Search Results for Computer security - Narrowed by: Open Access Book SirsiDynix Enterprise http://portal.utm.my/client/en_AU/main/main/qu$003dComputer$002bsecurity$0026qf$003dITYPE$002509Material$002bType$0025091$00253AOPEN_BK$002509Open$002bAccess$002bBook$0026ic$003dtrue$0026ps$003d300?dt=list 2024-05-07T12:48:56Z Computer security ent://SD_ILS/0/SD_ILS:246635 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Hamilton, Peter<br/>Author&#160;Hamilton, Peter<br/>Format:&#160;Books<br/>Call Number&#160;HF5548.2.H37 1972<br/>Publisher&#160;Auerbach Pub.,<br/>Publication Date&#160;2020&#160;2019&#160;2018&#160;2017&#160;2016<br/>ISBN&#160;9780877691600<br/> Computer security ent://SD_ILS/0/SD_ILS:756730 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Gollmann, Dieter<br/>Author&#160;Gollmann, Dieter<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 G65 2011<br/>Edition&#160;3rd ed.<br/>Publisher&#160;Wiley,<br/>Publication Date&#160;2011<br/>ISBN&#160;9780470741153<br/> Computer security ent://SD_ILS/0/SD_ILS:461636 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Gollmann, Dieter<br/>Author&#160;Gollmann, Dieter<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 G65 2006<br/>Edition&#160;2nd ed.<br/>Publisher&#160;John Wiley &amp; Sons,<br/>Publication Date&#160;2006<br/>ISBN&#160;9780470862933<br/> Computer security ent://SD_ILS/0/SD_ILS:98153 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Gollmann, Dieter<br/>Author&#160;Gollmann, Dieter<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 G65 1999<br/>Publisher&#160;John Wiley &amp; Sons,<br/>Publication Date&#160;1999<br/>ISBN&#160;9780471978442<br/> Computer security ent://SD_ILS/0/SD_ILS:239408 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Roberts, D. W.<br/>Author&#160;Roberts, D. W.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 R62 1990<br/>Publisher&#160;Blenheim Online Publications,<br/>Publication Date&#160;1990<br/>ISBN&#160;9780863531804<br/> Computer security ent://SD_ILS/0/SD_ILS:182467 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Carrol, John M.<br/>Author&#160;Carrol, John M.<br/>Format:&#160;Books<br/>Call Number&#160;HF5548.2.C27 1987<br/>Edition&#160;2nd ed<br/>Publisher&#160;Butterworth Pub.,<br/>Publication Date&#160;1987<br/>ISBN&#160;9780409900323<br/> Computer security ent://SD_ILS/0/SD_ILS:296008 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Hsiao, David K.<br/>Author&#160;Hsiao, David K.,&#160;Kerr, Douglas S.,&#160;Madnick, Stuart E.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 H74 1979<br/>Publisher&#160;Academic,<br/>Publication Date&#160;1979<br/>ISBN&#160;9780123576507<br/> Computer security ent://SD_ILS/0/SD_ILS:246876 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Carroll, John Millar, 1950-<br/>Author&#160;Carroll, John Millar, 1950-<br/>Format:&#160;Books<br/>Call Number&#160;HF5548.2 C37 1977<br/>Publisher&#160;Security Wold Pub.,<br/>Publication Date&#160;1977<br/>ISBN&#160;9780913708286<br/> Computer security ent://SD_ILS/0/SD_ILS:439721 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Carroll, John M. (John Millar), 1950-<br/>Author&#160;Carroll, John M. (John Millar), 1950-<br/>Format:&#160;Books<br/>Call Number&#160;HF5548.2 C37 1996<br/>Edition&#160;3rd ed.<br/>Publisher&#160;Butterworth-Heinemann,<br/>Publication Date&#160;1996<br/>ISBN&#160;9780750696005<br/> Computer security ent://SD_ILS/0/SD_ILS:403215 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 C67 1986 f<br/>Publisher&#160;Time life Books,<br/>Publication Date&#160;1986<br/>ISBN&#160;9780809456703<br/> Computer Security Fundamentals ent://SD_ILS/0/SD_ILS:886135 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Easttom, Chuck, author<br/>Author&#160;Easttom, Chuck, author<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 E27 2020<br/>Edition&#160;Fourth Edition<br/>Publication Date&#160;2020<br/>ISBN&#160;9780135774779<br/> Corporate computer security. ent://SD_ILS/0/SD_ILS:806503 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Boyle, Randall J.<br/>Author&#160;Boyle, Randall J.,&#160;Panko, Raymond R.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9 .A25 P36 2012<br/>Edition&#160;3rd ed. / Randall J. Boyle, Raymond R. Panko.<br/>Publisher&#160;Pearson,<br/>Publication Date&#160;2013&#160;2012<br/>ISBN&#160;9780132145350<br/> Computer security fundamentals ent://SD_ILS/0/SD_ILS:430484 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Easttom, Chuck<br/>Author&#160;Easttom, Chuck<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 E27 2006<br/>Publisher&#160;Pearson Prentice Hall,<br/>Publication Date&#160;2006<br/>ISBN&#160;9780131711297<br/> Computer security handbook ent://SD_ILS/0/SD_ILS:481604 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Baker, Richard H.<br/>Author&#160;Baker, Richard H.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 B35 1991<br/>Edition&#160;2nd ed.<br/>Publisher&#160;TAB Professional and Reference Books,<br/>Publication Date&#160;1991<br/>ISBN&#160;9780830675920<br/> Computer Network Security ent://SD_ILS/0/SD_ILS:887361 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Sadiqui, Ali, author<br/>Author&#160;Sadiqui, Ali, author<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 S335 2020<br/>ISBN&#160;9781786305275<br/> Computer security handbook ent://SD_ILS/0/SD_ILS:624102 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Bosworth, Seymour<br/>Author&#160;Bosworth, Seymour,&#160;Kabay, Michel E.,&#160;Whyne, Eric, 1981-<br/>Format:&#160;Books<br/>Call Number&#160;HF5548.37 C65 2009 issue.1<br/>Edition&#160;5th ed.<br/>Publisher&#160;John Wiley &amp; Sons,<br/>Publication Date&#160;2009<br/>ISBN&#160;9780471716525&#160;9780470327227&#160;9780470327234<br/> Computer security handbook ent://SD_ILS/0/SD_ILS:384593 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Bosworth, Seymour<br/>Author&#160;Bosworth, Seymour,&#160;Kabay, Michel E.<br/>Format:&#160;Books<br/>Call Number&#160;HF5548.37 C65 2002<br/>Publisher&#160;John Wiley &amp; Sons,<br/>Publication Date&#160;2002<br/>ISBN&#160;9780471412588<br/> Computer security handbook ent://SD_ILS/0/SD_ILS:423216 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Hutt, Arthur E.<br/>Author&#160;Hutt, Arthur E.,&#160;Bosworth, Seymour,&#160;Hoyt, Douglass B.<br/>Format:&#160;Books<br/>Call Number&#160;HF5548.37 C65 1995<br/>Edition&#160;3rd ed<br/>Publisher&#160;Wiley,<br/>Publication Date&#160;1995<br/>ISBN&#160;9780471019077<br/> Computer-security technology ent://SD_ILS/0/SD_ILS:466561 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Cooper, James Arlin<br/>Author&#160;Cooper, James Arlin<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 C66 1984<br/>Publisher&#160;Lexington Books,<br/>Publication Date&#160;1984<br/>ISBN&#160;9780669064360<br/> Computer data security ent://SD_ILS/0/SD_ILS:476222 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Katzan, Harry<br/>Author&#160;Katzan, Harry<br/>Format:&#160;Books<br/>Call Number&#160;HF5548.2K33 1973<br/>Publisher&#160;Van Nost. Reinhold,<br/>Publication Date&#160;1973<br/>ISBN&#160;9780442242589<br/> Computer security management ent://SD_ILS/0/SD_ILS:209132 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Van Tassel, Dennie<br/>Author&#160;Van Tassel, Dennie<br/>Format:&#160;Books<br/>Call Number&#160;HF5548.2 .V33 1972<br/>Publisher&#160;Prntice-Hall,<br/>Publication Date&#160;1972<br/>ISBN&#160;9780131664647<br/> Computer security : proceedings ent://SD_ILS/0/SD_ILS:334585 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;IFIP TC11 International Conference on Information Security (9th : 1993 : Toronto, Ont.)<br/>Author&#160;IFIP TC11 International Conference on Information Security (9th : 1993 : Toronto, Ont.),&#160;Dougall, E. Graham<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 I45 1993<br/>Publisher&#160;North-Holland,<br/>Publication Date&#160;1993<br/>ISBN&#160;9780444817488<br/> Journal of computer security ent://SD_ILS/0/SD_ILS:640207 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Jajodia, Sushil<br/>Author&#160;Jajodia, Sushil,&#160;Millen, Jonathan<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 J684 2010<br/>Publisher&#160;IOS Pr.,<br/>Publication Date&#160;2010<br/>ISBN&#160;9781607500889<br/> Introduction to computer security ent://SD_ILS/0/SD_ILS:170925 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Anderson, Hugh<br/>Author&#160;Anderson, Hugh<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 A526 2005<br/>Edition&#160;2nd ed.<br/>Publisher&#160;Pearson/Prentice Hall,<br/>Publication Date&#160;2005<br/>ISBN&#160;9789810675776<br/> Security for computer systems ent://SD_ILS/0/SD_ILS:236757 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Chadwick, B.<br/>Author&#160;Chadwick, B.,&#160;Wong, K. K.<br/>Format:&#160;Books<br/>Call Number&#160;HF5548.2.F37<br/>Publisher&#160;National Computing Centre,<br/>Publication Date&#160;1972<br/>ISBN&#160;9780850120776<br/> Introduction to computer security ent://SD_ILS/0/SD_ILS:807356 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Goodrich, Michael T.<br/>Author&#160;Goodrich, Michael T.,&#160;Tamassia, Roberto, 1960-<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 G66 2011<br/>Publisher&#160;Addison-Wesley,<br/>Publication Date&#160;2011<br/>ISBN&#160;9780321512949<br/> Computer security lab manual ent://SD_ILS/0/SD_ILS:433853 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Nestler, Vincent J.<br/>Author&#160;Nestler, Vincent J.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 C654 2006<br/>Publication Date&#160;2006<br/>ISBN&#160;9780072255089<br/> Computer security within organisations ent://SD_ILS/0/SD_ILS:125864 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Warman, Adrian R.<br/>Author&#160;Warman, Adrian R.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 W37 1993<br/>Publisher&#160;Macmillan,<br/>Publication Date&#160;1993<br/>ISBN&#160;9780333577271<br/> Computer security and cryptography ent://SD_ILS/0/SD_ILS:195334 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Konheim, Alan G., 1934-<br/>Author&#160;Konheim, Alan G., 1934-<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 K664 2007<br/>Publisher&#160;Wiley-Interscience,<br/>Publication Date&#160;2007<br/>ISBN&#160;9780471947837<br/> Introduction to computer security ent://SD_ILS/0/SD_ILS:415491 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Bishop, Matt (Matthew A.)<br/>Author&#160;Bishop, Matt (Matthew A.)<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 B563 2005<br/>Publisher&#160;Addison-Wesley,<br/>Publication Date&#160;2005<br/>ISBN&#160;9780321247445<br/> Journal of computer security ent://SD_ILS/0/SD_ILS:155568 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 J68 2007<br/>Publisher&#160;IOS Press,<br/>Publication Date&#160;2007<br/>ISSN&#160;0926227X<br/><a href="http://search.ebscohost.com/login.aspx?direct=true&db=a3h&jid=LCY&site=ehost-live">Online via EBSCOhost</a><br/>Accessible within UTM campus<br/> Information assurance and computer security ent://SD_ILS/0/SD_ILS:174888 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;NATO Advanced Research Workshop on Information Assurance and Computer Security ( 2005 : Tetouan, Morocco)<br/>Author&#160;NATO Advanced Research Workshop on Information Assurance and Computer Security ( 2005 : Tetouan, Morocco),&#160;Thomas, Johnson P.,&#160;Essaaidi, Mohamed<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 N37 2005<br/>Publisher&#160;IOS Press,<br/>Publication Date&#160;2006<br/>ISBN&#160;9781586036782<br/> Computer security and information integrity ent://SD_ILS/0/SD_ILS:250462 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;IFIP International Conference on Computer Security and Information Integrity in Our Changing World (6th : 1990 : Espoo, Finland)<br/>Author&#160;IFIP International Conference on Computer Security and Information Integrity in Our Changing World (6th : 1990 : Espoo, Finland),&#160;Dittrich, Klaus R.,&#160;Rautakivi, Seppo,&#160;Saari, Juhani<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 I44 1991<br/>Publisher&#160;Elseview Science Pub.,<br/>Publication Date&#160;1991<br/>ISBN&#160;9780444888594<br/> Computer security : a global challenge ent://SD_ILS/0/SD_ILS:296085 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;IFIP International Conference on Computer Security, 2nd: 1984 : Toronto, Ontario, Canada)<br/>Author&#160;IFIP International Conference on Computer Security, 2nd: 1984 : Toronto, Ontario, Canada),&#160;Finch, James H.,&#160;Dougall, E. Graham<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 I35 1984<br/>Publisher&#160;North Holland,<br/>Publication Date&#160;1984<br/>ISBN&#160;9780444876188<br/> Computer security : principles and practice ent://SD_ILS/0/SD_ILS:804149 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Stallings, William<br/>Author&#160;Stallings, William,&#160;Brown, Lawrie<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 S73 2012<br/>Edition&#160;2nd ed. International ed.<br/>Publisher&#160;Pearson,<br/>Publication Date&#160;2012<br/>ISBN&#160;9780273764496<br/> Computer security and penetration testing ent://SD_ILS/0/SD_ILS:245646 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Basta, Alfred<br/>Author&#160;Basta, Alfred,&#160;Halton, Wolf<br/>Format:&#160;Books<br/>Call Number&#160;TK5101.59 B37 2008<br/>Publisher&#160;Thomson,<br/>Publication Date&#160;2008<br/>ISBN&#160;9781418048266<br/> Security mechanisms for computer networks ent://SD_ILS/0/SD_ILS:191666 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Muftic, Sead<br/>Author&#160;Muftic, Sead<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 S42 1989<br/>Publisher&#160;Ellis Horwood,<br/>Publication Date&#160;1989<br/>ISBN&#160;9780745806136<br/> A Handbook of computer security ent://SD_ILS/0/SD_ILS:171598 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Hearnden, Keith<br/>Author&#160;Hearnden, Keith<br/>Format:&#160;Books<br/>Call Number&#160;HF5548.2.H363 1987<br/>Publisher&#160;Kogan page,<br/>Publication Date&#160;1987<br/>ISBN&#160;9781850913481<br/> Advances in computer system security ent://SD_ILS/0/SD_ILS:172931 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Turn, Rein,. 1931-<br/>Author&#160;Turn, Rein,. 1931-<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 A38 1981-1988<br/>Publisher&#160;Artech House,<br/>Publication Date&#160;2020&#160;2019&#160;2018&#160;2017&#160;2016<br/>ISBN&#160;9780890061541&#160;9780890060964<br/> Computer security and penetration testing ent://SD_ILS/0/SD_ILS:835918 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Basta, Alfred, author<br/>Author&#160;Basta, Alfred, author,&#160;Basta, Nadine, author,&#160;Brown, Mary, author<br/>Format:&#160;Books<br/>Call Number&#160;TK5101.59 B37 2014<br/>Edition&#160;Second edition<br/>Publisher&#160;Course Technology, Cengage Learning,<br/>Publication Date&#160;2014<br/>ISBN&#160;9780840020932<br/> Computer and information security handbook ent://SD_ILS/0/SD_ILS:828457 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Vacca, John R., editor<br/>Author&#160;Vacca, John R., editor<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 C665 2013 f<br/>Edition&#160;2nd ed.<br/>Publisher&#160;Morgan Kaufmann, an imprint of Elsevier,<br/>Publication Date&#160;2013<br/>ISBN&#160;9780123943972<br/> Security basics for computer architects ent://SD_ILS/0/SD_ILS:835912 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Lee, Ruby B., author<br/>Author&#160;Lee, Ruby B., author<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A73 L444 2013<br/>Publisher&#160;Morgan &amp; Claypool Publishers,<br/>Publication Date&#160;2013<br/>ISBN&#160;9781627051552<br/> Computer security : protecting digital resources ent://SD_ILS/0/SD_ILS:374669 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Newman, Robert C.<br/>Author&#160;Newman, Robert C.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.D314 N48 2010<br/>Publisher&#160;Jones &amp; Bartlett Publishers,<br/>Publication Date&#160;2010<br/>ISBN&#160;9780763759940<br/> Collaborative computer security and trust management ent://SD_ILS/0/SD_ILS:631994 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Seigneur, Jean-Marc<br/>Author&#160;Seigneur, Jean-Marc,&#160;Slagell, Adam, 1977-<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 C656 2010 f<br/>Publisher&#160;Information Science Reference,<br/>Publication Date&#160;2010<br/>ISBN&#160;9781605664149&#160;9781605664156<br/> Advanced computer network and security ent://SD_ILS/0/SD_ILS:342700 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Mohd. Aizaini Maarof<br/>Author&#160;Mohd. Aizaini Maarof,&#160;Muhammad Shafie Abd. Latiff,&#160;Subariah Ibrahim,&#160;Shukor Abd. Razak,&#160;Ali Selamat<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.5 A39 2008 a<br/>Publisher&#160;Penerbit Universiti Teknologi Malaysia,<br/>Publication Date&#160;2008<br/>ISBN&#160;9789835206139<br/> Simple computer security : disinfect your PC ent://SD_ILS/0/SD_ILS:170952 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Geier, Eric, 1984-<br/>Author&#160;Geier, Eric, 1984-,&#160;Geier, James T.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 G44 2007<br/>Publisher&#160;Wiley Publishing,<br/>Publication Date&#160;2007<br/>ISBN&#160;9780470068540<br/> Enhancing computer security with smart technology ent://SD_ILS/0/SD_ILS:480576 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Vemuri, V. Rao<br/>Author&#160;Vemuri, V. Rao<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 E53 2005<br/>Publisher&#160;Auerbach Pablications,<br/>Publication Date&#160;2006<br/>ISBN&#160;9780849330452<br/> Statistical methods in computer security ent://SD_ILS/0/SD_ILS:424052 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Chen, William W. S.<br/>Author&#160;Chen, William W. S.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 S74 2005<br/>Publisher&#160;Marcel Dekker,<br/>Publication Date&#160;2005<br/>ISBN&#160;9780824759391<br/> Corporate computer and network security ent://SD_ILS/0/SD_ILS:386771 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Panko, Raymond R.<br/>Author&#160;Panko, Raymond R.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 P36 2004<br/>Publisher&#160;Pearson/Prentice Hall,<br/>Publication Date&#160;2004<br/>ISBN&#160;9780130384713<br/> Computer system and network security ent://SD_ILS/0/SD_ILS:366284 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;White, Gregory B.<br/>Author&#160;White, Gregory B.,&#160;Fisch, Eric A.,&#160;Pooch, Udo W., 1944-<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 W44 1996<br/>Publisher&#160;CRC Press,<br/>Publication Date&#160;1996<br/>ISBN&#160;9780849371790<br/> Fundamentals of computer security technology ent://SD_ILS/0/SD_ILS:388519 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Amoroso, Edward G.<br/>Author&#160;Amoroso, Edward G.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 A46 1994<br/>Publisher&#160;Prentice Hall,<br/>Publication Date&#160;1994<br/>ISBN&#160;9780133055412<br/> Computer audit, control and security ent://SD_ILS/0/SD_ILS:129688 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Moeller, Robert R.<br/>Author&#160;Moeller, Robert R.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A93 M63 1989<br/>Publisher&#160;Wiley,<br/>Publication Date&#160;1989<br/>ISBN&#160;9780471853107<br/> Cryptography : an introduction to computer security ent://SD_ILS/0/SD_ILS:442385 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Seberry, Jennifer<br/>Author&#160;Seberry, Jennifer,&#160;Pieprzyk, Josef<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 S37 1989<br/>Publisher&#160;Prentice Hall,<br/>Publication Date&#160;1989<br/>ISBN&#160;9780724802746&#160;9780131949867<br/> Tutorial : computer and network security ent://SD_ILS/0/SD_ILS:171144 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Abrams, Marshall D.<br/>Author&#160;Abrams, Marshall D.,&#160;Podell, Harold J.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 A27 1987 f<br/>Publisher&#160;IEEE Computer Society,<br/>Publication Date&#160;1987<br/>ISBN&#160;9780818607561<br/> Guidelines for physical computer security ent://SD_ILS/0/SD_ILS:163944 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Wood, Michael B.<br/>Author&#160;Wood, Michael B.<br/>Format:&#160;Books<br/>Call Number&#160;HF5548.2 .W663 1986<br/>Publisher&#160;NCC Pub.,<br/>Publication Date&#160;1986<br/>ISBN&#160;9780850125818<br/> Security of computer based information systems ent://SD_ILS/0/SD_ILS:181003 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Lane, V. P.<br/>Author&#160;Lane, V. P.<br/>Format:&#160;Books<br/>Call Number&#160;HF5548.2.L35 1985<br/>Publisher&#160;Macmillan Education,<br/>Publication Date&#160;1985<br/>ISBN&#160;9780333364369<br/> Security of computer based information systems ent://SD_ILS/0/SD_ILS:95120 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Lane, V. P.<br/>Author&#160;Lane, V. P.<br/>Format:&#160;Books<br/>Call Number&#160;HF5548.2.L35 1985<br/>Publisher&#160;MacMillan Education,<br/>Publication Date&#160;1985<br/> Management handbook of computer security ent://SD_ILS/0/SD_ILS:352592 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Waring, Leslie Philip<br/>Author&#160;Waring, Leslie Philip<br/>Format:&#160;Books<br/>Call Number&#160;HF5548.2.W36 1978<br/>Publisher&#160;N C C,<br/>Publication Date&#160;1978<br/>ISBN&#160;9780850121858<br/> Computer security and integrity : proceedings ent://SD_ILS/0/SD_ILS:356767 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Symposium on Trends and Applications (1977 : Maryland)<br/>Author&#160;Symposium on Trends and Applications (1977 : Maryland),&#160;Institute of Electrical and Electronics Engineers. Computer Society<br/>Format:&#160;Books<br/>Call Number&#160;TK7885.A1 S98 1977 f<br/>Publisher&#160;IEEE,<br/>Publication Date&#160;1977<br/> Data base and computer systems security ent://SD_ILS/0/SD_ILS:298540 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Carroll, John Millar, 1950-<br/>Author&#160;Carroll, John Millar, 1950-<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9. D3 D37 1976 f<br/>Publisher&#160;Q.E.D. Information Sciences,<br/>Publication Date&#160;1976<br/>ISBN&#160;9780894350023<br/> Security procedures for computer systems ent://SD_ILS/0/SD_ILS:246655 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Hemphill, Charles F.<br/>Author&#160;Hemphill, Charles F.,&#160;Hemphill, John M.<br/>Format:&#160;Books<br/>Call Number&#160;HF5548.2.H44 1973<br/>Publisher&#160;Dow-Jones-Irwin,<br/>Publication Date&#160;1973<br/>ISBN&#160;9780870940583<br/> Computer security in an educational environment ent://SD_ILS/0/SD_ILS:273048 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Summers, Wayne C.<br/>Author&#160;Summers, Wayne C.,&#160;Institut Teknologi Malaysia. Pusat Pendidikan Persediaan<br/>Format:&#160;Books<br/>Call Number&#160;MAK 9456<br/> Computer Security : A Hands-on Approach ent://SD_ILS/0/SD_ILS:879606 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Du, Wenliang, author<br/>Author&#160;Du, Wenliang, author<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 D89 2017<br/>ISBN&#160;9781548367947<br/> Management handbook of computer security ent://SD_ILS/0/SD_ILS:378308 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z Format:&#160;Books<br/>Call Number&#160;HF5548.2 .W36 1978 f<br/> Systems security : the key to computer integrity ent://SD_ILS/0/SD_ILS:262299 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;European Computer Systems Security Forum (1984)<br/>Author&#160;European Computer Systems Security Forum (1984)<br/>Format:&#160;Books<br/>Call Number&#160;HF5548.2.E97 1984<br/>Publisher&#160;Online,<br/>Publication Date&#160;1984<br/>ISBN&#160;9780863530180<br/> ISSUES IN COMPUTER SECURITY &amp; NETWORKING. PART 2 ent://SD_ILS/0/SD_ILS:864112 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Mazleena Salleh, editor<br/>Author&#160;Mazleena Salleh, editor,&#160;Hassan Chizari, 1975-, editor,&#160;Abdul Hanan Abdullah, contributor,&#160;Behnam Dezfouli, 1982-, contributor,&#160;Kamalrulnizam Abu Bakar, contributor<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 I877 2015 a<br/>Publication Date&#160;2015<br/>ISBN&#160;9789835209543<br/> Computer security in the age of information ent://SD_ILS/0/SD_ILS:266219 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;IFIP International Conference on Computer Security (5th : 1988 : Gold Coast, Queensland)<br/>Author&#160;IFIP International Conference on Computer Security (5th : 1988 : Gold Coast, Queensland),&#160;Caelli, William,&#160;International Federation for Information Processing<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 I35 1988<br/>Publisher&#160;North-Holland,<br/>Publication Date&#160;1989<br/>ISBN&#160;9780444883247<br/> Where next for computer security? : a report ent://SD_ILS/0/SD_ILS:244362 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;National Computing Centre Limited National Study of Group on the Security of Computer-based Systems<br/>Author&#160;National Computing Centre Limited National Study of Group on the Security of Computer-based Systems<br/>Format:&#160;Books<br/>Call Number&#160;HF5548.2.N38 1974<br/>Publisher&#160;Manchester,<br/>Publication Date&#160;1974<br/>ISBN&#160;9780850121230<br/> Security of e-systems and computer networks ent://SD_ILS/0/SD_ILS:210766 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Obaidat, Mohammad S. (Mohammad Salameh), 1952-<br/>Author&#160;Obaidat, Mohammad S. (Mohammad Salameh), 1952-,&#160;Boudriga, Noureddine<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 O22 2007<br/>Publisher&#160;Cambridge University Press,<br/>Publication Date&#160;2007<br/>ISBN&#160;9780521837644<br/> Computer security assurance using the common criteria ent://SD_ILS/0/SD_ILS:451172 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Merkow, Mark S.<br/>Author&#160;Merkow, Mark S.,&#160;Breithaupt, Jim<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 M47 2004<br/>Publisher&#160;Thomson Delmar Learning,<br/>Publication Date&#160;2005<br/>ISBN&#160;9781401862657<br/> Principles of computer security : security and beyond ent://SD_ILS/0/SD_ILS:424119 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Conklin, Wm. Arthur<br/>Author&#160;Conklin, Wm. Arthur<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 P74 2004<br/>Publisher&#160;McGraw-Hill,<br/>Publication Date&#160;2004<br/>ISBN&#160;9780072255096<br/> Computer security basics =Konpy&#363;ta sekyuriti no kiso ent://SD_ILS/0/SD_ILS:825054 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Russell, Deborah<br/>Author&#160;Russell, Deborah,&#160;Gangemi, Sr. G. T.,&#160;Yamaguchi, Suguru<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 R87 1994<br/>Publisher&#160;Asuki,<br/>Publication Date&#160;1994<br/>ISBN&#160;9784756102997<br/> Computer auditing, security and internal control manual ent://SD_ILS/0/SD_ILS:450650 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Kuong, Javier F.<br/>Author&#160;Kuong, Javier F.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 K86 1987<br/>Publisher&#160;Prentice-Hall,<br/>Publication Date&#160;1987<br/>ISBN&#160;9780131629677<br/> Modern methods for computer security and privacy ent://SD_ILS/0/SD_ILS:463731 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Hoffman, Lance J.<br/>Author&#160;Hoffman, Lance J.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 H63 1977<br/>Publisher&#160;Prentice-Hall,<br/>Publication Date&#160;1977<br/>ISBN&#160;9780135952078<br/> Security, accuracy, and privacy in computer systems ent://SD_ILS/0/SD_ILS:246665 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Martin, James, 1933-<br/>Author&#160;Martin, James, 1933-<br/>Format:&#160;Books<br/>Call Number&#160;HF5548.2 .M34<br/>Publisher&#160;Prentice-Hall,<br/>Publication Date&#160;1973<br/>ISBN&#160;9780137989911<br/> Fourth Aerospace Computer Security Applications Conference : Orlando, Florida, December 12-16, 1988 ent://SD_ILS/0/SD_ILS:236627 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Aerospace Computer Security Applications Conference (4th : 1988 : Orlando, Fla.)<br/>Author&#160;Aerospace Computer Security Applications Conference (4th : 1988 : Orlando, Fla.)<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 A39 1988<br/>Publisher&#160;Computer Society Press,<br/>Publication Date&#160;1988<br/>ISBN&#160;9780818608957<br/> Computer security : the practical issues in a troubled world ent://SD_ILS/0/SD_ILS:180114 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;IFIP International Coonference on Computer Security (3rd : 1985 : Dublin, Ireland)<br/>Author&#160;IFIP International Coonference on Computer Security (3rd : 1985 : Dublin, Ireland),&#160;Grimson, Jane B.,&#160;Kugler, Hans Jurgen<br/>Format:&#160;Books<br/>Call Number&#160;QA76.5 I585 1985<br/>Publisher&#160;Elsevier Sc Pub,<br/>Publication Date&#160;1985<br/> Computer and Cyber Security : Principles, Algorithm, Applications, and Perspectives ent://SD_ILS/0/SD_ILS:882324 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Gupta, Brij, Dr., 1982-, editor<br/>Author&#160;Gupta, Brij, Dr., 1982-, editor,&#160;Agrawal, Dharma P., Dr., editor,&#160;Wang, Haoxiang, Dr., editor<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 C668 2019<br/>Publication Date&#160;2019<br/>ISBN&#160;9780815371335<br/> Machine Learning for Computer and Cyber Security : Principles, Algorithms, and Practices ent://SD_ILS/0/SD_ILS:882268 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Gupta, Brij, 1982-, editor<br/>Author&#160;Gupta, Brij, 1982-, editor,&#160;Sheng, Quan Z., editor<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.5 M335 2019<br/>Publication Date&#160;2019<br/>ISBN&#160;9781138587304<br/> Introduction to computer and network security : navigating shades of gray ent://SD_ILS/0/SD_ILS:805289 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Brooks, Richard R.<br/>Author&#160;Brooks, Richard R.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 B76 2014<br/>Publisher&#160;Chapman and Hall/CRC,<br/>Publication Date&#160;2014&#160;2013<br/>ISBN&#160;9781439860717<br/> Computer security literacy : staying safe in a digital world ent://SD_ILS/0/SD_ILS:837215 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Jacobson, Douglas, author<br/>Author&#160;Jacobson, Douglas, author,&#160;Idziorek, Joseph, author<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 J334 2013<br/>Publisher&#160;CRC Press / Taylor &amp; Francis Group,<br/>Publication Date&#160;2013<br/>ISBN&#160;9781439856185<br/> Issues in computer security and networking : part 1 ent://SD_ILS/0/SD_ILS:811380 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Muhalim Mohamed Amin author<br/>Author&#160;Muhalim Mohamed Amin author,&#160;Subariah Ibrahim author,&#160;Hazinah Kutty Mammi author,&#160;Ku, Peter Soo Lin author,&#160;Nurul Badriah Abu Bakar author<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 I87 2012 a<br/>Edition&#160;First edition<br/>Publisher&#160;Penerbit Universiti Teknologi Malaysia,<br/>Publication Date&#160;2012<br/>ISBN&#160;9789835209055<br/> Analyzing computer security : a threat/vulnerability/countermeasure approach ent://SD_ILS/0/SD_ILS:780002 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Pfleeger, Charles P., 1948-<br/>Author&#160;Pfleeger, Charles P., 1948-,&#160;Pfleeger, Shari Lawrence<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 P45 2012<br/>Publisher&#160;Prentice Hall,<br/>Publication Date&#160;2012<br/>ISBN&#160;9780132789462<br/> Securing the cloud : cloud computer security techniques and tactics ent://SD_ILS/0/SD_ILS:748817 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Winkler, J. R. (Joachim R.)<br/>Author&#160;Winkler, J. R. (Joachim R.)<br/>Format:&#160;Books<br/>Call Number&#160;QA76.585 W56 2011<br/>Publisher&#160;Elsevier,<br/>Publication Date&#160;2011<br/>ISBN&#160;9781597495929<br/> The Stuxnet Computer Worm and industrial control system security ent://SD_ILS/0/SD_ILS:798946 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Rebane, Jackson C.<br/>Author&#160;Rebane, Jackson C.<br/>Format:&#160;Books<br/>Call Number&#160;TS156.8 S78 2011<br/>Publisher&#160;Nova Science Publisher&rsquo;s, Inc.,<br/>Publication Date&#160;2011<br/>ISBN&#160;9781612099859<br/> Principles of computer security : CompTIA security+ and beyond ent://SD_ILS/0/SD_ILS:643445 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Conklin, Wm. Arthur (William Arthur)<br/>Author&#160;Conklin, Wm. Arthur (William Arthur)<br/>Format:&#160;Books<br/>Call Number&#160;QA76.3 P75 2010 f<br/>Edition&#160;2nd ed.<br/>Publisher&#160;McGraw-Hill,<br/>Publication Date&#160;2010<br/>ISBN&#160;9780071633758<br/> Visualization for computer security : 5th International Workshop, VizSec 2008, Cambridge, MA, USA, September 15, 2008, Proceedings ent://SD_ILS/0/SD_ILS:292944 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;VizSec 2008 2008 : Cambridge, Mass.)<br/>Author&#160;VizSec 2008 2008 : Cambridge, Mass.),&#160;Goodall, John R.,&#160;Conti, Greg,&#160;Ma, Kwan-liu<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 V59 2008<br/>Publisher&#160;Springer,<br/>Publication Date&#160;2008<br/>ISBN&#160;9783540859314<br/> Hardware-based computer security : from biometrics to quantum cryptography ent://SD_ILS/0/SD_ILS:290071 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Dube, Roger R.<br/>Author&#160;Dube, Roger R.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 D82 2008<br/>Publisher&#160;Wiley,<br/>Publication Date&#160;2008<br/>ISBN&#160;9780470193396<br/> Computer system security : basic concepts and solved exercises ent://SD_ILS/0/SD_ILS:328372 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Avoine, Gildas<br/>Author&#160;Avoine, Gildas,&#160;Junod, Pascal,&#160;Oechslin, Philippe<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 A96 2004<br/>Publisher&#160;EFPL Press,<br/>Publication Date&#160;2007<br/>ISBN&#160;9781420046205<br/> Biometrics, computer security systems and artificial intelligence applications ent://SD_ILS/0/SD_ILS:191280 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Saeed, Khalid<br/>Author&#160;Saeed, Khalid,&#160;Pejas, Jerzy, 1954-,&#160;Mosdorf, Romuald<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 B56 2006<br/>Publisher&#160;Springer,<br/>Publication Date&#160;2006<br/>ISBN&#160;9780387362328<br/> Minoli-Cordovana's authoritative computer &amp; network security dictionary ent://SD_ILS/0/SD_ILS:137902 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Minoli, Daniel, 1952-<br/>Author&#160;Minoli, Daniel, 1952-,&#160;Cordovana, James, 1973-<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 M565 2006<br/>Publisher&#160;Wiley-Interscience,<br/>Publication Date&#160;2006<br/>ISBN&#160;9780471782636<br/> Advances in information and computer security : first International Workshop on Security, IWSEC 2006, Kyoto, Japan, October 23-24, 2006 : proceedings ent://SD_ILS/0/SD_ILS:142220 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;International Workshop on Security (1st : 2006 : Kyoto, Japan)<br/>Author&#160;International Workshop on Security (1st : 2006 : Kyoto, Japan),&#160;Yoshiura, Hiroshi<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 I575 2006<br/>Publisher&#160;Springer,<br/>Publication Date&#160;2006<br/>ISBN&#160;9783540476993<br/> Network control and engineering for QoS, security and mobility, V : IFIP 19th World Computer Congress, TC-6, 5th IFIP International Conference on Network Control and Engineering for QoS, Security and Mobility, August 20-25, 2006, Santiago, Chile ent://SD_ILS/0/SD_ILS:116386 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;IFIP International Conference on Network Control and Engineering for QoS, Security, and Mobility (5th : 2006 : Santiago, Chile)<br/>Author&#160;IFIP International Conference on Network Control and Engineering for QoS, Security, and Mobility (5th : 2006 : Santiago, Chile),&#160;Gaiti, Dominique,&#160;IFIP World Computer Congress (19th : 2006 : Santiago, Chile)<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.5 I34 2006<br/>Publisher&#160;Springer,<br/>Publication Date&#160;2006<br/>ISBN&#160;9780387348254<br/> Machine learning and data mining for computer security : methods and applications ent://SD_ILS/0/SD_ILS:470519 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Maloof , Marcus A.<br/>Author&#160;Maloof , Marcus A.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 M34 2006<br/>Publisher&#160;Springer,<br/>Publication Date&#160;2006<br/>ISBN&#160;9781846280290<br/> Defeating the hacker : a non-technical guide to computer security ent://SD_ILS/0/SD_ILS:286783 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Schifreen, Robert<br/>Author&#160;Schifreen, Robert<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 S335 2006<br/>Publisher&#160;John Wiley &amp; Sons,<br/>Publication Date&#160;2006<br/>ISBN&#160;9780470025550<br/> Risk management for computer security : Protecting your network and information assets ent://SD_ILS/0/SD_ILS:104570 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Jones, Andy, 1952-<br/>Author&#160;Jones, Andy, 1952-,&#160;Ashenden, Debi<br/>Format:&#160;Books<br/>Call Number&#160;T55 J66 2005<br/>Publisher&#160;Elsevier Butterworth-Heinemann,<br/>Publication Date&#160;2005<br/>ISBN&#160;9780750677950<br/> Real digital forensics : computer security and incident response ent://SD_ILS/0/SD_ILS:470450 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Jones, Keith J. (Keith John)<br/>Author&#160;Jones, Keith J. (Keith John),&#160;Bejtlich, Richard,&#160;Rose, Curtis W.<br/>Format:&#160;Books<br/>Call Number&#160;HV8079.C65 J66 2005<br/>Publisher&#160;Addison-Wesley,<br/>Publication Date&#160;2005<br/>ISBN&#160;9780321240699<br/> Computer security : 20 things every employee should know ent://SD_ILS/0/SD_ILS:467117 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Rothke, Ben<br/>Author&#160;Rothke, Ben<br/>Format:&#160;Books<br/>Call Number&#160;HF5548.37 R67 2005<br/>Edition&#160;2nd ed.<br/>Publisher&#160;McGraw-Hill,<br/>Publication Date&#160;2005<br/>ISBN&#160;9780072262827<br/> Computer security : 20 things every employee should know ent://SD_ILS/0/SD_ILS:363297 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Rothke, Ben<br/>Author&#160;Rothke, Ben<br/>Format:&#160;Books<br/>Call Number&#160;HF5548.37 R67 2004<br/>Publisher&#160;McGraw-Hill Osborne,<br/>Publication Date&#160;2004<br/>ISBN&#160;9780072230833<br/> Certification and security in e-services : from e-government to e-business : IFIP 17th World Computer Congress, TC11 stream on security in e-services, August 26-29, 2002, Montr&#65533;eal, Qu&#65533;ebec, Canada ent://SD_ILS/0/SD_ILS:348679 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;IFIP World Computer Congress (17th : 2002 : Montreal, Quebec)<br/>Author&#160;IFIP World Computer Congress (17th : 2002 : Montreal, Quebec),&#160;Nardelli, Enrico,&#160;Posadziejewski, Sabina,&#160;Talamo, Maurizio<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 I36 2003<br/>Publisher&#160;Kluwer Academic Pubs,<br/>Publication Date&#160;2003<br/>ISBN&#160;9781402074936<br/> Commonsense computer security : your practical guide to information protection ent://SD_ILS/0/SD_ILS:351183 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Smith, Martin<br/>Author&#160;Smith, Martin<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 S64 1993<br/>Edition&#160;2nd ed<br/>Publisher&#160;McGraw-Hill,<br/>Publication Date&#160;1993<br/>ISBN&#160;9780077078058<br/> Security for computer networks : an introduction to data security in teleprocessing and electronic funds transfer ent://SD_ILS/0/SD_ILS:114989 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Davies, D. W.<br/>Author&#160;Davies, D. W.,&#160;Price, W. L.<br/>Format:&#160;Books<br/>Call Number&#160;TK5105 D35 1989<br/>Edition&#160;2nd ed.<br/>Publisher&#160;John Wiley &amp; Sons,<br/>Publication Date&#160;1989<br/>ISBN&#160;9780471921370<br/> Computer and communications security : strategies for the 1990s ent://SD_ILS/0/SD_ILS:454627 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Cooper, James Arlin<br/>Author&#160;Cooper, James Arlin<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 C67 1989<br/>Publisher&#160;McGraw-Hill,<br/>Publication Date&#160;1989<br/>ISBN&#160;9780070129269<br/> Auditing computer security : a manual with case studies ent://SD_ILS/0/SD_ILS:104861 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Vallabhaneni, S. Rao<br/>Author&#160;Vallabhaneni, S. Rao<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 V35 1989 f<br/>Publisher&#160;Wiley,<br/>Publication Date&#160;1989<br/>ISBN&#160;9780471626046<br/> Foiling the systems breakers : computer security and access control ent://SD_ILS/0/SD_ILS:460388 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Lobel, Jerome<br/>Author&#160;Lobel, Jerome<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 L62 1986<br/>Publisher&#160;McGraw-Hill,<br/>Publication Date&#160;1986<br/>ISBN&#160;9780070383579<br/> Security for computer networks : an introduction to data security in teleprocessing and electronic funds transfer ent://SD_ILS/0/SD_ILS:138011 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Davies, D. W.<br/>Author&#160;Davies, D. W.,&#160;Price, W. L.<br/>Format:&#160;Books<br/>Call Number&#160;TK5105 D35 1984<br/>Publisher&#160;John Wiley,<br/>Publication Date&#160;1984<br/>ISBN&#160;9780471900634<br/> Computer security management : a framework for effective management involvement ent://SD_ILS/0/SD_ILS:462893 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Solms, R. Von<br/>Author&#160;Solms, R. Von,&#160;Eloff, J. H. P.,&#160;Solms, S. H. Von<br/>Format:&#160;Books<br/>Call Number&#160;MAK 10032<br/> Computer security : computer crime is a threat to be recognized by everyone ent://SD_ILS/0/SD_ILS:390593 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Mohd. Daud Kasmuni<br/>Author&#160;Mohd. Daud Kasmuni,&#160;Seminar on EDP Audit and Controls a Better Realization of EDP Audit and Controls in Malaysia (1992 : Kuala Lumpur)<br/>Format:&#160;Books<br/>Call Number&#160;MAK 11739 a<br/> Cryptography : a new dimension in computer data security : a guide for the design and implementation of secure systems ent://SD_ILS/0/SD_ILS:342098 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Meyer, Carl H.<br/>Author&#160;Meyer, Carl H.,&#160;Matyas, Stephen M.<br/>Format:&#160;Books<br/>Call Number&#160;Z103.M49 1982<br/>ISBN&#160;9780471048923<br/> Security, Privacy and Reliability in Computer Communications and Networks ent://SD_ILS/0/SD_ILS:866967 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Sha, Kewei<br/>Author&#160;Sha, Kewei,&#160;Striegel, Aaron,&#160;Song, Min<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 S43 2017<br/>ISBN&#160;9788793379893<br/> Security and the 1984 data protection : guidance for computer users ent://SD_ILS/0/SD_ILS:165414 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z Format:&#160;Books<br/>Call Number&#160;KD1957.C65 S42 1987<br/>Publisher&#160;National Computing Centre,<br/>Publication Date&#160;1987<br/>ISBN&#160;9780850126952<br/> European Computer Systems Security: the key to computer integrity ent://SD_ILS/0/SD_ILS:229518 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z Format:&#160;Books<br/>Call Number&#160;HF5548.2 .E97 1984 f<br/>Publisher&#160;Online,<br/>Publication Date&#160;1984<br/>ISBN&#160;9780863530180<br/> Commonsense computer security : your practical guide to preventing accidental and deliberate electronic data loss ent://SD_ILS/0/SD_ILS:461454 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 S44 1989<br/> Privacy protection and computer forensics ent://SD_ILS/0/SD_ILS:420302 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Caloyannides, Michael A.<br/>Author&#160;Caloyannides, Michael A.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 C345 2004<br/>Edition&#160;2nd ed.<br/>Publisher&#160;Artech House,<br/>Publication Date&#160;2004<br/>ISBN&#160;9781580538305<br/> Implementing electronic card payment systems ent://SD_ILS/0/SD_ILS:340147 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Radu, Cristian<br/>Author&#160;Radu, Cristian<br/>Format:&#160;Books<br/>Call Number&#160;HG1710 R33 2003<br/>Publisher&#160;Artech House,<br/>Publication Date&#160;2003<br/>ISBN&#160;9781580533058<br/> Role-based access control ent://SD_ILS/0/SD_ILS:340153 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Ferraiolo, David F.<br/>Author&#160;Ferraiolo, David F.,&#160;Kuhn, D. Richard,&#160;Chandramouli, Ramaswamy<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 F47 2003<br/>Publisher&#160;Artech House,<br/>Publication Date&#160;2003<br/>ISBN&#160;9781580533706<br/> Firewall design and analysis /cAlex X. Liu ent://SD_ILS/0/SD_ILS:764064 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Liu, Alex X.<br/>Author&#160;Liu, Alex X.<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 L57 2011<br/>Publisher&#160;World Scientific,<br/>Publication Date&#160;2010<br/>ISBN&#160;9789814261654<br/> Trust and security in collaborative computing ent://SD_ILS/0/SD_ILS:232187 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Zou, Xukai, 1963-<br/>Author&#160;Zou, Xukai, 1963-,&#160;Dai, Yuan-Shun,&#160;Pan, Yi, 1960-<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 Z68 2008<br/>Publisher&#160;World Scientific,<br/>Publication Date&#160;2008<br/>ISBN&#160;9789812703682<br/> Securing information and communications systems : principles, technologies, and applications ent://SD_ILS/0/SD_ILS:263795 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Furnell, Steven M.<br/>Author&#160;Furnell, Steven M.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 S4244 2008<br/>Publisher&#160;Artech House Publishers,<br/>Publication Date&#160;2008<br/>ISBN&#160;9781596932289<br/> User's guide to cryptography and standards ent://SD_ILS/0/SD_ILS:418034 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Dent, Alexander W.<br/>Author&#160;Dent, Alexander W.,&#160;Mitchell, Chris J.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 D464 2005<br/>Publisher&#160;Artech House,<br/>Publication Date&#160;2005<br/>ISBN&#160;9781580535304<br/> Defense and detection strategies against Internet worms ent://SD_ILS/0/SD_ILS:417839 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Nazario, Jose<br/>Author&#160;Nazario, Jose<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 N394 2004<br/>Publisher&#160;Artech House,<br/>Publication Date&#160;2004<br/>ISBN&#160;9781580535373<br/> Implementing security for ATM networks ent://SD_ILS/0/SD_ILS:312453 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Tarman, Thomas D.<br/>Author&#160;Tarman, Thomas D.,&#160;Witzke, Edward L.<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 T37 2002<br/>Publisher&#160;Artech House,<br/>Publication Date&#160;2002<br/>ISBN&#160;9781580532938<br/> Security in wireless LANs and MANs ent://SD_ILS/0/SD_ILS:470555 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Hardjono, Thomas<br/>Author&#160;Hardjono, Thomas,&#160;Dondeti, Lakshminath R.<br/>Format:&#160;Books<br/>Call Number&#160;TK5103.2 H374 2005<br/>Publisher&#160;Artech House,<br/>Publication Date&#160;2005<br/>ISBN&#160;9781580537551<br/> Contemporary cryptography ent://SD_ILS/0/SD_ILS:454299 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Oppliger, Rolf<br/>Author&#160;Oppliger, Rolf<br/>Format:&#160;Books<br/>Call Number&#160;Z103 O66 2005<br/>Publisher&#160;Artech House,<br/>Publication Date&#160;2005<br/>ISBN&#160;9781580536424<br/> The German enigma cipher machine : beginnings, success, and ultimate failure ent://SD_ILS/0/SD_ILS:141225 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Winkel, Brian J.<br/>Author&#160;Winkel, Brian J.<br/>Format:&#160;Books<br/>Call Number&#160;D810.C88 G47 2005<br/>Publisher&#160;Artech House,<br/>Publication Date&#160;2005<br/>ISBN&#160;9781580539968<br/> Bluetooth security ent://SD_ILS/0/SD_ILS:419276 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Gehrmann, Christian<br/>Author&#160;Gehrmann, Christian,&#160;Persson, Joakim,&#160;Smeets, Ben<br/>Format:&#160;Books<br/>Call Number&#160;TK5103.3 G43 2004<br/>Publisher&#160;Artech House,<br/>Publication Date&#160;2004<br/>ISBN&#160;9781580535045<br/> Developing secure distributed systems with CORBA ent://SD_ILS/0/SD_ILS:317475 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Lang, Ulrich<br/>Author&#160;Lang, Ulrich,&#160;Schreiner, Rudolf<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A73 L36 2002<br/>Publisher&#160;Artech House,<br/>Publication Date&#160;2002<br/>ISBN&#160;9781580532952<br/> Java card for e-payment applications ent://SD_ILS/0/SD_ILS:317557 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Hassler, Vesna<br/>Author&#160;Hassler, Vesna<br/>Format:&#160;Books<br/>Call Number&#160;QA76.73.J38 J37 2002<br/>Publisher&#160;Artech House,<br/>Publication Date&#160;2002<br/>ISBN&#160;9781580532914<br/> Non-repudiation in electronic commerce ent://SD_ILS/0/SD_ILS:317073 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Zhou, Jianying<br/>Author&#160;Zhou, Jianying<br/>Format:&#160;Books<br/>Call Number&#160;HF5548.32 Z49 2001<br/>Publisher&#160;Artech House,<br/>Publication Date&#160;2001<br/>ISBN&#160;9781580532471<br/> Electronic payment systems for e-commerce ent://SD_ILS/0/SD_ILS:317471 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;O'Mahony, Donal, 1961-<br/>Author&#160;O'Mahony, Donal, 1961-,&#160;Peirce, M. A. (Michael A.)<br/>Format:&#160;Books<br/>Call Number&#160;HG1710 O45 2001<br/>Edition&#160;2nd ed.<br/>Publisher&#160;Artech House,<br/>Publication Date&#160;2001<br/>ISBN&#160;9781580532686<br/> Demystifying the IPsec puzzle ent://SD_ILS/0/SD_ILS:317477 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Frankel, Sheila<br/>Author&#160;Frankel, Sheila<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.567 F73 2001<br/>Publisher&#160;Artech House,<br/>Publication Date&#160;2001<br/>ISBN&#160;9781580530798<br/> Protecting intellectual property in space ent://SD_ILS/0/SD_ILS:333038 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Aerospace Computer Security Conference (1985 : McLean, Virginia)<br/>Author&#160;Aerospace Computer Security Conference (1985 : McLean, Virginia)<br/>Format:&#160;Books<br/>Call Number&#160;QA76 A37 1985<br/>Publisher&#160;IEEE Computer Society,<br/>Publication Date&#160;1985<br/>ISBN&#160;9780818606267<br/> Security and protection in information system ent://SD_ILS/0/SD_ILS:454623 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;IFIP TC 11 International Conference on Computer Security (4th : 1986 : Monte Carlo, Monaco)<br/>Author&#160;IFIP TC 11 International Conference on Computer Security (4th : 1986 : Monte Carlo, Monaco),&#160;Grissonnanche, Andre<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 I34 1986<br/>Publisher&#160;North-Holland,<br/>Publication Date&#160;1989<br/>ISBN&#160;9780444873453<br/> The need for security ent://SD_ILS/0/SD_ILS:104114 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;The Housley Computer Network Security Seminar (1987 : Melbourne)<br/>Author&#160;The Housley Computer Network Security Seminar (1987 : Melbourne),&#160;Davies, D. W.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 H68 1987 f<br/> Proceedings of a symposium on trends and applications ent://SD_ILS/0/SD_ILS:348912 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Symposium on Trends and Applications (1976-)<br/>Author&#160;Symposium on Trends and Applications (1976-),&#160;Institute of Electrical and Electronics Engineers. Computer Society<br/>Format:&#160;Books<br/>Call Number&#160;TK7885.A1 S98 1976 f<br/>Publisher&#160;IEEE,<br/>Publication Date&#160;2020&#160;2019&#160;2018&#160;2017&#160;2016<br/> Cybersecurity Analytics ent://SD_ILS/0/SD_ILS:887246 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Verma, Rakesh M., author<br/>Author&#160;Verma, Rakesh M., author,&#160;Marchette, David J., author<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 V47 2020<br/>Publication Date&#160;2020<br/>ISBN&#160;9780367346010<br/> CYBER INFLUENCE AND COGNITIVE THREATS ent://SD_ILS/0/SD_ILS:887935 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Benson, Vladlena, editor<br/>Author&#160;Benson, Vladlena, editor,&#160;McAlaney, John, editor<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 C933 2020<br/>Publication Date&#160;2020<br/>ISBN&#160;9780128192047<br/> Digital Image Watermarking : Theoretical and Computational Advances ent://SD_ILS/0/SD_ILS:882197 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Borra, Surekha, author<br/>Author&#160;Borra, Surekha, author,&#160;Thanki, Rohit, author,&#160;Dey, Nilanjan, 1984-, author<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 B673 2019<br/>Publication Date&#160;2019<br/>ISBN&#160;9781138390638<br/> Security in IoT-Enabled Space ent://SD_ILS/0/SD_ILS:882284 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Al-Turjman, Fadi, author<br/>Author&#160;Al-Turjman, Fadi, author<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.8857 A48 2019<br/>Publication Date&#160;2019<br/>ISBN&#160;9780367111236<br/> Advances of DNA computing in cryptography ent://SD_ILS/0/SD_ILS:882384 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Namasudra, Suyel, editor<br/>Author&#160;Namasudra, Suyel, editor,&#160;Deka, Ganesh Chandra, 1969- editor<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9 .A25 A378 2019<br/>Publication Date&#160;2019<br/>ISBN&#160;9780815385325<br/> AWS Certified Cloud Practitioner Study Guide : CLF-C01 Exam ent://SD_ILS/0/SD_ILS:887122 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Piper, Ben, author<br/>Author&#160;Piper, Ben, author,&#160;Clinton, David, author<br/>Format:&#160;Books<br/>Call Number&#160;QA76.3 P57 2019<br/>Publication Date&#160;2019<br/>ISBN&#160;9781119490708<br/> CRYPTOLOGY : Classical and Modern ent://SD_ILS/0/SD_ILS:882329 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Klima, Richard E., author<br/>Author&#160;Klima, Richard E., author,&#160;Sigmon, Neil, author<br/>Format:&#160;Books<br/>Call Number&#160;TK5102.94 K55 2019<br/>Edition&#160;Second Edition<br/>Publication Date&#160;2019<br/>ISBN&#160;9781138047624<br/> GUIDE TO COMPUTER FORENSICS AND INVESTIGATIONS ent://SD_ILS/0/SD_ILS:888152 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Nelson, Bill, author<br/>Author&#160;Nelson, Bill, author,&#160;Phillips, Amelia, author,&#160;Steuart, Christopher, author<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 G84 2019<br/>Edition&#160;Sixth edition<br/>Publication Date&#160;2019<br/>ISBN&#160;9781337568944<br/> CompTIA security+ guide to network security fundamentals ent://SD_ILS/0/SD_ILS:873229 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Ciampa, Mark D., author<br/>Author&#160;Ciampa, Mark D., author<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 C574 2018<br/>Edition&#160;Sixth edition<br/>Publication Date&#160;2018<br/>ISBN&#160;9781337288781<br/> Security and Privacy in Cyber-Physical Systems : Foundations, Principles, and Applications ent://SD_ILS/0/SD_ILS:873241 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Song, Houbing, editor<br/>Author&#160;Song, Houbing, editor,&#160;Fink, Glenn A., editor,&#160;Jeschke, Sabina, editor<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 S434 2018<br/>Edition&#160;First edition<br/>Publication Date&#160;2018<br/>ISBN&#160;9781119226048<br/> CYBERSECURITY ESSENTIALS ent://SD_ILS/0/SD_ILS:882336 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Brooks, Charles J., author<br/>Author&#160;Brooks, Charles J., author,&#160;Grow, Christophe, author,&#160;Craig, Philip, author,&#160;Short, Donald, author<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 B76 2018<br/>Publication Date&#160;2018<br/>ISBN&#160;9781119362395<br/> Digital Forensics and Investigations : People, Processes, and Technologies to Defend the Enterprise ent://SD_ILS/0/SD_ILS:887256 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Sachowski, Jason, author<br/>Author&#160;Sachowski, Jason, author<br/>Format:&#160;Books<br/>Call Number&#160;HV8079.C65 S23 2018<br/>Publication Date&#160;2018<br/>ISBN&#160;9781138720930<br/> Advanced Persistent Security : A Cyberwarfare Approach to Implementing Adaptive Enterprise Protection, Detection, and Reaction Strategies ent://SD_ILS/0/SD_ILS:873236 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Winkler, Ira, author<br/>Author&#160;Winkler, Ira, author,&#160;Gomes, Araceli Treu, author,&#160;Shackleford, Dave, editor<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 W56 2017<br/>Publication Date&#160;2017<br/>ISBN&#160;9780128093160<br/> Advanced Penetration Testing : Hacking the World's Most Secure Networks ent://SD_ILS/0/SD_ILS:873238 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Allsopp, Wil, author<br/>Author&#160;Allsopp, Wil, author<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 A4544 2017<br/>Publication Date&#160;2017<br/>ISBN&#160;9781119367680<br/> Privacy and Security Policies in Big Data ent://SD_ILS/0/SD_ILS:866730 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Tamane, Sharvari, 1973-, editor<br/>Author&#160;Tamane, Sharvari, 1973-, editor,&#160;Solanki, Vijender Kumar, 1980-, editor,&#160;Dey, Nilanjan, 1984-, editor<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.B45 P75 2017 f<br/>Publisher&#160;IGI Global, Information Science Reference,<br/>Publication Date&#160;2017<br/>ISBN&#160;9781522524861<br/> Network Forensics ent://SD_ILS/0/SD_ILS:873173 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Messier, Ric, author<br/>Author&#160;Messier, Ric, author<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 M47 2017<br/>Publication Date&#160;2017<br/>ISBN&#160;9781119328285<br/> Discovering Computers 2017 : Tools, Apps, Devices, and the Impact of Technology ent://SD_ILS/0/SD_ILS:886146 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Vermaat, Misty, author<br/>Author&#160;Vermaat, Misty, author,&#160;Sebok, Susan L., author,&#160;Freund, Steven M., author,&#160;Campbell, Jennifer T.,, author,&#160;Frydenberg, Mark (Mark E.), author<br/>Format:&#160;Books<br/>Call Number&#160;QA76.5 V47 2017 f<br/>Edition&#160;Enhanced edition<br/>Publication Date&#160;2017<br/>ISBN&#160;9781305657458<br/> CYBER-RISK INFORMATICS : Engineering Evaluation with Data Science ent://SD_ILS/0/SD_ILS:866793 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Sahinoglu, Mehmet, 1951-, author<br/>Author&#160;Sahinoglu, Mehmet, 1951-, author<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 S246 2016<br/>Publication Date&#160;2016<br/>ISBN&#160;9781119087519<br/> Secure development for mobile apps : how to design and code secure mobile applications with PHP and javascript ent://SD_ILS/0/SD_ILS:822512 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Glaser, J. D.<br/>Author&#160;Glaser, J. D.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 G535 2015<br/>Publisher&#160;CRC Press, Taylor &amp; Francis Group, CRC Press is an imprint of the Taylor &amp; Francis Group, an informa business,<br/>Publication Date&#160;2015<br/>ISBN&#160;9781482209037<br/> Cybersecurity : engineering a secure information technology organization ent://SD_ILS/0/SD_ILS:828276 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Shoemaker, Dan<br/>Author&#160;Shoemaker, Dan,&#160;Sigler, Kenneth, author<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 S49 2015 f<br/>Publisher&#160;Cengage Learning,<br/>Publication Date&#160;2015<br/>ISBN&#160;9781285169903<br/> Computing security &amp; cryptography handbook ent://SD_ILS/0/SD_ILS:834747 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Mason, Stephen<br/>Author&#160;Mason, Stephen<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 C667 2015<br/>Publisher&#160;Clanrye International,<br/>Publication Date&#160;2015<br/>ISBN&#160;9781632401137<br/> Biometric technology : authentication, biocryptography, and cloud-based architecture ent://SD_ILS/0/SD_ILS:834878 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Das, Ravindra, author<br/>Author&#160;Das, Ravindra, author<br/>Format:&#160;Books<br/>Call Number&#160;TK7882.B56 D37 2015<br/>Publisher&#160;CRC Press/Taylor &amp; Francis,<br/>Publication Date&#160;2015<br/>ISBN&#160;9781466592452<br/> Applications of cryptography and network security ent://SD_ILS/0/SD_ILS:836934 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Mason, Stephen<br/>Author&#160;Mason, Stephen<br/>Format:&#160;Books<br/>Call Number&#160;TK5102.94 A675 2015<br/>Publisher&#160;Clanrye Intl.,<br/>Publication Date&#160;2015<br/>ISBN&#160;9781632400659<br/> Ethical hacking and penetration testing guide ent://SD_ILS/0/SD_ILS:837218 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Baloch, Rafay<br/>Author&#160;Baloch, Rafay<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 B35 2015<br/>Publisher&#160;CRC Press, Taylor &amp; Francis Group,<br/>Publication Date&#160;2015<br/>ISBN&#160;9781482231618<br/> Legal issues in information security ent://SD_ILS/0/SD_ILS:839130 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Grama, Joanna Lyn<br/>Author&#160;Grama, Joanna Lyn<br/>Format:&#160;Books<br/>Call Number&#160;KF1263.C65 G73 2015<br/>Edition&#160;2nd ed.<br/>Publisher&#160;Jones &amp; Bartlett Learning,<br/>Publication Date&#160;2015<br/>ISBN&#160;9781284054743<br/> Industrial network security : securing critical infrastructure networks for smart grid, SCADA, and other industrial control systems ent://SD_ILS/0/SD_ILS:841037 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Knapp, Eric D.<br/>Author&#160;Knapp, Eric D.,&#160;Langill, Joel Thomas<br/>Format:&#160;Books<br/>Call Number&#160;TS156.8 K53 2015<br/>Edition&#160;2nd ed.<br/>Publisher&#160;Syngress ,<br/>Publication Date&#160;2015<br/>ISBN&#160;9780124201149<br/> Information hiding in speech signals for secure communication ent://SD_ILS/0/SD_ILS:841038 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Wu, Zhijun<br/>Author&#160;Wu, Zhijun<br/>Format:&#160;Books<br/>Call Number&#160;TK7882.S65 W8 2015<br/>Publisher&#160;Syngress ,<br/>Publication Date&#160;2015<br/>ISBN&#160;9780128013281<br/> CHFI computer hacking forensic investigator : exam guide ent://SD_ILS/0/SD_ILS:843159 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Brooks, Charles L.<br/>Author&#160;Brooks, Charles L.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 B766 2015<br/>Publisher&#160;McGraw-Hill Education ,<br/>Publication Date&#160;2015<br/>ISBN&#160;9780071831567<br/> Pervasive Computing and Communications. Part II : QOS &amp; SECURITY ent://SD_ILS/0/SD_ILS:864714 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Yahaya Coulibaly, editor<br/>Author&#160;Yahaya Coulibaly, editor,&#160;Mohammad Abdur Razzaque, editor,&#160;Adekemi Adedokun, contributor,&#160;Chong, Yuh Chwen, contributor,&#160;Fauziah Abdul Razak, contributor<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 P473 2015 a<br/>Edition&#160;First Edition 2015<br/>Publication Date&#160;2015<br/>ISBN&#160;9789835210501<br/> SECURITY IN COMPUTING &amp; NETWORKING. PART II ent://SD_ILS/0/SD_ILS:865839 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Hassan Chizari, 1975-, editor<br/>Author&#160;Hassan Chizari, 1975-, editor,&#160;Hazinah Kutty Mammi, editor,&#160;Hassan Chizari, 1975-, contributor,&#160;Mahnoush Babaeizadeh, 1988-, contributor,&#160;Majid Bakhtiari, 1961-, contributor<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 S439 2015 a<br/>Edition&#160;First Edition 2015<br/>Publication Date&#160;2015<br/>ISBN&#160;9789835211515<br/> Protocols and procedures of cryptography and network security ent://SD_ILS/0/SD_ILS:835156 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Mason, Stephen<br/>Author&#160;Mason, Stephen<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 P768 2015<br/>Publisher&#160;Clanrye International,<br/>Publication Date&#160;2015<br/>ISBN&#160;9781632404237<br/> Introduction to modern cryptography ent://SD_ILS/0/SD_ILS:835855 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Katz, Jonathan, 1974- author<br/>Author&#160;Katz, Jonathan, 1974- author,&#160;Lindell, Yehuda, author<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 K38 2015<br/>Edition&#160;Second edition<br/>Publisher&#160;CRC Press/Taylor &amp; Francis,<br/>Publication Date&#160;2015<br/>ISBN&#160;9781466570269<br/> Web security : a WhiteHat perspective ent://SD_ILS/0/SD_ILS:835869 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Hanqing, Wu, author<br/>Author&#160;Hanqing, Wu, author,&#160;Zhao, Liz, author<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 H363 2015<br/>Publisher&#160;CRC Press is an imprint of Taylor &amp; Francis ; Publishing House of Electronics Industry,<br/>Publication Date&#160;2015<br/>ISBN&#160;9781466592612<br/> Case studies in secure computing : achievements and trends ent://SD_ILS/0/SD_ILS:835881 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Issac, Biju, editor<br/>Author&#160;Issac, Biju, editor,&#160;Israr, Nauman, editor<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 C375 2015<br/>Publisher&#160;Taylor &amp; Francis, CRC Press,<br/>Publication Date&#160;2015<br/>ISBN&#160;9781482207064<br/> Information security : principles and new concepts ent://SD_ILS/0/SD_ILS:837058 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Hobbs, Fiona, editor<br/>Author&#160;Hobbs, Fiona, editor<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 I549 2015 f v.1<br/>Publisher&#160;Clanrye Intl.,<br/>Publication Date&#160;2015<br/>ISBN&#160;9781632403063&#160;9781632403070&#160;9781632403087&#160;9781632403094<br/> Integrated researh in steganography ent://SD_ILS/0/SD_ILS:837102 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Coon, Audrey, editor<br/>Author&#160;Coon, Audrey, editor<br/>Format:&#160;Books<br/>Call Number&#160;TK5102.94 I58 2015<br/>Publisher&#160;Clanrye Intl.,<br/>Publication Date&#160;2015<br/>ISBN&#160;9781632403131<br/> Hardware security : design, threats, and safeguards ent://SD_ILS/0/SD_ILS:837219 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Mukhopadhyay, Debdeep, author<br/>Author&#160;Mukhopadhyay, Debdeep, author,&#160;Chakraborty, Rajat Subhra, author<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 M85 2015<br/>Publisher&#160;CRC Press,<br/>Publication Date&#160;2015<br/>ISBN&#160;9781439895832<br/> CSA guide to cloud computing : implementing cloud privacy and security ent://SD_ILS/0/SD_ILS:838362 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Samani, Raj author<br/>Author&#160;Samani, Raj author,&#160;Honan, Brian author,&#160;Reavis, Jim author,&#160;Jirasek, Vladimir author,&#160;CSA (Organization)<br/>Format:&#160;Books<br/>Call Number&#160;QA76.585 S26 2015<br/>Publisher&#160;Elsevier/Syngress, an imprint of Elsevier,<br/>Publication Date&#160;2015<br/>ISBN&#160;9780124201255<br/> Designing and building security operations center ent://SD_ILS/0/SD_ILS:838365 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Nathans, David<br/>Author&#160;Nathans, David<br/>Format:&#160;Books<br/>Call Number&#160;HV8290 N38 2015<br/>Publisher&#160;Syngress ,<br/>Publication Date&#160;2015<br/>ISBN&#160;9780128008997<br/> Information security analytics : finding security insights, patterns, and anomalies in big data ent://SD_ILS/0/SD_ILS:838366 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Talabis, Mark, author<br/>Author&#160;Talabis, Mark, author,&#160;McPherson, Robert, author,&#160;Miyamoto, I., author,&#160;Martin, Jason L., author<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 T355 2015<br/>Publisher&#160;Syngress,<br/>Publication Date&#160;2015<br/>ISBN&#160;9780128002070<br/> Computational network science : an algorithmic approach ent://SD_ILS/0/SD_ILS:838372 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Hexmoor, Henry, author<br/>Author&#160;Hexmoor, Henry, author<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 H49 2015<br/>Publisher&#160;Morgan Kaufmann,<br/>Publication Date&#160;2015<br/>ISBN&#160;9780128008911<br/> Cyberwarfare : information operations in a connected world ent://SD_ILS/0/SD_ILS:839126 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Chapple, Mike, author<br/>Author&#160;Chapple, Mike, author,&#160;Seidl, David, author<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 C437 2015<br/>Publisher&#160;Jones &amp; Bartlett Learning,<br/>Publication Date&#160;2015<br/>ISBN&#160;9781284058482<br/> Managing risk in information systems ent://SD_ILS/0/SD_ILS:839128 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Gibson, Darril, author<br/>Author&#160;Gibson, Darril, author<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 G53 2015<br/>Edition&#160;Second edition<br/>Publisher&#160;Jones &amp; Bartlett Learning,<br/>Publication Date&#160;2015<br/>ISBN&#160;9781284055955<br/> Security policies and implementation issues ent://SD_ILS/0/SD_ILS:839131 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Johnson, Robert, 1946- author<br/>Author&#160;Johnson, Robert, 1946- author<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 J64 2015<br/>Publisher&#160;Jones &amp; Bartlett Learning,<br/>Publication Date&#160;2015<br/>ISBN&#160;9781284055993<br/> SECURITY IN COMPUTING &amp; NETWORKING. PART 1 ent://SD_ILS/0/SD_ILS:864380 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Hassan Chizari, 1975-, editor<br/>Author&#160;Hassan Chizari, 1975-, editor,&#160;Hazinah Kutty Mammi, editor,&#160;A. Ahmed Ibrahim Alkilary, contributor,&#160;Affandi Husain, contributor,&#160;Hassan Chizari, 1975-, contributor<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 S438 2015 a<br/>Edition&#160;First Edition 2015<br/>Publication Date&#160;2015<br/>ISBN&#160;35000000012313<br/> Cybersecurity : managing systems, conducting testing, and investigating intrusions ent://SD_ILS/0/SD_ILS:822549 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Mowbray, Thomas J.<br/>Author&#160;Mowbray, Thomas J.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 M69 2014<br/>Publisher&#160;John Wiley and Sons,<br/>Publication Date&#160;2014&#160;2013<br/>ISBN&#160;9781118697115<br/> Guide to network defense and countermeasures ent://SD_ILS/0/SD_ILS:822586 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Weaver, Randy, author<br/>Author&#160;Weaver, Randy, author,&#160;Weaver, Dawn, author,&#160;Farwood, Dean, author<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 W424 2014<br/>Edition&#160;Third edition<br/>Publisher&#160;Cengage Learning,<br/>Publication Date&#160;2014<br/>ISBN&#160;9781133727941<br/> Security management of next generation telecommunications networks and services ent://SD_ILS/0/SD_ILS:825733 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Jacobs, Stuart<br/>Author&#160;Jacobs, Stuart<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 J334 2014<br/>Publisher&#160;IEEE Press/Wiley,<br/>Publication Date&#160;2014<br/>ISBN&#160;9780470565131<br/> Digital communication : communication, multimedia, security ent://SD_ILS/0/SD_ILS:825786 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Meinel, Christoph, 1954-, author<br/>Author&#160;Meinel, Christoph, 1954-, author,&#160;Sack, Harald, author<br/>Format:&#160;Books<br/>Call Number&#160;TK5103.7 M45 2014<br/>Publisher&#160;Springer,<br/>Publication Date&#160;2014<br/>ISBN&#160;9783642543302<br/> Hands-on information security lab manual ent://SD_ILS/0/SD_ILS:828287 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Whitman, Michael E., 1964-, author<br/>Author&#160;Whitman, Michael E., 1964-, author,&#160;Mattord, Herbert J., author,&#160;Green, Andrew, author<br/>Format:&#160;Books<br/>Call Number&#160;HD30.38 W45 2014 f<br/>Publisher&#160;Cengage Learning,<br/>Publication Date&#160;2014<br/>ISBN&#160;9781285167572<br/> Image encryption : a communication perspective ent://SD_ILS/0/SD_ILS:828934 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Abd el-Samie, Fathi E.<br/>Author&#160;Abd el-Samie, Fathi E.,&#160;Ahmed, Hossam Eldin H., author,&#160;Elashry, Ibrahim F., author,&#160;Shahieen, Mai H., author,&#160;Faragallah, Osama S., author<br/>Format:&#160;Books<br/>Call Number&#160;TA1637 A23 2014<br/>Publisher&#160;CRC Press, Tayllor &amp; Francis Group,<br/>Publication Date&#160;2014<br/>ISBN&#160;9781466576988<br/> Introduction to information security : a strategic-based approach ent://SD_ILS/0/SD_ILS:829124 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Shimeall, Timothy J.<br/>Author&#160;Shimeall, Timothy J.,&#160;Spring, Jonathan M.<br/>Format:&#160;Books<br/>Call Number&#160;TK5102.85 S55 2014<br/>Publisher&#160;Syngress ,<br/>Publication Date&#160;2014<br/>ISBN&#160;9781597499699<br/> Emerging trends in ICT security ent://SD_ILS/0/SD_ILS:831031 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Akhgar, Babak, editor<br/>Author&#160;Akhgar, Babak, editor,&#160;Arabnia, Hamid R., editor<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 E46 2014<br/>Publisher&#160;Elsevier,<br/>Publication Date&#160;2014<br/>ISBN&#160;9780124114746<br/> Managing information security ent://SD_ILS/0/SD_ILS:831036 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Vacca, John R., editor<br/>Author&#160;Vacca, John R., editor<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 M36 2014<br/>Edition&#160;2nd ed.<br/>Publisher&#160;Elsevier,<br/>Publication Date&#160;2014<br/>ISBN&#160;9780124166882<br/> Business continuity and disaster recovery planning for IT professionals ent://SD_ILS/0/SD_ILS:831037 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Snedaker, Susan<br/>Author&#160;Snedaker, Susan,&#160;Rima, Chris<br/>Format:&#160;Books<br/>Call Number&#160;HF5548.37 S67 2014<br/>Edition&#160;2nd edition.<br/>Publisher&#160;Syngress,<br/>Publication Date&#160;2014<br/>ISBN&#160;9780124105263<br/> The basics of IT audit : purposes, processes, and practical information ent://SD_ILS/0/SD_ILS:831038 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Gantz, Stephen D.<br/>Author&#160;Gantz, Stephen D.,&#160;Maske, Steve<br/>Format:&#160;Books<br/>Call Number&#160;T58.5 G37 2014<br/>Publisher&#160;Syngress, an imprint of Elsevier,<br/>Publication Date&#160;2014<br/>ISBN&#160;9780124171596<br/> Social media security : leveraging social networking while mitigating risk ent://SD_ILS/0/SD_ILS:831039 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Cross, Michael, 1965-<br/>Author&#160;Cross, Michael, 1965-<br/>Format:&#160;Books<br/>Call Number&#160;HM742 C77 2013<br/>Publisher&#160;Elsevier,<br/>Publication Date&#160;2014&#160;2013<br/>ISBN&#160;9781597499866<br/> Identity and access management : business performanve through connected intelligence ent://SD_ILS/0/SD_ILS:831228 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Osmanoglu, Ertem<br/>Author&#160;Osmanoglu, Ertem<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 O78 2013<br/>Publisher&#160;Syngress, an imprint of Elsevier,<br/>Publication Date&#160;2014<br/>ISBN&#160;9780124081406<br/> Cyber security and IT infrastructure protection ent://SD_ILS/0/SD_ILS:831239 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Vacca, John R., editor<br/>Author&#160;Vacca, John R., editor<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 C934 2014<br/>Publisher&#160;Elsevier,<br/>Publication Date&#160;2014<br/>ISBN&#160;9780124166813<br/> Network and system security ent://SD_ILS/0/SD_ILS:831241 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Vacca, John R., editor<br/>Author&#160;Vacca, John R., editor<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 N486 2014<br/>Edition&#160;2nd ed.<br/>Publisher&#160;Elsevier,<br/>Publication Date&#160;2014<br/>ISBN&#160;9780124166899<br/> The basics of digital privacy : simple tools to protect your personal information and your identity online ent://SD_ILS/0/SD_ILS:831266 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Cherry, Denny<br/>Author&#160;Cherry, Denny,&#160;Larock, Thomas, technical editor<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 C444 2014<br/>Publisher&#160;Elsevier,<br/>Publication Date&#160;2014<br/>ISBN&#160;9780128000113<br/> Hacking with Kali : practical penetration testing techniques ent://SD_ILS/0/SD_ILS:831278 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Broad, James<br/>Author&#160;Broad, James,&#160;Bindner, Andrew<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 B764 2014<br/>Publisher&#160;Elsevier Science,<br/>Publication Date&#160;2014<br/>ISBN&#160;9780124077492<br/> System forensics, investigation and response ent://SD_ILS/0/SD_ILS:831408 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Easttom, Chuck<br/>Author&#160;Easttom, Chuck<br/>Format:&#160;Books<br/>Call Number&#160;HV8079.C65 E27 2014<br/>Edition&#160;2nd ed.<br/>Publisher&#160;Jones &amp; Bartlett Learning,<br/>Publication Date&#160;2014<br/>ISBN&#160;9781284031058<br/> Fundamentals of information systems security ent://SD_ILS/0/SD_ILS:831409 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Kim, David<br/>Author&#160;Kim, David,&#160;Solomon, Michael G.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 K564 2014<br/>Edition&#160;2nd ed.<br/>Publisher&#160;Jones &amp; Bartlett Learning ,<br/>Publication Date&#160;2014<br/>ISBN&#160;9781284031621<br/> Network security firewalls, and VPNs ent://SD_ILS/0/SD_ILS:831412 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Stewart, J. Michael<br/>Author&#160;Stewart, J. Michael<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 S74 2014<br/>Edition&#160;2nd ed.<br/>Publisher&#160;Jones &amp; Bartlett Learning,<br/>Publication Date&#160;2014<br/>ISBN&#160;9781284031676<br/> Security strategies in windows platforms and applications ent://SD_ILS/0/SD_ILS:831414 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Solomon, Michael G.<br/>Author&#160;Solomon, Michael G.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.76.O63 S656 2014<br/>Edition&#160;2nd ed.<br/>Publisher&#160;Jones &amp; Bartlett Learning,<br/>Publication Date&#160;2014<br/>ISBN&#160;9781284031652<br/> Hacker techniques, tools, and incident handling ent://SD_ILS/0/SD_ILS:831415 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Oriyano, Sean-Philip<br/>Author&#160;Oriyano, Sean-Philip<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 O75 2014<br/>Edition&#160;2nd ed.<br/>Publisher&#160;Jones &amp; Bartlett Learning,<br/>Publication Date&#160;2014<br/>ISBN&#160;9781284031713<br/> Learning nessus for penetration testing : master how to perfom IT infrastructure security vulnerability assessments using nessus with tips and insights from real-world challenges faced during vulnerability assessment ent://SD_ILS/0/SD_ILS:831436 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Kumar, Himanshu<br/>Author&#160;Kumar, Himanshu<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 K864 2014<br/>Publisher&#160;Packt Publiching,<br/>Publication Date&#160;2014<br/>ISBN&#160;9781783550999<br/> Conducting network penetration and espionage in a global environment ent://SD_ILS/0/SD_ILS:833094 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Middleton, Bruce, 1953-, author<br/>Author&#160;Middleton, Bruce, 1953-, author<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 M53 2014<br/>Publisher&#160;CRC Press,<br/>Publication Date&#160;2014<br/>ISBN&#160;9781482206470<br/> Security management : a critical thinking approach ent://SD_ILS/0/SD_ILS:804186 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Land, Michael<br/>Author&#160;Land, Michael,&#160;Ricks, Truett,&#160;Rocks, Bobby<br/>Format:&#160;Books<br/>Call Number&#160;HD61.51 L36 2014<br/>Publisher&#160;CRC Press,<br/>Publication Date&#160;2014<br/>ISBN&#160;9781466561779<br/> Cryptography for security and privacy in cloud computing ent://SD_ILS/0/SD_ILS:814026 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Rass, Stefan<br/>Author&#160;Rass, Stefan,&#160;Slamanig, Daniel, author<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 R37 2014<br/>Publisher&#160;Artech House,<br/>Publication Date&#160;2014<br/>ISBN&#160;9781608075751<br/> Cryptography and network security : principles and practice ent://SD_ILS/0/SD_ILS:821152 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Stallings, William<br/>Author&#160;Stallings, William<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 S713 2014<br/>Edition&#160;6th ed.<br/>Publisher&#160;Prentice Hall,<br/>Publication Date&#160;2014&#160;2011<br/>ISBN&#160;9780133354690<br/> Network security essentials applications and standards ent://SD_ILS/0/SD_ILS:821220 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Stallings, William<br/>Author&#160;Stallings, William<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 S725 2014<br/>Edition&#160;5th ed.<br/>Publisher&#160;Prentice Hall,<br/>Publication Date&#160;2014<br/>ISBN&#160;9780133370430<br/> Security without obscurity : a guide to confidentiality, authentication, and integrity ent://SD_ILS/0/SD_ILS:821365 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Stapleton, J. J. (Jeffrey James)<br/>Author&#160;Stapleton, J. J. (Jeffrey James)<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 S84 2014<br/>Publisher&#160;CRC Press,<br/>Publication Date&#160;2014<br/>ISBN&#160;9781466592148<br/> Principles of incident response and disaster recovery ent://SD_ILS/0/SD_ILS:822694 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Whitman, Michael E., 1964-, author<br/>Author&#160;Whitman, Michael E., 1964-, author,&#160;Mattord, Herbert J., author,&#160;Green, Andrew, 1952-, author<br/>Format:&#160;Books<br/>Call Number&#160;HF5548.37 W44 2014<br/>Edition&#160;2nd ed.<br/>Publisher&#160;Course Technology, Cengage Learning,<br/>Publication Date&#160;2014<br/>ISBN&#160;9781111138059<br/> Applied network security monitoring : collection, detection, and analysis ent://SD_ILS/0/SD_ILS:828438 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Sanders, Chris, 1986-<br/>Author&#160;Sanders, Chris, 1986-,&#160;Smith, Jason (Adjunct associate professor), author<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 S264 2014<br/>Publisher&#160;Syngress, an imprint of Elsevier,<br/>Publication Date&#160;2014<br/>ISBN&#160;9780124172081<br/> Security for multihop wireless networks ent://SD_ILS/0/SD_ILS:832917 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Khan, Shafiullah, editor<br/>Author&#160;Khan, Shafiullah, editor,&#160;Lloret Mauri, Jaime, editor<br/>Format:&#160;Books<br/>Call Number&#160;TK5103.2 S434 2014<br/>Publisher&#160;CRC Press, Taylor &amp; Francis Group,<br/>Publication Date&#160;2014<br/>ISBN&#160;9781466578036<br/> Access control, authentication, and public key infrastructure ent://SD_ILS/0/SD_ILS:832984 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Chapple, Mike, author<br/>Author&#160;Chapple, Mike, author<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 A234 2014<br/>Edition&#160;2nd ed.<br/>Publisher&#160;Jones &amp; Bartlett Learning,<br/>Publication Date&#160;2014<br/>ISBN&#160;9781284031591<br/> Security for service oriented architectures ent://SD_ILS/0/SD_ILS:837213 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Williams, Walter, author<br/>Author&#160;Williams, Walter, author<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.5828 W55 2014<br/>Publisher&#160;CRC Press,<br/>Publication Date&#160;2014<br/>ISBN&#160;9781466584020<br/> Core software security : security at the source ent://SD_ILS/0/SD_ILS:837216 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Ransome, James F., author<br/>Author&#160;Ransome, James F., author,&#160;Misra, Anmol, author,&#160;Schoenfield, Brook, author<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 R364 2014<br/>Publisher&#160;Taylor &amp; Francis,<br/>Publication Date&#160;2014<br/>ISBN&#160;9781466560956<br/> The science and technology of counterterrorism : measuring physical and electronic security risk ent://SD_ILS/0/SD_ILS:838145 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Young, Carl S., author<br/>Author&#160;Young, Carl S., author<br/>Format:&#160;Books<br/>Call Number&#160;HV6431 Y68 2014<br/>Publication Date&#160;2014<br/>ISBN&#160;9780124200562<br/> The basics of information security : understanding the fundamentals of InfoSec in theory and practice ent://SD_ILS/0/SD_ILS:838388 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Andress, Jason<br/>Author&#160;Andress, Jason<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 A535 2014<br/>Edition&#160;2nd ed.<br/>Publisher&#160;Elsevier/Syngress, Syngress is a imprint of Elsevier,<br/>Publication Date&#160;2014<br/>ISBN&#160;9780128007440<br/> Advances in secure computing, internet services, and applications ent://SD_ILS/0/SD_ILS:841203 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Tripathy, B. K. editor<br/>Author&#160;Tripathy, B. K. editor,&#160;Acharjya, D. P. editor<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 A38 2014 f<br/>Publisher&#160;Information Science Reference, an imprint of IGI Global,<br/>Publication Date&#160;2014<br/>ISBN&#160;9781466649408<br/> Analyzing security, trust, and crime in the digital world ent://SD_ILS/0/SD_ILS:841204 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Nemati, Hamid R., 1958- editor<br/>Author&#160;Nemati, Hamid R., 1958- editor<br/>Format:&#160;Books<br/>Call Number&#160;HF5548.37 A53 2014 f<br/>Publisher&#160;Information Science Reference,<br/>Publication Date&#160;2014<br/>ISBN&#160;9781466648562<br/> Architectures and protocols for secure information technology infrastructures ent://SD_ILS/0/SD_ILS:841205 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Martinez, Antonio Ruiz, 1976-, editor<br/>Author&#160;Martinez, Antonio Ruiz, 1976-, editor,&#160;Marin-Lopez, Rafael, 1977-, editor,&#160;Garcia, Fernando Pereniguez, 1984-, editor<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 A73 2014 f<br/>Publisher&#160;Information Science Reference, an imprint of IGI Global,<br/>Publication Date&#160;2014<br/>ISBN&#160;9781466645141<br/> Network security technologies : design and applications ent://SD_ILS/0/SD_ILS:841210 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Amine, Abdelmalek, editor<br/>Author&#160;Amine, Abdelmalek, editor,&#160;Ait Mohamed, Otmane, editor,&#160;Benatallah, Boualem, editor<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 N483 2014 f<br/>Publisher&#160;Information Science Reference, an imprint of IGI Global,<br/>Publication Date&#160;2014<br/>ISBN&#160;9781466647893<br/> Organizational, legal, and technological dimensions of information system administration ent://SD_ILS/0/SD_ILS:841212 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Portela, Irene Maria, 1965-, editor<br/>Author&#160;Portela, Irene Maria, 1965-, editor,&#160;Almeida, Fernando, 1979-, editor<br/>Format:&#160;Books<br/>Call Number&#160;T58.64 O74 2014 f<br/>Publisher&#160;Information Science Reference,<br/>Publication Date&#160;2014<br/>ISBN&#160;9781466645264<br/> Security, privacy, trust, and resource management in mobile and wireless communications ent://SD_ILS/0/SD_ILS:841264 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Rawat, Danda B., 1977-, editor<br/>Author&#160;Rawat, Danda B., 1977-, editor,&#160;Bista, Bhed B., 1967-, editor,&#160;Yan, Gongjun, 1976-, editor<br/>Format:&#160;Books<br/>Call Number&#160;TK5103.2 S435 2014 f<br/>Publisher&#160;Information Science Reference, an imprint of IGI Global,<br/>Publication Date&#160;2014<br/>ISBN&#160;9781466646919<br/> Cloud management and security ent://SD_ILS/0/SD_ILS:835570 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Abbadi, Imad M., author<br/>Author&#160;Abbadi, Imad M., author<br/>Format:&#160;Books<br/>Call Number&#160;QA76.585 A235 2014<br/>Publisher&#160;Wiley,<br/>Publication Date&#160;2014<br/>ISBN&#160;9781118817094<br/> A cryptography primer : secrets and promises ent://SD_ILS/0/SD_ILS:835848 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Klein, Philip N., author<br/>Author&#160;Klein, Philip N., author<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 K545 2014<br/>Publisher&#160;Cambridge University Press,<br/>Publication Date&#160;2014<br/>ISBN&#160;9781107017887<br/> What every engineer should know about cyber security and digital forensics ent://SD_ILS/0/SD_ILS:837282 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;DeFranco, Joanna F author<br/>Author&#160;DeFranco, Joanna F author<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 D44 2013<br/>Publisher&#160;CRC Press,<br/>Publication Date&#160;2014<br/>ISBN&#160;9781466564527<br/> The Intrusion detection networks : a key to collaborative security ent://SD_ILS/0/SD_ILS:837290 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Fung, Carol author<br/>Author&#160;Fung, Carol author,&#160;Boutaba, Raouf<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9 A25 F85 2014<br/>Publisher&#160;Auerbach Pub.,<br/>Publication Date&#160;2014<br/>ISBN&#160;9781466564121<br/> Responsive security : be ready to be secure ent://SD_ILS/0/SD_ILS:837295 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Meng-Chow Kang author<br/>Author&#160;Meng-Chow Kang author<br/>Format:&#160;Books<br/>Call Number&#160;HF5548.37 K36 2014<br/>Publisher&#160;CRC Press/Taylor &amp; Francis,<br/>Publication Date&#160;2014<br/>ISBN&#160;9781466584303<br/> The art of memory forensics : detecting malware and threats in Windows, Linux, and Mac memory ent://SD_ILS/0/SD_ILS:837944 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Ligh, Michael Hale, author<br/>Author&#160;Ligh, Michael Hale, author,&#160;Case, Andrew, author,&#160;Levy, Jamie, author,&#160;Walters, Aaron, author<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 L54 2014<br/>Publication Date&#160;2014<br/>ISBN&#160;9781118825099<br/> CompTIA security+ review guide : exam sy0-401 ent://SD_ILS/0/SD_ILS:837962 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Stewart, James M. author?UNAUTHORIZED<br/>Author&#160;Stewart, James M. author?UNAUTHORIZED<br/>Format:&#160;Books<br/>Call Number&#160;QA76.3 S73 2014<br/>Edition&#160;3rd edition.<br/>Publication Date&#160;2014<br/>ISBN&#160;9781118901373<br/> Collaboration with cloud computing : security, social media, and unified communications ent://SD_ILS/0/SD_ILS:838073 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Messier, Ric, author<br/>Author&#160;Messier, Ric, author,&#160;Konar, Allan, editor<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 M475 2014<br/>Publisher&#160;Syngress,<br/>Publication Date&#160;2014<br/>ISBN&#160;9780124170407<br/> Windows forensic analysis toolkit : advanced analysis techniques for Windows 8 ent://SD_ILS/0/SD_ILS:838076 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Carvey, Harlan A., author<br/>Author&#160;Carvey, Harlan A., author<br/>Format:&#160;Books<br/>Call Number&#160;HV8079.C65 C374 2014<br/>Edition&#160;Fourth edition<br/>Publisher&#160;Syngress,<br/>Publication Date&#160;2014<br/>ISBN&#160;9780124171572<br/> Targeted cyber attacks : multi-staged attacks driven by exploits and malware ent://SD_ILS/0/SD_ILS:838079 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Sood, Aditya K., author<br/>Author&#160;Sood, Aditya K., author,&#160;Enbody, Richard J.<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 S66 2014<br/>Publisher&#160;Syngress,<br/>Publication Date&#160;2014<br/>ISBN&#160;9780128006047<br/> Engineering safe and secure software systems ent://SD_ILS/0/SD_ILS:798047 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Axelrod, C. Warren<br/>Author&#160;Axelrod, C. Warren<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 A93 2013<br/>Publisher&#160;Artech House,<br/>Publication Date&#160;2013<br/>ISBN&#160;9781608074723<br/> Network intrusion analysis : methodologies, tools, and techniques for incident analysis and response ent://SD_ILS/0/SD_ILS:798922 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Fichera, Joe<br/>Author&#160;Fichera, Joe,&#160;Bolt, Steven<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 F53 2013<br/>Publisher&#160;Syngress,<br/>Publication Date&#160;2013<br/>ISBN&#160;9781597499620<br/> Digital forensics for handheld devices ent://SD_ILS/0/SD_ILS:799569 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Doherty, Eamon P.<br/>Author&#160;Doherty, Eamon P.<br/>Format:&#160;Books<br/>Call Number&#160;HV8079.C65 D64 2013<br/>Publisher&#160;CRC Press,<br/>Publication Date&#160;2013<br/>ISBN&#160;9781439898772<br/> UTM security with Fortinet : Mastering FortiOS ent://SD_ILS/0/SD_ILS:803817 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Tam, Kenneth<br/>Author&#160;Tam, Kenneth<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 U86 2013 a<br/>Publisher&#160;Syngress,<br/>Publication Date&#160;2013<br/>ISBN&#160;9781597497473<br/> Security patterns in practice : designing secure architectures using software patterns ent://SD_ILS/0/SD_ILS:804174 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Fernandez, Eduardo B.<br/>Author&#160;Fernandez, Eduardo B.<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 F47 2013<br/>Publisher&#160;Wiley,<br/>Publication Date&#160;2013<br/>ISBN&#160;9781119998945<br/> Risk propagation assessment for network security : application to airport communication network design ent://SD_ILS/0/SD_ILS:804291 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Ben Mahmoud, Mohamed Slim<br/>Author&#160;Ben Mahmoud, Mohamed Slim,&#160;Larrieu, Nicolas,&#160;Pirovano, Alain<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 B46 2013<br/>Publisher&#160;ISTE Ltd/John Wiley and Sons Inc,<br/>Publication Date&#160;2013<br/>ISBN&#160;9781848214545<br/> Information security ent://SD_ILS/0/SD_ILS:804293 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Rhodes-Ousley, Mark<br/>Author&#160;Rhodes-Ousley, Mark<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 R46 2013<br/>Edition&#160;2nd ed.<br/>Publisher&#160;McGraw Hill Education,<br/>Publication Date&#160;2013<br/>ISBN&#160;9780071784351<br/> Network attacks and defenses : a hands-on approach ent://SD_ILS/0/SD_ILS:805303 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Trabelsi, Zouheir<br/>Author&#160;Trabelsi, Zouheir<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 N48 2013<br/>Publisher&#160;CRC Press,<br/>Publication Date&#160;2013<br/>ISBN&#160;9781466517943<br/> Network and information security : issues, challenges and research trends ent://SD_ILS/0/SD_ILS:805429 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Sarma, Nityananda<br/>Author&#160;Sarma, Nityananda,&#160;Bhattacharyya, Dhruba K.<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 N484 2013<br/>Publisher&#160;Narosa Publishing House,<br/>Publication Date&#160;2013<br/>ISBN&#160;9788184873146<br/> Intelligent systems for security informatics ent://SD_ILS/0/SD_ILS:805697 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Yang, Christopher C.<br/>Author&#160;Yang, Christopher C.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 I58 2013<br/>Edition&#160;1st ed.<br/>Publisher&#160;Elsevier/Academic Press ; Zhejiang University Press,<br/>Publication Date&#160;2013<br/>ISBN&#160;9780124047020<br/> Computer forensics : infoSec Pro guide ent://SD_ILS/0/SD_ILS:806419 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Cowen, David.<br/>Author&#160;Cowen, David.<br/>Format:&#160;Books<br/>Call Number&#160;HV8079.C65 C68 2013<br/>Publisher&#160;McGraw-Hill,<br/>Publication Date&#160;2013<br/>ISBN&#160;9780071742450<br/> Malware, rootkits &amp; botnets : a beginner's guide ent://SD_ILS/0/SD_ILS:806423 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Elisan, Christopher C. QA76.76.C68<br/>Author&#160;Elisan, Christopher C. QA76.76.C68<br/>Format:&#160;Books<br/>Call Number&#160;QA76.76 .C68 E45 2013<br/>Publisher&#160;McGraw-Hill,<br/>Publication Date&#160;2013<br/>ISBN&#160;9780071792066<br/> Network security : a beginner's guide ent://SD_ILS/0/SD_ILS:806426 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Maiwald, Eric.<br/>Author&#160;Maiwald, Eric.<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 M35 2013<br/>Edition&#160;3rd ed.<br/>Publisher&#160;McGraw-Hill,<br/>Publication Date&#160;2013<br/>ISBN&#160;9780071795708<br/> Information security for managers ent://SD_ILS/0/SD_ILS:808328 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Workman, Michael<br/>Author&#160;Workman, Michael,&#160;Phelps, Daniel C.,&#160;Gathegi, John N.<br/>Format:&#160;Books<br/>Call Number&#160;HF5548.37 W67 2013<br/>Publisher&#160;Jones &amp; Bartlett Learning,<br/>Publication Date&#160;2013<br/>ISBN&#160;9780763793012<br/> Security risks in social media technologies : safe practices in public service applications ent://SD_ILS/0/SD_ILS:813931 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Oxley, Alan<br/>Author&#160;Oxley, Alan<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 O95 2013<br/>Publisher&#160;Chandos Pub.,<br/>Publication Date&#160;2013<br/>ISBN&#160;9781843347149<br/> Lindungi HP &amp; tablet android dari virus dan apa sahaja ent://SD_ILS/0/SD_ILS:815645 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Nazri Muhd.<br/>Author&#160;Nazri Muhd.,&#160;Hassan Noor,&#160;Dayang Nor Azizah Azmi<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.885.G66 N39 2013<br/>Publisher&#160;Synergy Media,<br/>Publication Date&#160;2013<br/>ISBN&#160;9789670585994<br/> Introduction to computer networks and cybersecurity ent://SD_ILS/0/SD_ILS:817543 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Wu, Chwan-Hwa (John)<br/>Author&#160;Wu, Chwan-Hwa (John),&#160;Irwin, J David<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.5 W78 2013 f<br/>Publisher&#160;CRC Press/Taylor &amp; Francis Group,<br/>Publication Date&#160;2013<br/>ISBN&#160;9781466572133<br/> Safety management for software-based equipment ent://SD_ILS/0/SD_ILS:818636 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Boulanger, Jean-Louis<br/>Author&#160;Boulanger, Jean-Louis<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 B684 2013<br/>Publisher&#160;ISTE Ltd/John Wiley and Sons Inc,<br/>Publication Date&#160;2013<br/>ISBN&#160;9781848214521<br/> Trust, privacy, and security in digital business : 10th International conference, TrustBus 2013, Prague, Czech Republic, August 28-29, 2013 : proceedings ent://SD_ILS/0/SD_ILS:819648 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;TrustBus (Conference) (10th : 2013 : Prague, Czech Republic)<br/>Author&#160;TrustBus (Conference) (10th : 2013 : Prague, Czech Republic),&#160;Furnell, Steven, 1970-,&#160;Lambrinoudakis, Costas,&#160;L&oacute;pez, Javier<br/>Format:&#160;Books<br/>Call Number&#160;HF5548.32 T78 2013<br/>Edition&#160;1st ed.<br/>Publisher&#160;Springer,<br/>Publication Date&#160;2013<br/>ISBN&#160;9783642403422<br/> Data management and security : applications in medicine, science and engineering ent://SD_ILS/0/SD_ILS:820084 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Rabasa, A. (Alejandro), editor of compilation<br/>Author&#160;Rabasa, A. (Alejandro), editor of compilation,&#160;Brebbia, C. A.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9 .D314 D377 2013<br/>Publisher&#160;WIT Press,<br/>Publication Date&#160;2013<br/>ISBN&#160;9781845647087<br/> Digital forensics explained ent://SD_ILS/0/SD_ILS:821062 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Gogolin, Greg.<br/>Author&#160;Gogolin, Greg.<br/>Format:&#160;Books<br/>Call Number&#160;HV8079.C65 G64 2013<br/>Publisher&#160;Taylor &amp; Francis, CRC Press,<br/>Publication Date&#160;2013<br/>ISBN&#160;9781439874950<br/> Computational number theory and modern cryptography ent://SD_ILS/0/SD_ILS:821167 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Yan, Song Y.<br/>Author&#160;Yan, Song Y.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 Y36 2013<br/>Publisher&#160;Wiley,<br/>Publication Date&#160;2013<br/>ISBN&#160;9781118188583<br/> Hacking for dummies ent://SD_ILS/0/SD_ILS:826411 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Beaver, Kevin<br/>Author&#160;Beaver, Kevin<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 B43 2013<br/>Edition&#160;4th edition.<br/>Publisher&#160;John Wiley &amp; Sons, Inc.,<br/>Publication Date&#160;2013<br/>ISBN&#160;9781118380932<br/> Cryptography in C and C++ ent://SD_ILS/0/SD_ILS:829247 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Welschenbach, Michael, author<br/>Author&#160;Welschenbach, Michael, author<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 W45 2013<br/>Edition&#160;2nd ed.<br/>Publisher&#160;Apress,<br/>Publication Date&#160;2013<br/>ISBN&#160;9781430250982<br/> The basics of web hacking : tools and techniques to attack the Web ent://SD_ILS/0/SD_ILS:831035 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Pauli, Josh<br/>Author&#160;Pauli, Josh<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 P39 2013<br/>Publisher&#160;Syngress, an imprint of Elsevier,<br/>Publication Date&#160;2013<br/>ISBN&#160;9780124166004<br/> Cyber warfare : techniques, tactics and tools for security practitioners ent://SD_ILS/0/SD_ILS:831235 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Andress, Jason<br/>Author&#160;Andress, Jason,&#160;Winterfeld, Steve,&#160;Ablon, Lilian<br/>Format:&#160;Books<br/>Call Number&#160;U163 A53 2014<br/>Edition&#160;2nd ed.<br/>Publisher&#160;Elsevier.<br/>Publication Date&#160;2013<br/>ISBN&#160;9780124166721<br/> Eleventh hour CISSP : study guide ent://SD_ILS/0/SD_ILS:831242 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Conrad, Eric, 1967-<br/>Author&#160;Conrad, Eric, 1967-,&#160;Misenar, Seth.,&#160;Feldman, Joshua.,&#160;Riggins, Kevin, technical editor<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 C664 2014<br/>Edition&#160;2nd ed.<br/>Publisher&#160;Syngress,<br/>Publication Date&#160;2013<br/>ISBN&#160;9780124171428<br/> Cyber crime, security and digital intelligence ent://SD_ILS/0/SD_ILS:831351 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Johnson, Mark, 1959- author<br/>Author&#160;Johnson, Mark, 1959- author<br/>Format:&#160;Books<br/>Call Number&#160;HV6773 J64 2013<br/>Publisher&#160;Gower,<br/>Publication Date&#160;2013<br/>ISBN&#160;9781409454496&#160;9781409454502<br/> Secure software design ent://SD_ILS/0/SD_ILS:831417 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Richardson, Theodor<br/>Author&#160;Richardson, Theodor,&#160;Thies, Charles<br/>Format:&#160;Books<br/>Call Number&#160;QA76.76.D47 R57 2013<br/>Publisher&#160;Jones &amp; Bartlett Learning,<br/>Publication Date&#160;2013<br/>ISBN&#160;9781449626327<br/> Arguments that count : physics, computing, and missile defense, 1949-2012 ent://SD_ILS/0/SD_ILS:831433 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Slayton, Rebecca, 1974-<br/>Author&#160;Slayton, Rebecca, 1974-<br/>Format:&#160;Books<br/>Call Number&#160;UA22 S57 2013<br/>Publisher&#160;The MIT Press,<br/>Publication Date&#160;2013<br/>ISBN&#160;9780262019446<br/> Web penetration testing with kali linux : a practical guide to implementing penetration testing strategies on websites, web applications, and standard web protocol with kali linux ent://SD_ILS/0/SD_ILS:831439 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Muniz, Joseph<br/>Author&#160;Muniz, Joseph,&#160;Lakhani, Aamir<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 M86 2013<br/>Publisher&#160;Packt publishing ,<br/>Publication Date&#160;2013<br/>ISBN&#160;9781782163169<br/> Sailing safe in cyberspace : protect your identity and data ent://SD_ILS/0/SD_ILS:831441 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Kaushik, Anjali<br/>Author&#160;Kaushik, Anjali<br/>Format:&#160;Books<br/>Call Number&#160;HV8079 .C65 K38 2013<br/>Publisher&#160;SAGE Publications,<br/>Publication Date&#160;2013<br/>ISBN&#160;9788132111221<br/> Android security : attacks and defenses ent://SD_ILS/0/SD_ILS:804238 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Misram, Anmol<br/>Author&#160;Misram, Anmol,&#160;Dubey, Abhisbek<br/>Format:&#160;Books<br/>Call Number&#160;QA76.774.A53 M57 2013<br/>Publisher&#160;Taylor &amp; Francis,<br/>Publication Date&#160;2013<br/>ISBN&#160;9781439896464<br/> Information security policy development for compliance : ISO/IEC 27001, NIST SP 800-53, HIPAA standard, PCI DSS V2.0, and AUP V5.0 ent://SD_ILS/0/SD_ILS:805287 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Williams, Barry L.<br/>Author&#160;Williams, Barry L.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 W55 2013<br/>Publisher&#160;CRC Press, Taylor &amp; Francis Group,<br/>Publication Date&#160;2013<br/>ISBN&#160;9781466580589<br/> Cyberspace and cybersecurity ent://SD_ILS/0/SD_ILS:805264 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Kostopoulos, George K.<br/>Author&#160;Kostopoulos, George K.<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 C94 2013<br/>Publisher&#160;CRC Press,<br/>Publication Date&#160;2013<br/>ISBN&#160;9781466501331<br/> Network anomaly detection : a machine learning perspective ent://SD_ILS/0/SD_ILS:805302 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Bhattacharyya, Dhruba K.<br/>Author&#160;Bhattacharyya, Dhruba K.,&#160;Kalita, Jugal Kumar<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 B474 2013<br/>Publisher&#160;CRC Press,<br/>Publication Date&#160;2013<br/>ISBN&#160;9781466582088<br/> Business data communications : infrastructure, networking and security ent://SD_ILS/0/SD_ILS:806497 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Stallings, William author<br/>Author&#160;Stallings, William author,&#160;Case, Thomas author<br/>Format:&#160;Books<br/>Call Number&#160;TK5105 S72 2013<br/>Edition&#160;Seventh edition.<br/>Publisher&#160;Pearson,<br/>Publication Date&#160;2013<br/>ISBN&#160;9780133023893<br/> Web application defender's cookbook : battling hackers and protecting users ent://SD_ILS/0/SD_ILS:806507 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Barnett, Ryan C.<br/>Author&#160;Barnett, Ryan C.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 B377 2013<br/>Edition&#160;1st ed.<br/>Publisher&#160;Wiley Pub., Inc.,<br/>Publication Date&#160;2013&#160;2012<br/>ISBN&#160;9781118362181<br/> Distributed networks : intelligence, security, and applications ent://SD_ILS/0/SD_ILS:811727 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Memon, Qurban A.<br/>Author&#160;Memon, Qurban A.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.D5 D556 2014<br/>Publisher&#160;CRC Press,<br/>Publication Date&#160;2013<br/>ISBN&#160;9781466559578<br/> Secure multi-party computation ent://SD_ILS/0/SD_ILS:813716 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Prabhakaran, Manoj, 1979-, editor<br/>Author&#160;Prabhakaran, Manoj, 1979-, editor,&#160;Sahai, Amit, editor<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 S43 2013<br/>Publisher&#160;IOS Press,<br/>Publication Date&#160;2013<br/>ISBN&#160;9781614991687<br/> The practice of network security monitoring : understanding incident detection and response ent://SD_ILS/0/SD_ILS:814762 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Bejtlich, Richard<br/>Author&#160;Bejtlich, Richard<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 B455 2013<br/>Publisher&#160;No Starch Press,<br/>Publication Date&#160;2013<br/>ISBN&#160;9781593275099<br/> Iris biometric model for secured network access ent://SD_ILS/0/SD_ILS:817225 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Khoury, Franjieh El<br/>Author&#160;Khoury, Franjieh El<br/>Format:&#160;Books<br/>Call Number&#160;TK7882.B56 K46 2013<br/>Publisher&#160;CRC Press,<br/>Publication Date&#160;2013<br/>ISBN&#160;9781466502130<br/> FISMA and the risk management framework : the new practice of federal cyber security ent://SD_ILS/0/SD_ILS:818387 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Gantz, Stephen D., editor<br/>Author&#160;Gantz, Stephen D., editor,&#160;Philpott, Daniel R., editor,&#160;Windham, Darren, editor<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 F574 2013<br/>Publisher&#160;Elsevier/Syngress,<br/>Publication Date&#160;2013<br/>ISBN&#160;9781597496414<br/> Data hiding : exposing concealed data in multimedia, operating systems, mobile devices and network protocols ent://SD_ILS/0/SD_ILS:818448 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Raggo, Michael T., author<br/>Author&#160;Raggo, Michael T., author,&#160;Hosmer, Chet, author,&#160;McGrew, Wesley, editor<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 R346 2013<br/>Edition&#160;1st ed.<br/>Publisher&#160;Syngress,<br/>Publication Date&#160;2013<br/>ISBN&#160;9781597497435<br/> Multimedia information hiding technologies and methodologies for controlling data ent://SD_ILS/0/SD_ILS:820074 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Kondo, Kazuhiro<br/>Author&#160;Kondo, Kazuhiro<br/>Format:&#160;Books<br/>Call Number&#160;QA76.575 M832 2013<br/>Publisher&#160;Information Science Reference,<br/>Publication Date&#160;2013<br/>ISBN&#160;9781466622173<br/> Pragmatic security metrics : applying metametrics to information security ent://SD_ILS/0/SD_ILS:821158 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Brotby, W. Krag<br/>Author&#160;Brotby, W. Krag,&#160;Hinson, Gary,&#160;Kabay, M.E.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 B76 2013<br/>Publisher&#160;CRC Press,<br/>Publication Date&#160;2013<br/>ISBN&#160;9781439881521<br/> Management of information security ent://SD_ILS/0/SD_ILS:822690 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Whitman, Michael E.<br/>Author&#160;Whitman, Michael E.,&#160;Mattord, Herbert J.<br/>Format:&#160;Books<br/>Call Number&#160;T58.6 W45 2013<br/>Edition&#160;4th ed.<br/>Publisher&#160;Cengage Learning,<br/>Publication Date&#160;2013<br/>ISBN&#160;9781285062297<br/> Information security risk assessment toolkit : practical assessments through data collection and data analysis ent://SD_ILS/0/SD_ILS:797973 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Talabis, Mark<br/>Author&#160;Talabis, Mark,&#160;Martin, Jason<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 T354 2013<br/>Publisher&#160;Elsevier,<br/>Publication Date&#160;2013<br/>ISBN&#160;9781597497350<br/> The basics of cyber warfare : understanding the fundamentals of cyber warfare in theory and practice ent://SD_ILS/0/SD_ILS:797986 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Winterfeld, Steve<br/>Author&#160;Winterfeld, Steve,&#160;Andress, Jason<br/>Format:&#160;Books<br/>Call Number&#160;U163 W56 2013<br/>Publisher&#160;Syngress,<br/>Publication Date&#160;2013<br/>ISBN&#160;9780124047372<br/> The hacker's guide to OS X : exploiting OS X from the root-up ent://SD_ILS/0/SD_ILS:797987 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Bathurst, Robert<br/>Author&#160;Bathurst, Robert,&#160;Rogers, Russ,&#160;Ghassemlouei, Alijohn<br/>Format:&#160;Books<br/>Call Number&#160;QA76.774.M33 B38 2013<br/>Publisher&#160;Syngress,<br/>Publication Date&#160;2013<br/>ISBN&#160;9781597499507<br/> Discrete dynamical systems and chaotic machines : theory and applications ent://SD_ILS/0/SD_ILS:828823 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Bahi, Jacques Mohcine, author<br/>Author&#160;Bahi, Jacques Mohcine, author,&#160;Guyeux, Christophe, author<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 B344 2013<br/>Publisher&#160;CRC Press,<br/>Publication Date&#160;2013<br/>ISBN&#160;9781466554504<br/> Elementary information security ent://SD_ILS/0/SD_ILS:829121 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Smith, Richard E.<br/>Author&#160;Smith, Richard E.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 S658 2013<br/>Publisher&#160;Jones &amp; Bartlett Learning,<br/>Publication Date&#160;2013<br/>ISBN&#160;9781449648206<br/> Cyber security for educational leaders : a guide to understanding and implementing technology policies ent://SD_ILS/0/SD_ILS:830049 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Phillips, Richard A.<br/>Author&#160;Phillips, Richard A.,&#160;Sianjina, Rayton R.<br/>Format:&#160;Books<br/>Call Number&#160;LB1028.3 P454 2013<br/>Publisher&#160;Routledge,<br/>Publication Date&#160;2013<br/>ISBN&#160;9780415631969&#160;9780415631976<br/> Applied cyber security and the smart grid : implementing Security Controls into the Modern Power Infrastructure ent://SD_ILS/0/SD_ILS:838059 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Knapp, Eric D. editor<br/>Author&#160;Knapp, Eric D. editor,&#160;Samani, Raj editor<br/>Format:&#160;Books<br/>Call Number&#160;TK3105 A67 2013<br/>Publisher&#160;Elsevier Science,<br/>Publication Date&#160;2013<br/>ISBN&#160;9781597499989<br/> New directions of modern cryptography ent://SD_ILS/0/SD_ILS:837292 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Cao, Zhenfu, author<br/>Author&#160;Cao, Zhenfu, author<br/>Format:&#160;Books<br/>Call Number&#160;TK5102.94 C36 2013<br/>Publisher&#160;CRC Press, Taylor &amp; Francis Group,<br/>Publication Date&#160;2013<br/>ISBN&#160;9781466501386<br/> Linux Malware Incident Response : a practitioner's guide to forensic collection and examination of volatile data : an excerpt from Malware Forensic Field Guide for Linux Systems ent://SD_ILS/0/SD_ILS:837986 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Malin, Cameron H., author<br/>Author&#160;Malin, Cameron H., author,&#160;Aquilina, James M.,&#160;Casey, Eoghan<br/>Format:&#160;Books<br/>Call Number&#160;QA76.3 M353 2013<br/>Publisher&#160;Elsevier Science,<br/>Publication Date&#160;2013<br/>ISBN&#160;9780124095076<br/> Professional penetration testing ent://SD_ILS/0/SD_ILS:838310 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Wilhelm, Thomas, author<br/>Author&#160;Wilhelm, Thomas, author,&#160;Neely, Matthew, editor<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 W544 2013<br/>Edition&#160;Second edition<br/>Publisher&#160;Syngress, an imprint of Elsevier,<br/>Publication Date&#160;2013<br/>ISBN&#160;9781597499934<br/> Engineering dependable software systems ent://SD_ILS/0/SD_ILS:841380 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;NATO Advanced Study Institute on Engineering Dependable Software Systems (2012 : Marktoberdorf, Germany)<br/>Author&#160;NATO Advanced Study Institute on Engineering Dependable Software Systems (2012 : Marktoberdorf, Germany),&#160;Broy, M., 1949- editor,&#160;Peled, Doron A., 1962- editor,&#160;Kalus, Georg editor,&#160;NATO Emerging Security Challenges Division<br/>Format:&#160;Books<br/>Call Number&#160;QA76.76.V47 N38 2013<br/>Publisher&#160;IOS Press : published in cooperation with NATO Emerging Security Challenges Division,<br/>Publication Date&#160;2013<br/>ISBN&#160;9781614992066<br/> Software safety and security : tools for analysis and verification ent://SD_ILS/0/SD_ILS:796058 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Nipkow, Tobias<br/>Author&#160;Nipkow, Tobias,&#160;Grumberg, Orna,&#160;Hauptmann, Benedikt<br/>Format:&#160;Books<br/>Call Number&#160;QA76.76.V47 S64 2012<br/>Publisher&#160;IOS Press,<br/>Publication Date&#160;2012<br/>ISBN&#160;9781614990277<br/> Client-side attacks and defense ent://SD_ILS/0/SD_ILS:797948 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Shimonski, Robert<br/>Author&#160;Shimonski, Robert,&#160;Oriyano, Sean-Philip<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 S55 2012<br/>Publisher&#160;Syngress,<br/>Publication Date&#160;2012<br/>ISBN&#160;9781597495905<br/> Hacking web apps : detecting and preventing web application security problems ent://SD_ILS/0/SD_ILS:797962 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Shema, Mike<br/>Author&#160;Shema, Mike<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 S545 2012<br/>Publisher&#160;Syngress,<br/>Publication Date&#160;2012<br/>ISBN&#160;9781597499514<br/> Advances in intelligence and security informatics ent://SD_ILS/0/SD_ILS:798923 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Mao, Wenji<br/>Author&#160;Mao, Wenji,&#160;Wang, Fei-Yue<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 M335 2012<br/>Edition&#160;1st ed.<br/>Publisher&#160;Academic Press ; Zhejiang University Press,<br/>Publication Date&#160;2012<br/>ISBN&#160;9780123972002<br/> Hacking exposed 7 : network security secrets &amp; solutions ent://SD_ILS/0/SD_ILS:801363 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;McClure, Stuart<br/>Author&#160;McClure, Stuart,&#160;McClure, Stuart,&#160;Scambray, Joel,&#160;Kurtz, George<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 M483 2012<br/>Edition&#160;7th ed.<br/>Publisher&#160;McGraw-Hill Osborne Media,<br/>Publication Date&#160;2012<br/>ISBN&#160;9780071780285<br/> The computer incident response planning handbook : executable plans for protecting information at risk ent://SD_ILS/0/SD_ILS:801383 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;McCarthy, N. K.<br/>Author&#160;McCarthy, N. K.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.D314 M364 2012<br/>Publisher&#160;McGraw-Hill Osborne Media,<br/>Publication Date&#160;2012<br/>ISBN&#160;9780071790390<br/> Information security management handbook. Volume 5 ent://SD_ILS/0/SD_ILS:802424 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Tipton, Harold F.<br/>Author&#160;Tipton, Harold F.,&#160;Nozaki, Micki Krause<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 I544 2012<br/>Edition&#160;6th ed.<br/>Publisher&#160;Auerbach Publications,<br/>Publication Date&#160;2012<br/>ISBN&#160;9781439853450<br/> Operating systems : internals and design principles ent://SD_ILS/0/SD_ILS:804136 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Stallings, William<br/>Author&#160;Stallings, William<br/>Format:&#160;Books<br/>Call Number&#160;QA76.76.O63 S72 2012<br/>Edition&#160;7th ed.<br/>Publisher&#160;Prentice Hall,<br/>Publication Date&#160;2012<br/>ISBN&#160;9780273751502<br/> Network and application security fundamentals and practices ent://SD_ILS/0/SD_ILS:805301 2024-05-07T12:48:56Z 2024-05-07T12:48:56Z by&#160;Ganguly, Debashis<br/>Author&#160;Ganguly, Debashis,&#160;Lahiri, Shibamouli<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 G365 2012<br/>Publisher&#160;Science Publishers ; Distributed by CRC Press,<br/>Publication Date&#160;2012<br/>ISBN&#160;9781578087556<br/>