Author Mohd. Aizaini Maarof, Muhammad Shafie Abd. Latiff, Subariah Ibrahim, Shukor Abd. Razak, Ali Selamat<br/>Format: Books<br/>Call Number TK5105.5 A39 2008 a<br/>Publisher Penerbit Universiti Teknologi Malaysia,<br/>Publication Date 2008<br/>ISBN 9789835206139<br/>
Hacking exposed Linux : Linux security secrets and solutions
ent://SD_ILS/0/SD_ILS:319819
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by ISECOM (Organization)<br/>Author ISECOM (Organization)<br/>Format: Books<br/>Call Number QA76.76.O63 H324 2008<br/>Edition 3rd ed.<br/>Publisher Mcgraw-Hill,<br/>Publication Date 2008<br/>ISBN 9780072262575<br/>
Crimeware : understanding new attacks and defenses
ent://SD_ILS/0/SD_ILS:319886
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Jakobsson, Markus<br/>Author Jakobsson, Markus, Ramzan, Zulfikar<br/>Format: Books<br/>Call Number QA76.9.A25 J344 2008<br/>Publisher Addison-Wesley,<br/>Publication Date 2008<br/>ISBN 9780321501950<br/>
Guide to computer forensics and investigations
ent://SD_ILS/0/SD_ILS:325496
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Nelson, Bill<br/>Author Nelson, Bill<br/>Format: Books<br/>Call Number QA76.9.A25 G84 2008<br/>Edition 3rd ed.<br/>Publisher Course Technology,<br/>Publication Date 2008<br/>ISBN 9781418067335<br/>
Biometrics for dummies
ent://SD_ILS/0/SD_ILS:327058
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Gregory, Peter H.<br/>Author Gregory, Peter H., Simon, Michael A.<br/>Format: Books<br/>Call Number TK7882.B56 G73 2008<br/>Publisher Wiley Publishing,<br/>Publication Date 2008<br/>ISBN 9780470292884<br/>
Scene of the cybercrime
ent://SD_ILS/0/SD_ILS:335048
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Cross, Michael<br/>Author Cross, Michael<br/>Format: Books<br/>Call Number QA76.9.A25 C765 2008<br/>Edition 2nd ed.<br/>Publisher Syngress,<br/>Publication Date 2008<br/>ISBN 9781597492768<br/>
Malware forensics : investigating and analyzing malicious code
ent://SD_ILS/0/SD_ILS:335050
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Aquilina, James M.<br/>Author Aquilina, James M., Casey, Eoghan, Malin, Cameron H.<br/>Format: Books<br/>Call Number QA76.76.C68 A68 2008<br/>Publisher Syngress,<br/>Publication Date 2008<br/>ISBN 9781597492683<br/>
Software deployment, updating, and patching
ent://SD_ILS/0/SD_ILS:337593
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Stackpole, Bill<br/>Author Stackpole, Bill, Hanrion, Patrick<br/>Format: Books<br/>Call Number QA76.76.C69 S74 2008<br/>Publisher CRC,<br/>Publication Date 2008<br/>ISBN 9780849358005<br/>
Building an effective information security policy architecture
ent://SD_ILS/0/SD_ILS:337596
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Bacik, Sandy<br/>Author Bacik, Sandy<br/>Format: Books<br/>Call Number QA76.9.A25 B36 2008<br/>Publisher CRC Press,<br/>Publication Date 2008<br/>ISBN 9781420059052<br/>
Network security : private communications in a public world
ent://SD_ILS/0/SD_ILS:328860
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Kaufman, Charlie<br/>Author Kaufman, Charlie, Perlman, Radia, Speciner, Michael<br/>Format: Books<br/>Call Number QA76.9.A25 K34 2008<br/>Edition 2nd ed.<br/>Publisher Prentice Hall of India,<br/>Publication Date 2008<br/>ISBN 9788120322134<br/>
Building an effective information security policy architecture
ent://SD_ILS/0/SD_ILS:334683
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Bacik, Sandy<br/>Author Bacik, Sandy<br/>Format: Books<br/>Call Number QA76.9.A25 B32 2008<br/>Publisher CRC,<br/>Publication Date 2008<br/>ISBN 9781420059052<br/>
Secure software development : a security programmer's guide
ent://SD_ILS/0/SD_ILS:334737
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Grembi, Jason<br/>Author Grembi, Jason<br/>Format: Books<br/>Call Number QA76.76.D47 G73 2008<br/>Publisher Delmar Cengage Learning,<br/>Publication Date 2008<br/>ISBN 9781418065478<br/>
Oracle identity management : governance, risk, and compliance architecture
ent://SD_ILS/0/SD_ILS:334767
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Pohlman, Marlin B.<br/>Author Pohlman, Marlin B.<br/>Format: Books<br/>Call Number QA76.9.A25 P63 2008<br/>Publisher Auerbach Publications,<br/>Publication Date 2008<br/>ISBN 9781420072471<br/>
Securing information and communications systems : principles, technologies, and applications
ent://SD_ILS/0/SD_ILS:263795
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Furnell, Steven M.<br/>Author Furnell, Steven M.<br/>Format: Books<br/>Call Number QA76.9.A25 S4244 2008<br/>Publisher Artech House Publishers,<br/>Publication Date 2008<br/>ISBN 9781596932289<br/>
Fuzzing for software security testing and quality assurance
ent://SD_ILS/0/SD_ILS:263804
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Takanen, Ari<br/>Author Takanen, Ari, Demott, Jared D., Miller, Charles, 1951-<br/>Format: Books<br/>Call Number QA76.9.A25 T344 2008<br/>Publisher Artech House Publishers,<br/>Publication Date 2008<br/>ISBN 9781596932142<br/>
MANAGEMENT OF INFORMATION SECURITY
ent://SD_ILS/0/SD_ILS:885900
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Whitman, Michael E., Dr., 1964-, author<br/>Author Whitman, Michael E., Dr., 1964-, author, Mattord, Herbert J., author<br/>Format: Books<br/>Call Number T58.6 W45 2008<br/>Edition Second edition<br/>Publication Date 2008<br/>ISBN 9781423901303<br/>
Computational intelligence in information assurance and security
ent://SD_ILS/0/SD_ILS:196712
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Nedjah, Nadia<br/>Author Nedjah, Nadia, Abraham, Ajith, 1968-, Mourelle, Luiza de Macedo<br/>Format: Books<br/>Call Number Q342 C657 2007<br/>Publisher Springer,<br/>Publication Date 2007<br/>ISBN 9783540710776<br/><a href="http://dx.doi.org/10.1007/978-3-540-71078-3">Full Text</a><br/>
Secure programming with static analysis
ent://SD_ILS/0/SD_ILS:203553
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Chess, Brian<br/>Author Chess, Brian, West, Jacob<br/>Format: Books<br/>Call Number QA76.9.A25 C43 2007<br/>Publisher Addison Wesley,<br/>Publication Date 2007<br/>ISBN 9780321424778<br/>
Malware detection
ent://SD_ILS/0/SD_ILS:212138
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Christodorescu, Mihai<br/>Author Christodorescu, Mihai<br/>Format: Books<br/>Call Number QA76.9.A25 M344 2006<br/>Publisher Springer,<br/>Publication Date 2007 2006<br/>ISBN 9780387327204<br/><a href="http://dx.doi.org/10.1007/978-0-387-44599-1">FullText</a><br/>
Network security essentials : applications and standards
ent://SD_ILS/0/SD_ILS:225112
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Stallings, William<br/>Author Stallings, William<br/>Format: Books<br/>Call Number TK5105.59 S72 2007<br/>Edition 3rd ed.<br/>Publisher Pearson Education,<br/>Publication Date 2007<br/>ISBN 9780132380331<br/>
Simple computer security : disinfect your PC
ent://SD_ILS/0/SD_ILS:170952
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Geier, Eric, 1984-<br/>Author Geier, Eric, 1984-, Geier, James T.<br/>Format: Books<br/>Call Number QA76.9.A25 G44 2007<br/>Publisher Wiley Publishing,<br/>Publication Date 2007<br/>ISBN 9780470068540<br/>
Cryptography for developers
ent://SD_ILS/0/SD_ILS:170967
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by St. Denis, Tom<br/>Author St. Denis, Tom, Johnson, Simon<br/>Format: Books<br/>Call Number QA76.9.A25 S725 2007<br/>Publisher Syngrees Publishing,<br/>Publication Date 2007<br/>ISBN 9781597491044<br/>
Computer security and cryptography
ent://SD_ILS/0/SD_ILS:195334
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Konheim, Alan G., 1934-<br/>Author Konheim, Alan G., 1934-<br/>Format: Books<br/>Call Number QA76.9.A25 K664 2007<br/>Publisher Wiley-Interscience,<br/>Publication Date 2007<br/>ISBN 9780471947837<br/>
Intelligent multimedia data hiding : new directions
ent://SD_ILS/0/SD_ILS:196806
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Pan, Jeng-Shyang<br/>Author Pan, Jeng-Shyang<br/>Format: Books<br/>Call Number QA76.9.A25 I578 2007<br/>Publisher Springer,<br/>Publication Date 2007<br/>ISBN 9783540711681<br/><a href="http://dx.doi.org/10.1007/978-3-540-71169-8">Fulltext</a><br/>
Information assurance for the enterprise : a roadmap to information security
ent://SD_ILS/0/SD_ILS:103417
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Schou, Corey<br/>Author Schou, Corey, Shoemaker, Dan<br/>Format: Books<br/>Call Number QA76.9.A25 S365 2007<br/>Publisher McGraw-Hill/Irwin,<br/>Publication Date 2007<br/>ISBN 9780072255249<br/>
Preserving privacy for on-line analytical processing
ent://SD_ILS/0/SD_ILS:225793
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Wang, Lingyu<br/>Author Wang, Lingyu, Jajodia, Sushil, Wijesekera, Duminda<br/>Format: Books<br/>Call Number QA76.9.D343 W364 2007<br/>Publisher Springer-Verlag,<br/>Publication Date 2007<br/>ISBN 9780387462738<br/><a href="http://dx.doi.org/10.1007/978-0-387-46274-5">FullText</a><br/>
Journal of computer security
ent://SD_ILS/0/SD_ILS:155568
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
Format: Books<br/>Call Number QA76.9.A25 J68 2007<br/>Publisher IOS Press,<br/>Publication Date 2007<br/>ISSN 0926227X<br/><a href="http://search.ebscohost.com/login.aspx?direct=true&db=a3h&jid=LCY&site=ehost-live">Online via EBSCOhost</a><br/>Accessible within UTM campus<br/>
Botnets : the killer web app
ent://SD_ILS/0/SD_ILS:155922
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Schiller, Craig A.<br/>Author Schiller, Craig A.<br/>Format: Books<br/>Call Number TK 5105.59 B67 2007<br/>Publisher Syngress Publishing,<br/>Publication Date 2007<br/>ISBN 9781597491358<br/>
Security in distributed, grid, mobile and pervasive computing
ent://SD_ILS/0/SD_ILS:156667
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Xiao, Yang<br/>Author Xiao, Yang<br/>Format: Books<br/>Call Number QA76.9.A25 X52 2007<br/>Publisher Auerbach Publications,<br/>Publication Date 2007<br/>ISBN 9780849379215<br/>
Risks, controls, and security : concepts and applications
ent://SD_ILS/0/SD_ILS:163959
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Raval, Vasant H. (Vasant Harishanker), 1940-<br/>Author Raval, Vasant H. (Vasant Harishanker), 1940-, Fichadia, Ashok<br/>Format: Books<br/>Call Number QA76.9.A25 R38 2007<br/>Publisher John Wiley & Sons,<br/>Publication Date 2007<br/>ISBN 9780471485797<br/>
Testing code security
ent://SD_ILS/0/SD_ILS:167923
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by van der Linden, Maura A.<br/>Author van der Linden, Maura A.<br/>Format: Books<br/>Call Number QA76.9.A25 V364 2007<br/>Publisher Auerbach Publication,<br/>Publication Date 2007<br/>ISBN 9780849392511<br/>
Applied cryptanalysis : breaking ciphers in the real world
ent://SD_ILS/0/SD_ILS:155893
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Stamp, Mark<br/>Author Stamp, Mark, Low, Richard M., 1967-<br/>Format: Books<br/>Call Number QA76.9.A25 S68 2007<br/>Publisher Wiley-IEEE Press,<br/>Publication Date 2007<br/>ISBN 9780470114865<br/>
Stealing the network : how to own a shadow
ent://SD_ILS/0/SD_ILS:155915
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Long, Johnny<br/>Author Long, Johnny, Russell, Ryan, Mullen, Timothy<br/>Format: Books<br/>Call Number QA76.9.A25 L67 2007<br/>Publisher Syngress,<br/>Publication Date 2007<br/>ISBN 9781597490818<br/>
Decrypted secrets : methods and maxims of cryptology
ent://SD_ILS/0/SD_ILS:158035
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Bauer, Friedrich Ludwig, 1924-<br/>Author Bauer, Friedrich Ludwig, 1924-<br/>Format: Books<br/>Call Number QA76.9.A25 B38 2007<br/>Edition 4th, rev. and extended ed.<br/>Publisher Springer,<br/>Publication Date 2007<br/>ISBN 9783540245025<br/><a href="http://dx.doi.org/10.1007/978-3-540-48121-8">FullText</a><br/>
Secure data management in decentralized systems
ent://SD_ILS/0/SD_ILS:158052
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Yu, Ting<br/>Author Yu, Ting, Jajodia, Sushil<br/>Format: Books<br/>Call Number TK5105.59 S424 2007<br/>Publisher Springer,<br/>Publication Date 2007<br/>ISBN 9780387276946<br/><a href="http://dx.doi.org/10.1007/978-0-387-27696-0">Fulltext</a><br/>
Network security policies and procedures
ent://SD_ILS/0/SD_ILS:158167
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Frye, Douglas W.<br/>Author Frye, Douglas W.<br/>Format: Books<br/>Call Number HF5548.37 F79 2007<br/>Publisher Springer-Verlag,<br/>Publication Date 2007<br/>ISBN 9780387309378<br/><a href="http://dx.doi.org/10.1007/978-0-387-47955-2">FullText</a><br/>
Microsoft windows security fundamentals
ent://SD_ILS/0/SD_ILS:160897
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Clercq, Jan de, 1968-<br/>Author Clercq, Jan de, 1968-, Grillenmeier, Guido<br/>Format: Books<br/>Call Number QA76.9.A25 C53 2007<br/>Publisher Elsevier Digital Press,<br/>Publication Date 2007<br/>ISBN 9781555583408<br/>
WarDriving and wireless penetration testing
ent://SD_ILS/0/SD_ILS:160952
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Hurley, Chris<br/>Author Hurley, Chris<br/>Format: Books<br/>Call Number TK5103.2 W38 2007<br/>Publisher Syngress Publishing,<br/>Publication Date 2007<br/>ISBN 9781597491112<br/>
Data warehousing and data mining techniques for cyber security
ent://SD_ILS/0/SD_ILS:164067
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Singhal, Anoop, 1958-<br/>Author Singhal, Anoop, 1958-<br/>Format: Books<br/>Call Number QA76.9.A25 S56 2007<br/>Publisher Springer,<br/>Publication Date 2007<br/>ISBN 9780387264097<br/><a href="http://dx.doi.org/10.1007/978-0-387-47653-7">Full Text</a><br/>
Introduction to cryptography : principles and applications
ent://SD_ILS/0/SD_ILS:164219
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Delfs, Hans<br/>Author Delfs, Hans, Knebl, Helmut<br/>Format: Books<br/>Call Number QA76.9.A25 D44 2007<br/>Edition 2nd ed.<br/>Publisher Springer,<br/>Publication Date 2007<br/>ISBN 9783540492436<br/><a href="http://dx.doi.org/10.1007/3-540-49244-5">Fulltext</a><br/>
Electronic postage systems : technology, security, economics
ent://SD_ILS/0/SD_ILS:187565
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Bleumer, Gerrit<br/>Author Bleumer, Gerrit<br/>Format: Books<br/>Call Number HE6125 B53 2007<br/>Publisher Springer,<br/>Publication Date 2007<br/>ISBN 9780387293134<br/><a href="http://dx.doi.org/10.1007/978-0-387-44606-6">Full Text</a><br/>Accessible within UTM campus<br/>
Hacking for dummies
ent://SD_ILS/0/SD_ILS:132699
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Beaver, Kevin<br/>Author Beaver, Kevin, McClure, Stuart<br/>Format: Books<br/>Call Number QA76.9.A25 B42 2007<br/>Edition 2nd ed.<br/>Publisher Wiley,<br/>Publication Date 2007<br/>ISBN 9780470052358<br/>
Phishing and countermeasures : understanding the increasing problem of electronic identity theft
ent://SD_ILS/0/SD_ILS:137859
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Jakobsson, Markus<br/>Author Jakobsson, Markus, Myers, Steven, 1975-<br/>Format: Books<br/>Call Number HV6773 J34 2007<br/>Publisher John Wiley & Sons,<br/>Publication Date 2007<br/>ISBN 9780471782452 978047178245<br/>
Administering Windows Vista security : the big surprises
ent://SD_ILS/0/SD_ILS:137899
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Minasi, Mark<br/>Author Minasi, Mark<br/>Format: Books<br/>Call Number QA76.9.A25 M566 2007<br/>Publisher Wiley Pub.,<br/>Publication Date 2007<br/>ISBN 9780470108321<br/>
Computer forensics : principles and practices
ent://SD_ILS/0/SD_ILS:138496
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Volonino, Linda<br/>Author Volonino, Linda, Anzaldua, Reynaldo, Godwin, Jana<br/>Format: Books<br/>Call Number QA76.9.A25 V64 2007<br/>Publisher Pearson/Prentice Hall,<br/>Publication Date 2007<br/>ISBN 9780131547278<br/>
IT security interviews exposed : secrets to landing your next information security job
ent://SD_ILS/0/SD_ILS:245311
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Butler, Christopher<br/>Author Butler, Christopher, Rogers, Russ, Ferratt, Mason, Miles, Greg, Hurley, Chris<br/>Format: Books<br/>Call Number T58.5 I84 2007<br/>Publisher Wiley,<br/>Publication Date 2007<br/>ISBN 9780471779872<br/>
Endpoint security
ent://SD_ILS/0/SD_ILS:248041
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Kadrich, Mark<br/>Author Kadrich, Mark<br/>Format: Books<br/>Call Number QA76.9.A25 K325 2007<br/>Publisher Addison-Wesley Professional,<br/>Publication Date 2007<br/>ISBN 9780321436955<br/>
Security layer on top of the node operating system to secure active network
ent://SD_ILS/0/SD_ILS:771077
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Satria Mandala<br/>Author Satria Mandala, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number QA76.9.A25 S28 2007 af<br/>Publisher Penerbit Universiti Teknologi Malaysia,<br/>Publication Date 2007<br/>ISBN 9789673536887<br/>
Evaluation of system requirements specification compliance to corporate information security policy : case study of risk and incident reporting system
ent://SD_ILS/0/SD_ILS:771290
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Zailani Mohamed Sidek, Assoc.Prof.Dr.<br/>Author Zailani Mohamed Sidek, Assoc.Prof.Dr., Universiti Teknologi Malaysia. Fakulti Komputeran<br/>Format: Books<br/>Call Number QA76.9.A25 Z353 2007 af<br/>Publisher Penerbit UTM,<br/>Publication Date 2007<br/>ISBN 9789673536993<br/>
Trustworthy computing : analytical and quantitative engineering evaluation
ent://SD_ILS/0/SD_ILS:286724
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Sahinoglu, M.<br/>Author Sahinoglu, M.<br/>Format: Books<br/>Call Number QA76.9.A25 S49 2007<br/>Publisher John Wiley & Sons,<br/>Publication Date 2007<br/>ISBN 9780470085127<br/>
Mechanics of user identification and authentication : fundamentals of identity management
ent://SD_ILS/0/SD_ILS:248074
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Todorov, Dobromir<br/>Author Todorov, Dobromir<br/>Format: Books<br/>Call Number TK5105.59 T62 2007<br/>Publisher Auerbach Publications,<br/>Publication Date 2007<br/>ISBN 9781420052190<br/>
Integrating security and software engineering : advances and future vision
ent://SD_ILS/0/SD_ILS:284669
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Mouratidis, Haralambos<br/>Author Mouratidis, Haralambos, Giorgini, Paolo<br/>Format: Books<br/>Call Number QA76.9.A25 I55 2007<br/>Publisher IGI Global,<br/>Publication Date 2007<br/>ISBN 9781599041476<br/>
Fuzzing : brute force vulnerability discovery
ent://SD_ILS/0/SD_ILS:272289
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Sutton, Michael<br/>Author Sutton, Michael, Greene, Adam, Amini, Pedram<br/>Format: Books<br/>Call Number QA76.9.A25 S89 2007<br/>Edition 1st ed.<br/>Publisher Addison Wesley,<br/>Publication Date 2007<br/>ISBN 9780321446114<br/>
Professional rootkits
ent://SD_ILS/0/SD_ILS:272327
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Vieler, Ric<br/>Author Vieler, Ric<br/>Format: Books<br/>Call Number QA76.9.A25 V56 2007<br/>Publisher Wiley Publishing,<br/>Publication Date 2007 2004<br/>ISBN 9780470101544<br/>
Advances in enterprise information technology security
ent://SD_ILS/0/SD_ILS:301112
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Khadraoui, Djamel<br/>Author Khadraoui, Djamel, Herrmann, Francine<br/>Format: Books<br/>Call Number HF5548.37 A38 2007<br/>Publisher IGI Global,<br/>Publication Date 2007<br/>ISBN 9781599040905<br/>
Digital watermarking and steganography : fundamentals and techniques
ent://SD_ILS/0/SD_ILS:337558
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Shih, Frank Y.<br/>Author Shih, Frank Y.<br/>Format: Books<br/>Call Number QA76.9.A25 S447 2008<br/>Publisher CRC Press,<br/>Publication Date 2007<br/>ISBN 9781420047578<br/>
Critical information infrastructures : resilience and protection
ent://SD_ILS/0/SD_ILS:254481
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Hyslop, Maitland<br/>Author Hyslop, Maitland<br/>Format: Books<br/>Call Number QA76.9.A25 H97 2007<br/>Publisher Springer,<br/>Publication Date 2007<br/>ISBN 9780387718613<br/><a href="http://dx.doi.org/10.1007/978-0-387-71862-0">Fulltext</a><br/>Remote access restricted to users with a valid UTM ID via VPN<br/>
Trust, complexity and control : confidence in a convergent world
ent://SD_ILS/0/SD_ILS:270494
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Cofta, Piotr<br/>Author Cofta, Piotr<br/>Format: Books<br/>Call Number QA76.9.A25 C59 2007<br/>Publisher John Wiley & Sons,<br/>Publication Date 2007<br/>ISBN 9780470061305<br/>
Privacy-respecting intrusion detection
ent://SD_ILS/0/SD_ILS:271638
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Flegel, Ulrich<br/>Author Flegel, Ulrich<br/>Format: Books<br/>Call Number QA76.9.A25 F53 2007<br/>Publisher Springer-Verlag,<br/>Publication Date 2007<br/>ISBN 9780387343464<br/>
Guide to network defense and countermeasures
ent://SD_ILS/0/SD_ILS:115036
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Weaver, Randy<br/>Author Weaver, Randy<br/>Format: Books<br/>Call Number TK5105.59 W424 2007<br/>Edition 2nd ed.<br/>Publisher Thomson/Course Technology,<br/>Publication Date 2007 2006<br/>ISBN 9781418836795<br/>
Grid computing security
ent://SD_ILS/0/SD_ILS:142211
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Chakrabarti, Anirban<br/>Author Chakrabarti, Anirban<br/>Format: Books<br/>Call Number QA76.9.C58 C42 2007<br/>Publisher Springer,<br/>Publication Date 2007<br/>ISBN 9783540444923<br/><a href="http://dx.doi.org/10.1007/978-3-540-44493-0">Fulltext</a><br/>
Information security : design, implementation, measurement and compliance
ent://SD_ILS/0/SD_ILS:102187
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Layton, Timothy P.<br/>Author Layton, Timothy P.<br/>Format: Books<br/>Call Number HF5548.37 L39 2007<br/>Publisher Auerbach Pub.,<br/>Publication Date 2007<br/>ISBN 9780849370878<br/>
Principles of information systems security : text and cases
ent://SD_ILS/0/SD_ILS:108025
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Dhillon, Gurpreet, 1963-<br/>Author Dhillon, Gurpreet, 1963-<br/>Format: Books<br/>Call Number QA76.9.A25 D54 2007<br/>Publisher John Wiley & Sons,<br/>Publication Date 2007<br/>ISBN 9780471450566<br/>
Cybersecurity for SCADA systems
ent://SD_ILS/0/SD_ILS:195026
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Shaw, William T.<br/>Author Shaw, William T.<br/>Format: Books<br/>Call Number TJ222 S52 2006<br/>Publisher PennWell Corporation,<br/>Publication Date 2006<br/>ISBN 9781593700683<br/>
Biometrics, computer security systems and artificial intelligence applications
ent://SD_ILS/0/SD_ILS:191280
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Saeed, Khalid<br/>Author Saeed, Khalid, Pejas, Jerzy, 1954-, Mosdorf, Romuald<br/>Format: Books<br/>Call Number QA76.9.A25 B56 2006<br/>Publisher Springer,<br/>Publication Date 2006<br/>ISBN 9780387362328<br/>
Protecting information : from classical error correction to quantum cryptography
ent://SD_ILS/0/SD_ILS:195047
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Loepp, Susan<br/>Author Loepp, Susan, Wootters, William Kent<br/>Format: Books<br/>Call Number QA76.889 L63 2006<br/>Publisher Cambridge University Press,<br/>Publication Date 2006<br/>ISBN 9780521534765 9780521827409<br/>
How personal and internet security works
ent://SD_ILS/0/SD_ILS:101895
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Gralla, Preston<br/>Author Gralla, Preston<br/>Format: Books<br/>Call Number HV6773 G72 2006<br/>Publisher Que Publishing,<br/>Publication Date 2006<br/>ISBN 9780789735539<br/>
Enterprise information systems assurance and system security : managerial and technical issues
ent://SD_ILS/0/SD_ILS:104558
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Warkentin, Merrill<br/>Author Warkentin, Merrill, Vaughn, Rayford, 1947-<br/>Format: Books<br/>Call Number QA76.9.A25 E574 2006<br/>Publisher Idea Group Publishing,<br/>Publication Date 2006<br/>ISBN 9781591409113<br/>
Privacy protection for e-services
ent://SD_ILS/0/SD_ILS:107901
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Yee, George<br/>Author Yee, George<br/>Format: Books<br/>Call Number HF5548.37 P74 2006<br/>Publisher Idea Group Publishing,<br/>Publication Date 2006<br/>ISBN 9781591409144<br/>
Cryptography and network security : principles and practices
ent://SD_ILS/0/SD_ILS:109602
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Stallings, William<br/>Author Stallings, William<br/>Format: Books<br/>Call Number TK5105.59 S713 2006<br/>Edition 4th. ed.<br/>Publisher Pearson,<br/>Publication Date 2006<br/>ISBN 9780131873162<br/>
Digital watermarking, challenges and applications
ent://SD_ILS/0/SD_ILS:159903
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Akram Mohd. Zeki<br/>Author Akram Mohd. Zeki, Azizah Abdul Manaf, Regional Postgraduate Conference on Engineering and Science (1st : 2006 : Johor Bahru)<br/>Format: Books<br/>Call Number QA76.9.A25 A37 2006<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2006<br/>
Securing HP NonStop servers in an open systems world : TCP/IP, OSS & SQL
ent://SD_ILS/0/SD_ILS:160900
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by XYPRO Technology Corporation<br/>Author XYPRO Technology Corporation<br/>Format: Books<br/>Call Number QA76.9.C55 S42 2006<br/>Publisher Elsevier Digital Press,<br/>Publication Date 2006<br/>ISBN 9781555583446<br/>
Information security : a strategic approach
ent://SD_ILS/0/SD_ILS:171334
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by LeVeque, Vincent<br/>Author LeVeque, Vincent<br/>Format: Books<br/>Call Number QA76.9.A25 L484 2006<br/>Publisher John Wiley & Sons,<br/>Publication Date 2006<br/>ISBN 9780471736127<br/>
The Ciso handbook : a practical guide to securing your company
ent://SD_ILS/0/SD_ILS:156649
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Gentile, Mike<br/>Author Gentile, Mike, Collette, Ronald D., August, Thomas D.<br/>Format: Books<br/>Call Number HF5548.37 G46 2006<br/>Publisher Auerbach Publications,<br/>Publication Date 2006<br/>ISBN 9780849319525<br/>
Multivariate public key cryptosystems
ent://SD_ILS/0/SD_ILS:158164
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Ding, Jintai<br/>Author Ding, Jintai, Gower, Jason E., Schmidt, Dieter S.<br/>Format: Books<br/>Call Number QA76.9.A25 D56 2006<br/>Publisher Springer-Verlag,<br/>Publication Date 2006<br/>ISBN 9780387322292<br/>
Syngress force emerging threat analysis : from mischief to malicious
ent://SD_ILS/0/SD_ILS:160905
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Maynor, David<br/>Author Maynor, David<br/>Format: Books<br/>Call Number QA76.9.A25 S96 2006<br/>Publisher Syngress Publishing,<br/>Publication Date 2006<br/>ISBN 9781597490566<br/>
Combating spyware in the enterprise
ent://SD_ILS/0/SD_ILS:160908
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Baskin, Brian<br/>Author Baskin, Brian, Piltzecker, Tony, 1975-<br/>Format: Books<br/>Call Number QA76.76.S69 C65 2006<br/>Publisher Syngress,<br/>Publication Date 2006<br/>ISBN 9781597490641<br/>
Trusted platform module basics : using TPM in embedded systems
ent://SD_ILS/0/SD_ILS:161027
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Kinney, Steven<br/>Author Kinney, Steven<br/>Format: Books<br/>Call Number TK7895.E42 K56 2006<br/>Publisher Newnes,<br/>Publication Date 2006<br/>ISBN 9780750679602 9780750679527<br/>
Information security architecture : an integrated approach to security in the organization
ent://SD_ILS/0/SD_ILS:143233
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Tudor, Jan Killmeyer<br/>Author Tudor, Jan Killmeyer<br/>Format: Books<br/>Call Number QA76.9.A25 T82 2006<br/>Edition 2nd ed.<br/>Publisher Auerbach Publications,<br/>Publication Date 2006<br/>ISBN 9780849315497<br/>
Public key infrastructure : building trusted applications and Web services
ent://SD_ILS/0/SD_ILS:144142
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Vacca, John R.<br/>Author Vacca, John R.<br/>Format: Books<br/>Call Number QA76.9.A25 P82 2004<br/>Publisher Taylor & Francis,<br/>Publication Date 2006 2004<br/>ISBN 9780849308222<br/>
Firewalls and VPNs : principles and practices
ent://SD_ILS/0/SD_ILS:151136
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Tibbs, Richard W.<br/>Author Tibbs, Richard W., Oakes, Edward B.<br/>Format: Books<br/>Call Number QA76.9.A25 T52 2006<br/>Publisher Pearson/Prentice Hall,<br/>Publication Date 2006<br/>ISBN 9780131547315<br/>
Securing SCADA systems
ent://SD_ILS/0/SD_ILS:112146
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Krutz, Ronald L., 1938-<br/>Author Krutz, Ronald L., 1938-<br/>Format: Books<br/>Call Number TS156.8 K78 2006<br/>Publisher Wiley Publishing,<br/>Publication Date 2006<br/>ISBN 9780764597879<br/>
Understanding intrusion detection through visualization
ent://SD_ILS/0/SD_ILS:143436
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Axelsson, Stefan, 1968-<br/>Author Axelsson, Stefan, 1968-, Sands, David, 1965-<br/>Format: Books<br/>Call Number TK5105.59 A93 2006<br/>Publisher Springer,<br/>Publication Date 2006<br/>ISBN 9780387276342<br/>
Provider independent cryptographic tools
ent://SD_ILS/0/SD_ILS:373731
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Subariah Ibrahim<br/>Author Subariah Ibrahim, Universiti Teknologi Malaysia. Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number QA76.9.A25 S8337 2006 af<br/>Publisher Penerbit UTM,<br/>Publication Date 2006<br/>ISBN 9789673531097<br/>
Secured multimedia data communication system
ent://SD_ILS/0/SD_ILS:376035
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Ahmad Zuri Sha'meri<br/>Author Ahmad Zuri Sha'meri, Universiti Teknologi Malaysia. Fakulti Kejuruteraan Elektrik, Universiti Teknologi Malaysia. Pusat Pengurusan Penyelidikan<br/>Format: Books<br/>Call Number QA76.575 A983 2006 af<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2006<br/>
Software security : building security in
ent://SD_ILS/0/SD_ILS:641191
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by McGraw, Gary, 1966-<br/>Author McGraw, Gary, 1966-<br/>Format: Books<br/>Call Number QA76.9.A25 M33 2006<br/>Publisher Addison-Wesley,<br/>Publication Date 2006<br/>ISBN 9780321356703<br/>
Information technology security
ent://SD_ILS/0/SD_ILS:490044
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Siti Rahayu Selamat<br/>Author Siti Rahayu Selamat<br/>Format: Books<br/>Call Number QA76.9 A25 I53 2006<br/>Publisher Prentice Hall,<br/>Publication Date 2006<br/>ISBN 9789833655472<br/>
The security risk assessment handbook : a complete guide for performing security risk assessments
ent://SD_ILS/0/SD_ILS:424028
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Landoll, Douglas J.<br/>Author Landoll, Douglas J.<br/>Format: Books<br/>Call Number HE5548.37 L36 2006<br/>Publisher Auerbach Publications,<br/>Publication Date 2006<br/>ISBN 9780849329982<br/>
Computer security fundamentals
ent://SD_ILS/0/SD_ILS:430484
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Easttom, Chuck<br/>Author Easttom, Chuck<br/>Format: Books<br/>Call Number QA76.9.A25 E27 2006<br/>Publisher Pearson Prentice Hall,<br/>Publication Date 2006<br/>ISBN 9780131711297<br/>
Security issues in electronic voting system
ent://SD_ILS/0/SD_ILS:373575
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Subariah Ibrahim<br/>Author Subariah Ibrahim, Universiti Teknologi Malaysia. Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number QA76.9.A25 S83 2006 af<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2006<br/>ISBN 9789673534098<br/>
Risk analysis of cyber-campus modules (security guidelines of electronic academic assets)
ent://SD_ILS/0/SD_ILS:373697
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Subariah Ibrahim<br/>Author Subariah Ibrahim, Universiti Teknologi Malaysia. Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number QA76.9.A25 S833 2006 af<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2006<br/>
Guide to computer forensics and investigations
ent://SD_ILS/0/SD_ILS:437494
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Nelson, Bill<br/>Author Nelson, Bill<br/>Format: Books<br/>Call Number QA76.9.A25 G84 2006<br/>Edition 2nd ed.<br/>Publisher Course Technology,<br/>Publication Date 2006<br/>ISBN 9780619217068<br/>
The unofficial guide to ethical hacking
ent://SD_ILS/0/SD_ILS:454319
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Fadia, Ankit, 1985-<br/>Author Fadia, Ankit, 1985-<br/>Format: Books<br/>Call Number QA76.9.A25 A54 2006<br/>Edition 2nd ed.<br/>Publisher Thomson Course Technology,<br/>Publication Date 2006<br/>ISBN 9781598630626<br/>
Hands-on ethical hacking and network defense
ent://SD_ILS/0/SD_ILS:454393
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Simpson, Michael T.<br/>Author Simpson, Michael T.<br/>Format: Books<br/>Call Number QA76.9.A25 S55 2006<br/>Publisher Thomson/Course Technology,<br/>Publication Date 2006<br/>ISBN 9780619217082<br/>
Computer security
ent://SD_ILS/0/SD_ILS:461636
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Gollmann, Dieter<br/>Author Gollmann, Dieter<br/>Format: Books<br/>Call Number QA76.9.A25 G65 2006<br/>Edition 2nd ed.<br/>Publisher John Wiley & Sons,<br/>Publication Date 2006<br/>ISBN 9780470862933<br/>
Web and information security
ent://SD_ILS/0/SD_ILS:462689
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Ferrari, Elena, 1968-<br/>Author Ferrari, Elena, 1968-, Thuraisingham, Bhavani M.<br/>Format: Books<br/>Call Number TK5105.59 W42 2006<br/>Publisher IRM Press,<br/>Publication Date 2006<br/>ISBN 9781591405887<br/>
Information security : principles and practice
ent://SD_ILS/0/SD_ILS:462746
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Stamp, Mark<br/>Author Stamp, Mark<br/>Format: Books<br/>Call Number QA76.9.A25 S75 2006<br/>Publisher Wiley-Interscience,<br/>Publication Date 2006<br/>ISBN 9780471738480<br/>
Machine learning and data mining for computer security : methods and applications
ent://SD_ILS/0/SD_ILS:470519
2024-05-24T20:45:01Z
2024-05-24T20:45:01Z
by Maloof , Marcus A.<br/>Author Maloof , Marcus A.<br/>Format: Books<br/>Call Number QA76.9.A25 M34 2006<br/>Publisher Springer,<br/>Publication Date 2006<br/>ISBN 9781846280290<br/>