Search Results for Computer security - Narrowed by: Open Access BookSirsiDynix Enterprisehttp://portal.utm.my/client/en_AU/main/main/qu$003dComputer$002bsecurity$0026qf$003dITYPE$002509Material$002bType$0025091$00253AOPEN_BK$002509Open$002bAccess$002bBook$0026ic$003dtrue$0026ps$003d300?dt=list2024-05-07T12:48:56ZComputer securityent://SD_ILS/0/SD_ILS:2466352024-05-07T12:48:56Z2024-05-07T12:48:56Zby Hamilton, Peter<br/>Author Hamilton, Peter<br/>Format: Books<br/>Call Number HF5548.2.H37 1972<br/>Publisher Auerbach Pub.,<br/>Publication Date 2020 2019 2018 2017 2016<br/>ISBN 9780877691600<br/>Computer securityent://SD_ILS/0/SD_ILS:7567302024-05-07T12:48:56Z2024-05-07T12:48:56Zby Gollmann, Dieter<br/>Author Gollmann, Dieter<br/>Format: Books<br/>Call Number QA76.9.A25 G65 2011<br/>Edition 3rd ed.<br/>Publisher Wiley,<br/>Publication Date 2011<br/>ISBN 9780470741153<br/>Computer securityent://SD_ILS/0/SD_ILS:4616362024-05-07T12:48:56Z2024-05-07T12:48:56Zby Gollmann, Dieter<br/>Author Gollmann, Dieter<br/>Format: Books<br/>Call Number QA76.9.A25 G65 2006<br/>Edition 2nd ed.<br/>Publisher John Wiley & Sons,<br/>Publication Date 2006<br/>ISBN 9780470862933<br/>Computer securityent://SD_ILS/0/SD_ILS:981532024-05-07T12:48:56Z2024-05-07T12:48:56Zby Gollmann, Dieter<br/>Author Gollmann, Dieter<br/>Format: Books<br/>Call Number QA76.9.A25 G65 1999<br/>Publisher John Wiley & Sons,<br/>Publication Date 1999<br/>ISBN 9780471978442<br/>Computer securityent://SD_ILS/0/SD_ILS:2394082024-05-07T12:48:56Z2024-05-07T12:48:56Zby Roberts, D. W.<br/>Author Roberts, D. W.<br/>Format: Books<br/>Call Number QA76.9.A25 R62 1990<br/>Publisher Blenheim Online Publications,<br/>Publication Date 1990<br/>ISBN 9780863531804<br/>Computer securityent://SD_ILS/0/SD_ILS:1824672024-05-07T12:48:56Z2024-05-07T12:48:56Zby Carrol, John M.<br/>Author Carrol, John M.<br/>Format: Books<br/>Call Number HF5548.2.C27 1987<br/>Edition 2nd ed<br/>Publisher Butterworth Pub.,<br/>Publication Date 1987<br/>ISBN 9780409900323<br/>Computer securityent://SD_ILS/0/SD_ILS:2960082024-05-07T12:48:56Z2024-05-07T12:48:56Zby Hsiao, David K.<br/>Author Hsiao, David K., Kerr, Douglas S., Madnick, Stuart E.<br/>Format: Books<br/>Call Number QA76.9.A25 H74 1979<br/>Publisher Academic,<br/>Publication Date 1979<br/>ISBN 9780123576507<br/>Computer securityent://SD_ILS/0/SD_ILS:2468762024-05-07T12:48:56Z2024-05-07T12:48:56Zby Carroll, John Millar, 1950-<br/>Author Carroll, John Millar, 1950-<br/>Format: Books<br/>Call Number HF5548.2 C37 1977<br/>Publisher Security Wold Pub.,<br/>Publication Date 1977<br/>ISBN 9780913708286<br/>Computer securityent://SD_ILS/0/SD_ILS:4397212024-05-07T12:48:56Z2024-05-07T12:48:56Zby Carroll, John M. (John Millar), 1950-<br/>Author Carroll, John M. (John Millar), 1950-<br/>Format: Books<br/>Call Number HF5548.2 C37 1996<br/>Edition 3rd ed.<br/>Publisher Butterworth-Heinemann,<br/>Publication Date 1996<br/>ISBN 9780750696005<br/>Computer securityent://SD_ILS/0/SD_ILS:4032152024-05-07T12:48:56Z2024-05-07T12:48:56ZFormat: Books<br/>Call Number QA76.9.A25 C67 1986 f<br/>Publisher Time life Books,<br/>Publication Date 1986<br/>ISBN 9780809456703<br/>Computer Security Fundamentalsent://SD_ILS/0/SD_ILS:8861352024-05-07T12:48:56Z2024-05-07T12:48:56Zby Easttom, Chuck, author<br/>Author Easttom, Chuck, author<br/>Format: Books<br/>Call Number QA76.9.A25 E27 2020<br/>Edition Fourth Edition<br/>Publication Date 2020<br/>ISBN 9780135774779<br/>Corporate computer security.ent://SD_ILS/0/SD_ILS:8065032024-05-07T12:48:56Z2024-05-07T12:48:56Zby Boyle, Randall J.<br/>Author Boyle, Randall J., Panko, Raymond R.<br/>Format: Books<br/>Call Number QA76.9 .A25 P36 2012<br/>Edition 3rd ed. / Randall J. Boyle, Raymond R. Panko.<br/>Publisher Pearson,<br/>Publication Date 2013 2012<br/>ISBN 9780132145350<br/>Computer security fundamentalsent://SD_ILS/0/SD_ILS:4304842024-05-07T12:48:56Z2024-05-07T12:48:56Zby Easttom, Chuck<br/>Author Easttom, Chuck<br/>Format: Books<br/>Call Number QA76.9.A25 E27 2006<br/>Publisher Pearson Prentice Hall,<br/>Publication Date 2006<br/>ISBN 9780131711297<br/>Computer security handbookent://SD_ILS/0/SD_ILS:4816042024-05-07T12:48:56Z2024-05-07T12:48:56Zby Baker, Richard H.<br/>Author Baker, Richard H.<br/>Format: Books<br/>Call Number QA76.9.A25 B35 1991<br/>Edition 2nd ed.<br/>Publisher TAB Professional and Reference Books,<br/>Publication Date 1991<br/>ISBN 9780830675920<br/>Computer Network Securityent://SD_ILS/0/SD_ILS:8873612024-05-07T12:48:56Z2024-05-07T12:48:56Zby Sadiqui, Ali, author<br/>Author Sadiqui, Ali, author<br/>Format: Books<br/>Call Number TK5105.59 S335 2020<br/>ISBN 9781786305275<br/>Computer security handbookent://SD_ILS/0/SD_ILS:6241022024-05-07T12:48:56Z2024-05-07T12:48:56Zby Bosworth, Seymour<br/>Author Bosworth, Seymour, Kabay, Michel E., Whyne, Eric, 1981-<br/>Format: Books<br/>Call Number HF5548.37 C65 2009 issue.1<br/>Edition 5th ed.<br/>Publisher John Wiley & Sons,<br/>Publication Date 2009<br/>ISBN 9780471716525 9780470327227 9780470327234<br/>Computer security handbookent://SD_ILS/0/SD_ILS:3845932024-05-07T12:48:56Z2024-05-07T12:48:56Zby Bosworth, Seymour<br/>Author Bosworth, Seymour, Kabay, Michel E.<br/>Format: Books<br/>Call Number HF5548.37 C65 2002<br/>Publisher John Wiley & Sons,<br/>Publication Date 2002<br/>ISBN 9780471412588<br/>Computer security handbookent://SD_ILS/0/SD_ILS:4232162024-05-07T12:48:56Z2024-05-07T12:48:56Zby Hutt, Arthur E.<br/>Author Hutt, Arthur E., Bosworth, Seymour, Hoyt, Douglass B.<br/>Format: Books<br/>Call Number HF5548.37 C65 1995<br/>Edition 3rd ed<br/>Publisher Wiley,<br/>Publication Date 1995<br/>ISBN 9780471019077<br/>Computer-security technologyent://SD_ILS/0/SD_ILS:4665612024-05-07T12:48:56Z2024-05-07T12:48:56Zby Cooper, James Arlin<br/>Author Cooper, James Arlin<br/>Format: Books<br/>Call Number QA76.9.A25 C66 1984<br/>Publisher Lexington Books,<br/>Publication Date 1984<br/>ISBN 9780669064360<br/>Computer data securityent://SD_ILS/0/SD_ILS:4762222024-05-07T12:48:56Z2024-05-07T12:48:56Zby Katzan, Harry<br/>Author Katzan, Harry<br/>Format: Books<br/>Call Number HF5548.2K33 1973<br/>Publisher Van Nost. Reinhold,<br/>Publication Date 1973<br/>ISBN 9780442242589<br/>Computer security managementent://SD_ILS/0/SD_ILS:2091322024-05-07T12:48:56Z2024-05-07T12:48:56Zby Van Tassel, Dennie<br/>Author Van Tassel, Dennie<br/>Format: Books<br/>Call Number HF5548.2 .V33 1972<br/>Publisher Prntice-Hall,<br/>Publication Date 1972<br/>ISBN 9780131664647<br/>Computer security : proceedingsent://SD_ILS/0/SD_ILS:3345852024-05-07T12:48:56Z2024-05-07T12:48:56Zby IFIP TC11 International Conference on Information Security (9th : 1993 : Toronto, Ont.)<br/>Author IFIP TC11 International Conference on Information Security (9th : 1993 : Toronto, Ont.), Dougall, E. Graham<br/>Format: Books<br/>Call Number QA76.9.A25 I45 1993<br/>Publisher North-Holland,<br/>Publication Date 1993<br/>ISBN 9780444817488<br/>Journal of computer securityent://SD_ILS/0/SD_ILS:6402072024-05-07T12:48:56Z2024-05-07T12:48:56Zby Jajodia, Sushil<br/>Author Jajodia, Sushil, Millen, Jonathan<br/>Format: Books<br/>Call Number QA76.9.A25 J684 2010<br/>Publisher IOS Pr.,<br/>Publication Date 2010<br/>ISBN 9781607500889<br/>Introduction to computer securityent://SD_ILS/0/SD_ILS:1709252024-05-07T12:48:56Z2024-05-07T12:48:56Zby Anderson, Hugh<br/>Author Anderson, Hugh<br/>Format: Books<br/>Call Number QA76.9.A25 A526 2005<br/>Edition 2nd ed.<br/>Publisher Pearson/Prentice Hall,<br/>Publication Date 2005<br/>ISBN 9789810675776<br/>Security for computer systemsent://SD_ILS/0/SD_ILS:2367572024-05-07T12:48:56Z2024-05-07T12:48:56Zby Chadwick, B.<br/>Author Chadwick, B., Wong, K. K.<br/>Format: Books<br/>Call Number HF5548.2.F37<br/>Publisher National Computing Centre,<br/>Publication Date 1972<br/>ISBN 9780850120776<br/>Introduction to computer securityent://SD_ILS/0/SD_ILS:8073562024-05-07T12:48:56Z2024-05-07T12:48:56Zby Goodrich, Michael T.<br/>Author Goodrich, Michael T., Tamassia, Roberto, 1960-<br/>Format: Books<br/>Call Number QA76.9.A25 G66 2011<br/>Publisher Addison-Wesley,<br/>Publication Date 2011<br/>ISBN 9780321512949<br/>Computer security lab manualent://SD_ILS/0/SD_ILS:4338532024-05-07T12:48:56Z2024-05-07T12:48:56Zby Nestler, Vincent J.<br/>Author Nestler, Vincent J.<br/>Format: Books<br/>Call Number QA76.9.A25 C654 2006<br/>Publication Date 2006<br/>ISBN 9780072255089<br/>Computer security within organisationsent://SD_ILS/0/SD_ILS:1258642024-05-07T12:48:56Z2024-05-07T12:48:56Zby Warman, Adrian R.<br/>Author Warman, Adrian R.<br/>Format: Books<br/>Call Number QA76.9.A25 W37 1993<br/>Publisher Macmillan,<br/>Publication Date 1993<br/>ISBN 9780333577271<br/>Computer security and cryptographyent://SD_ILS/0/SD_ILS:1953342024-05-07T12:48:56Z2024-05-07T12:48:56Zby Konheim, Alan G., 1934-<br/>Author Konheim, Alan G., 1934-<br/>Format: Books<br/>Call Number QA76.9.A25 K664 2007<br/>Publisher Wiley-Interscience,<br/>Publication Date 2007<br/>ISBN 9780471947837<br/>Introduction to computer securityent://SD_ILS/0/SD_ILS:4154912024-05-07T12:48:56Z2024-05-07T12:48:56Zby Bishop, Matt (Matthew A.)<br/>Author Bishop, Matt (Matthew A.)<br/>Format: Books<br/>Call Number QA76.9.A25 B563 2005<br/>Publisher Addison-Wesley,<br/>Publication Date 2005<br/>ISBN 9780321247445<br/>Journal of computer securityent://SD_ILS/0/SD_ILS:1555682024-05-07T12:48:56Z2024-05-07T12:48:56ZFormat: Books<br/>Call Number QA76.9.A25 J68 2007<br/>Publisher IOS Press,<br/>Publication Date 2007<br/>ISSN 0926227X<br/><a href="http://search.ebscohost.com/login.aspx?direct=true&db=a3h&jid=LCY&site=ehost-live">Online via EBSCOhost</a><br/>Accessible within UTM campus<br/>Information assurance and computer securityent://SD_ILS/0/SD_ILS:1748882024-05-07T12:48:56Z2024-05-07T12:48:56Zby NATO Advanced Research Workshop on Information Assurance and Computer Security ( 2005 : Tetouan, Morocco)<br/>Author NATO Advanced Research Workshop on Information Assurance and Computer Security ( 2005 : Tetouan, Morocco), Thomas, Johnson P., Essaaidi, Mohamed<br/>Format: Books<br/>Call Number QA76.9.A25 N37 2005<br/>Publisher IOS Press,<br/>Publication Date 2006<br/>ISBN 9781586036782<br/>Computer security and information integrityent://SD_ILS/0/SD_ILS:2504622024-05-07T12:48:56Z2024-05-07T12:48:56Zby IFIP International Conference on Computer Security and Information Integrity in Our Changing World (6th : 1990 : Espoo, Finland)<br/>Author IFIP International Conference on Computer Security and Information Integrity in Our Changing World (6th : 1990 : Espoo, Finland), Dittrich, Klaus R., Rautakivi, Seppo, Saari, Juhani<br/>Format: Books<br/>Call Number QA76.9.A25 I44 1991<br/>Publisher Elseview Science Pub.,<br/>Publication Date 1991<br/>ISBN 9780444888594<br/>Computer security : a global challengeent://SD_ILS/0/SD_ILS:2960852024-05-07T12:48:56Z2024-05-07T12:48:56Zby IFIP International Conference on Computer Security, 2nd: 1984 : Toronto, Ontario, Canada)<br/>Author IFIP International Conference on Computer Security, 2nd: 1984 : Toronto, Ontario, Canada), Finch, James H., Dougall, E. Graham<br/>Format: Books<br/>Call Number QA76.9.A25 I35 1984<br/>Publisher North Holland,<br/>Publication Date 1984<br/>ISBN 9780444876188<br/>Computer security : principles and practiceent://SD_ILS/0/SD_ILS:8041492024-05-07T12:48:56Z2024-05-07T12:48:56Zby Stallings, William<br/>Author Stallings, William, Brown, Lawrie<br/>Format: Books<br/>Call Number QA76.9.A25 S73 2012<br/>Edition 2nd ed. International ed.<br/>Publisher Pearson,<br/>Publication Date 2012<br/>ISBN 9780273764496<br/>Computer security and penetration testingent://SD_ILS/0/SD_ILS:2456462024-05-07T12:48:56Z2024-05-07T12:48:56Zby Basta, Alfred<br/>Author Basta, Alfred, Halton, Wolf<br/>Format: Books<br/>Call Number TK5101.59 B37 2008<br/>Publisher Thomson,<br/>Publication Date 2008<br/>ISBN 9781418048266<br/>Security mechanisms for computer networksent://SD_ILS/0/SD_ILS:1916662024-05-07T12:48:56Z2024-05-07T12:48:56Zby Muftic, Sead<br/>Author Muftic, Sead<br/>Format: Books<br/>Call Number QA76.9.A25 S42 1989<br/>Publisher Ellis Horwood,<br/>Publication Date 1989<br/>ISBN 9780745806136<br/>A Handbook of computer securityent://SD_ILS/0/SD_ILS:1715982024-05-07T12:48:56Z2024-05-07T12:48:56Zby Hearnden, Keith<br/>Author Hearnden, Keith<br/>Format: Books<br/>Call Number HF5548.2.H363 1987<br/>Publisher Kogan page,<br/>Publication Date 1987<br/>ISBN 9781850913481<br/>Advances in computer system securityent://SD_ILS/0/SD_ILS:1729312024-05-07T12:48:56Z2024-05-07T12:48:56Zby Turn, Rein,. 1931-<br/>Author Turn, Rein,. 1931-<br/>Format: Books<br/>Call Number QA76.9.A25 A38 1981-1988<br/>Publisher Artech House,<br/>Publication Date 2020 2019 2018 2017 2016<br/>ISBN 9780890061541 9780890060964<br/>Computer security and penetration testingent://SD_ILS/0/SD_ILS:8359182024-05-07T12:48:56Z2024-05-07T12:48:56Zby Basta, Alfred, author<br/>Author Basta, Alfred, author, Basta, Nadine, author, Brown, Mary, author<br/>Format: Books<br/>Call Number TK5101.59 B37 2014<br/>Edition Second edition<br/>Publisher Course Technology, Cengage Learning,<br/>Publication Date 2014<br/>ISBN 9780840020932<br/>Computer and information security handbookent://SD_ILS/0/SD_ILS:8284572024-05-07T12:48:56Z2024-05-07T12:48:56Zby Vacca, John R., editor<br/>Author Vacca, John R., editor<br/>Format: Books<br/>Call Number QA76.9.A25 C665 2013 f<br/>Edition 2nd ed.<br/>Publisher Morgan Kaufmann, an imprint of Elsevier,<br/>Publication Date 2013<br/>ISBN 9780123943972<br/>Security basics for computer architectsent://SD_ILS/0/SD_ILS:8359122024-05-07T12:48:56Z2024-05-07T12:48:56Zby Lee, Ruby B., author<br/>Author Lee, Ruby B., author<br/>Format: Books<br/>Call Number QA76.9.A73 L444 2013<br/>Publisher Morgan & Claypool Publishers,<br/>Publication Date 2013<br/>ISBN 9781627051552<br/>Computer security : protecting digital resourcesent://SD_ILS/0/SD_ILS:3746692024-05-07T12:48:56Z2024-05-07T12:48:56Zby Newman, Robert C.<br/>Author Newman, Robert C.<br/>Format: Books<br/>Call Number QA76.9.D314 N48 2010<br/>Publisher Jones & Bartlett Publishers,<br/>Publication Date 2010<br/>ISBN 9780763759940<br/>Collaborative computer security and trust managementent://SD_ILS/0/SD_ILS:6319942024-05-07T12:48:56Z2024-05-07T12:48:56Zby Seigneur, Jean-Marc<br/>Author Seigneur, Jean-Marc, Slagell, Adam, 1977-<br/>Format: Books<br/>Call Number QA76.9.A25 C656 2010 f<br/>Publisher Information Science Reference,<br/>Publication Date 2010<br/>ISBN 9781605664149 9781605664156<br/>Advanced computer network and securityent://SD_ILS/0/SD_ILS:3427002024-05-07T12:48:56Z2024-05-07T12:48:56Zby Mohd. Aizaini Maarof<br/>Author Mohd. Aizaini Maarof, Muhammad Shafie Abd. Latiff, Subariah Ibrahim, Shukor Abd. Razak, Ali Selamat<br/>Format: Books<br/>Call Number TK5105.5 A39 2008 a<br/>Publisher Penerbit Universiti Teknologi Malaysia,<br/>Publication Date 2008<br/>ISBN 9789835206139<br/>Simple computer security : disinfect your PCent://SD_ILS/0/SD_ILS:1709522024-05-07T12:48:56Z2024-05-07T12:48:56Zby Geier, Eric, 1984-<br/>Author Geier, Eric, 1984-, Geier, James T.<br/>Format: Books<br/>Call Number QA76.9.A25 G44 2007<br/>Publisher Wiley Publishing,<br/>Publication Date 2007<br/>ISBN 9780470068540<br/>Enhancing computer security with smart technologyent://SD_ILS/0/SD_ILS:4805762024-05-07T12:48:56Z2024-05-07T12:48:56Zby Vemuri, V. Rao<br/>Author Vemuri, V. Rao<br/>Format: Books<br/>Call Number TK5105.59 E53 2005<br/>Publisher Auerbach Pablications,<br/>Publication Date 2006<br/>ISBN 9780849330452<br/>Statistical methods in computer securityent://SD_ILS/0/SD_ILS:4240522024-05-07T12:48:56Z2024-05-07T12:48:56Zby Chen, William W. S.<br/>Author Chen, William W. S.<br/>Format: Books<br/>Call Number QA76.9.A25 S74 2005<br/>Publisher Marcel Dekker,<br/>Publication Date 2005<br/>ISBN 9780824759391<br/>Corporate computer and network securityent://SD_ILS/0/SD_ILS:3867712024-05-07T12:48:56Z2024-05-07T12:48:56Zby Panko, Raymond R.<br/>Author Panko, Raymond R.<br/>Format: Books<br/>Call Number QA76.9.A25 P36 2004<br/>Publisher Pearson/Prentice Hall,<br/>Publication Date 2004<br/>ISBN 9780130384713<br/>Computer system and network securityent://SD_ILS/0/SD_ILS:3662842024-05-07T12:48:56Z2024-05-07T12:48:56Zby White, Gregory B.<br/>Author White, Gregory B., Fisch, Eric A., Pooch, Udo W., 1944-<br/>Format: Books<br/>Call Number QA76.9.A25 W44 1996<br/>Publisher CRC Press,<br/>Publication Date 1996<br/>ISBN 9780849371790<br/>Fundamentals of computer security technologyent://SD_ILS/0/SD_ILS:3885192024-05-07T12:48:56Z2024-05-07T12:48:56Zby Amoroso, Edward G.<br/>Author Amoroso, Edward G.<br/>Format: Books<br/>Call Number QA76.9.A25 A46 1994<br/>Publisher Prentice Hall,<br/>Publication Date 1994<br/>ISBN 9780133055412<br/>Computer audit, control and securityent://SD_ILS/0/SD_ILS:1296882024-05-07T12:48:56Z2024-05-07T12:48:56Zby Moeller, Robert R.<br/>Author Moeller, Robert R.<br/>Format: Books<br/>Call Number QA76.9.A93 M63 1989<br/>Publisher Wiley,<br/>Publication Date 1989<br/>ISBN 9780471853107<br/>Cryptography : an introduction to computer securityent://SD_ILS/0/SD_ILS:4423852024-05-07T12:48:56Z2024-05-07T12:48:56Zby Seberry, Jennifer<br/>Author Seberry, Jennifer, Pieprzyk, Josef<br/>Format: Books<br/>Call Number QA76.9.A25 S37 1989<br/>Publisher Prentice Hall,<br/>Publication Date 1989<br/>ISBN 9780724802746 9780131949867<br/>Tutorial : computer and network securityent://SD_ILS/0/SD_ILS:1711442024-05-07T12:48:56Z2024-05-07T12:48:56Zby Abrams, Marshall D.<br/>Author Abrams, Marshall D., Podell, Harold J.<br/>Format: Books<br/>Call Number QA76.9.A25 A27 1987 f<br/>Publisher IEEE Computer Society,<br/>Publication Date 1987<br/>ISBN 9780818607561<br/>Guidelines for physical computer securityent://SD_ILS/0/SD_ILS:1639442024-05-07T12:48:56Z2024-05-07T12:48:56Zby Wood, Michael B.<br/>Author Wood, Michael B.<br/>Format: Books<br/>Call Number HF5548.2 .W663 1986<br/>Publisher NCC Pub.,<br/>Publication Date 1986<br/>ISBN 9780850125818<br/>Security of computer based information systemsent://SD_ILS/0/SD_ILS:1810032024-05-07T12:48:56Z2024-05-07T12:48:56Zby Lane, V. P.<br/>Author Lane, V. P.<br/>Format: Books<br/>Call Number HF5548.2.L35 1985<br/>Publisher Macmillan Education,<br/>Publication Date 1985<br/>ISBN 9780333364369<br/>Security of computer based information systemsent://SD_ILS/0/SD_ILS:951202024-05-07T12:48:56Z2024-05-07T12:48:56Zby Lane, V. P.<br/>Author Lane, V. P.<br/>Format: Books<br/>Call Number HF5548.2.L35 1985<br/>Publisher MacMillan Education,<br/>Publication Date 1985<br/>Management handbook of computer securityent://SD_ILS/0/SD_ILS:3525922024-05-07T12:48:56Z2024-05-07T12:48:56Zby Waring, Leslie Philip<br/>Author Waring, Leslie Philip<br/>Format: Books<br/>Call Number HF5548.2.W36 1978<br/>Publisher N C C,<br/>Publication Date 1978<br/>ISBN 9780850121858<br/>Computer security and integrity : proceedingsent://SD_ILS/0/SD_ILS:3567672024-05-07T12:48:56Z2024-05-07T12:48:56Zby Symposium on Trends and Applications (1977 : Maryland)<br/>Author Symposium on Trends and Applications (1977 : Maryland), Institute of Electrical and Electronics Engineers. Computer Society<br/>Format: Books<br/>Call Number TK7885.A1 S98 1977 f<br/>Publisher IEEE,<br/>Publication Date 1977<br/>Data base and computer systems securityent://SD_ILS/0/SD_ILS:2985402024-05-07T12:48:56Z2024-05-07T12:48:56Zby Carroll, John Millar, 1950-<br/>Author Carroll, John Millar, 1950-<br/>Format: Books<br/>Call Number QA76.9. D3 D37 1976 f<br/>Publisher Q.E.D. Information Sciences,<br/>Publication Date 1976<br/>ISBN 9780894350023<br/>Security procedures for computer systemsent://SD_ILS/0/SD_ILS:2466552024-05-07T12:48:56Z2024-05-07T12:48:56Zby Hemphill, Charles F.<br/>Author Hemphill, Charles F., Hemphill, John M.<br/>Format: Books<br/>Call Number HF5548.2.H44 1973<br/>Publisher Dow-Jones-Irwin,<br/>Publication Date 1973<br/>ISBN 9780870940583<br/>Computer security in an educational environmentent://SD_ILS/0/SD_ILS:2730482024-05-07T12:48:56Z2024-05-07T12:48:56Zby Summers, Wayne C.<br/>Author Summers, Wayne C., Institut Teknologi Malaysia. Pusat Pendidikan Persediaan<br/>Format: Books<br/>Call Number MAK 9456<br/>Computer Security : A Hands-on Approachent://SD_ILS/0/SD_ILS:8796062024-05-07T12:48:56Z2024-05-07T12:48:56Zby Du, Wenliang, author<br/>Author Du, Wenliang, author<br/>Format: Books<br/>Call Number QA76.9.A25 D89 2017<br/>ISBN 9781548367947<br/>Management handbook of computer securityent://SD_ILS/0/SD_ILS:3783082024-05-07T12:48:56Z2024-05-07T12:48:56ZFormat: Books<br/>Call Number HF5548.2 .W36 1978 f<br/>Systems security : the key to computer integrityent://SD_ILS/0/SD_ILS:2622992024-05-07T12:48:56Z2024-05-07T12:48:56Zby European Computer Systems Security Forum (1984)<br/>Author European Computer Systems Security Forum (1984)<br/>Format: Books<br/>Call Number HF5548.2.E97 1984<br/>Publisher Online,<br/>Publication Date 1984<br/>ISBN 9780863530180<br/>ISSUES IN COMPUTER SECURITY & NETWORKING. PART 2ent://SD_ILS/0/SD_ILS:8641122024-05-07T12:48:56Z2024-05-07T12:48:56Zby Mazleena Salleh, editor<br/>Author Mazleena Salleh, editor, Hassan Chizari, 1975-, editor, Abdul Hanan Abdullah, contributor, Behnam Dezfouli, 1982-, contributor, Kamalrulnizam Abu Bakar, contributor<br/>Format: Books<br/>Call Number QA76.9.A25 I877 2015 a<br/>Publication Date 2015<br/>ISBN 9789835209543<br/>Computer security in the age of informationent://SD_ILS/0/SD_ILS:2662192024-05-07T12:48:56Z2024-05-07T12:48:56Zby IFIP International Conference on Computer Security (5th : 1988 : Gold Coast, Queensland)<br/>Author IFIP International Conference on Computer Security (5th : 1988 : Gold Coast, Queensland), Caelli, William, International Federation for Information Processing<br/>Format: Books<br/>Call Number QA76.9.A25 I35 1988<br/>Publisher North-Holland,<br/>Publication Date 1989<br/>ISBN 9780444883247<br/>Where next for computer security? : a reportent://SD_ILS/0/SD_ILS:2443622024-05-07T12:48:56Z2024-05-07T12:48:56Zby National Computing Centre Limited National Study of Group on the Security of Computer-based Systems<br/>Author National Computing Centre Limited National Study of Group on the Security of Computer-based Systems<br/>Format: Books<br/>Call Number HF5548.2.N38 1974<br/>Publisher Manchester,<br/>Publication Date 1974<br/>ISBN 9780850121230<br/>Security of e-systems and computer networksent://SD_ILS/0/SD_ILS:2107662024-05-07T12:48:56Z2024-05-07T12:48:56Zby Obaidat, Mohammad S. (Mohammad Salameh), 1952-<br/>Author Obaidat, Mohammad S. (Mohammad Salameh), 1952-, Boudriga, Noureddine<br/>Format: Books<br/>Call Number TK5105.59 O22 2007<br/>Publisher Cambridge University Press,<br/>Publication Date 2007<br/>ISBN 9780521837644<br/>Computer security assurance using the common criteriaent://SD_ILS/0/SD_ILS:4511722024-05-07T12:48:56Z2024-05-07T12:48:56Zby Merkow, Mark S.<br/>Author Merkow, Mark S., Breithaupt, Jim<br/>Format: Books<br/>Call Number QA76.9.A25 M47 2004<br/>Publisher Thomson Delmar Learning,<br/>Publication Date 2005<br/>ISBN 9781401862657<br/>Principles of computer security : security and beyondent://SD_ILS/0/SD_ILS:4241192024-05-07T12:48:56Z2024-05-07T12:48:56Zby Conklin, Wm. Arthur<br/>Author Conklin, Wm. Arthur<br/>Format: Books<br/>Call Number QA76.9.A25 P74 2004<br/>Publisher McGraw-Hill,<br/>Publication Date 2004<br/>ISBN 9780072255096<br/>Computer security basics =Konpyūta sekyuriti no kisoent://SD_ILS/0/SD_ILS:8250542024-05-07T12:48:56Z2024-05-07T12:48:56Zby Russell, Deborah<br/>Author Russell, Deborah, Gangemi, Sr. G. T., Yamaguchi, Suguru<br/>Format: Books<br/>Call Number QA76.9.A25 R87 1994<br/>Publisher Asuki,<br/>Publication Date 1994<br/>ISBN 9784756102997<br/>Computer auditing, security and internal control manualent://SD_ILS/0/SD_ILS:4506502024-05-07T12:48:56Z2024-05-07T12:48:56Zby Kuong, Javier F.<br/>Author Kuong, Javier F.<br/>Format: Books<br/>Call Number QA76.9.A25 K86 1987<br/>Publisher Prentice-Hall,<br/>Publication Date 1987<br/>ISBN 9780131629677<br/>Modern methods for computer security and privacyent://SD_ILS/0/SD_ILS:4637312024-05-07T12:48:56Z2024-05-07T12:48:56Zby Hoffman, Lance J.<br/>Author Hoffman, Lance J.<br/>Format: Books<br/>Call Number QA76.9.A25 H63 1977<br/>Publisher Prentice-Hall,<br/>Publication Date 1977<br/>ISBN 9780135952078<br/>Security, accuracy, and privacy in computer systemsent://SD_ILS/0/SD_ILS:2466652024-05-07T12:48:56Z2024-05-07T12:48:56Zby Martin, James, 1933-<br/>Author Martin, James, 1933-<br/>Format: Books<br/>Call Number HF5548.2 .M34<br/>Publisher Prentice-Hall,<br/>Publication Date 1973<br/>ISBN 9780137989911<br/>Fourth Aerospace Computer Security Applications Conference : Orlando, Florida, December 12-16, 1988ent://SD_ILS/0/SD_ILS:2366272024-05-07T12:48:56Z2024-05-07T12:48:56Zby Aerospace Computer Security Applications Conference (4th : 1988 : Orlando, Fla.)<br/>Author Aerospace Computer Security Applications Conference (4th : 1988 : Orlando, Fla.)<br/>Format: Books<br/>Call Number QA76.9.A25 A39 1988<br/>Publisher Computer Society Press,<br/>Publication Date 1988<br/>ISBN 9780818608957<br/>Computer security : the practical issues in a troubled worldent://SD_ILS/0/SD_ILS:1801142024-05-07T12:48:56Z2024-05-07T12:48:56Zby IFIP International Coonference on Computer Security (3rd : 1985 : Dublin, Ireland)<br/>Author IFIP International Coonference on Computer Security (3rd : 1985 : Dublin, Ireland), Grimson, Jane B., Kugler, Hans Jurgen<br/>Format: Books<br/>Call Number QA76.5 I585 1985<br/>Publisher Elsevier Sc Pub,<br/>Publication Date 1985<br/>Computer and Cyber Security : Principles, Algorithm, Applications, and Perspectivesent://SD_ILS/0/SD_ILS:8823242024-05-07T12:48:56Z2024-05-07T12:48:56Zby Gupta, Brij, Dr., 1982-, editor<br/>Author Gupta, Brij, Dr., 1982-, editor, Agrawal, Dharma P., Dr., editor, Wang, Haoxiang, Dr., editor<br/>Format: Books<br/>Call Number QA76.9.A25 C668 2019<br/>Publication Date 2019<br/>ISBN 9780815371335<br/>Machine Learning for Computer and Cyber Security : Principles, Algorithms, and Practicesent://SD_ILS/0/SD_ILS:8822682024-05-07T12:48:56Z2024-05-07T12:48:56Zby Gupta, Brij, 1982-, editor<br/>Author Gupta, Brij, 1982-, editor, Sheng, Quan Z., editor<br/>Format: Books<br/>Call Number TK5105.5 M335 2019<br/>Publication Date 2019<br/>ISBN 9781138587304<br/>Introduction to computer and network security : navigating shades of grayent://SD_ILS/0/SD_ILS:8052892024-05-07T12:48:56Z2024-05-07T12:48:56Zby Brooks, Richard R.<br/>Author Brooks, Richard R.<br/>Format: Books<br/>Call Number QA76.9.A25 B76 2014<br/>Publisher Chapman and Hall/CRC,<br/>Publication Date 2014 2013<br/>ISBN 9781439860717<br/>Computer security literacy : staying safe in a digital worldent://SD_ILS/0/SD_ILS:8372152024-05-07T12:48:56Z2024-05-07T12:48:56Zby Jacobson, Douglas, author<br/>Author Jacobson, Douglas, author, Idziorek, Joseph, author<br/>Format: Books<br/>Call Number QA76.9.A25 J334 2013<br/>Publisher CRC Press / Taylor & Francis Group,<br/>Publication Date 2013<br/>ISBN 9781439856185<br/>Issues in computer security and networking : part 1ent://SD_ILS/0/SD_ILS:8113802024-05-07T12:48:56Z2024-05-07T12:48:56Zby Muhalim Mohamed Amin author<br/>Author Muhalim Mohamed Amin author, Subariah Ibrahim author, Hazinah Kutty Mammi author, Ku, Peter Soo Lin author, Nurul Badriah Abu Bakar author<br/>Format: Books<br/>Call Number QA76.9.A25 I87 2012 a<br/>Edition First edition<br/>Publisher Penerbit Universiti Teknologi Malaysia,<br/>Publication Date 2012<br/>ISBN 9789835209055<br/>Analyzing computer security : a threat/vulnerability/countermeasure approachent://SD_ILS/0/SD_ILS:7800022024-05-07T12:48:56Z2024-05-07T12:48:56Zby Pfleeger, Charles P., 1948-<br/>Author Pfleeger, Charles P., 1948-, Pfleeger, Shari Lawrence<br/>Format: Books<br/>Call Number QA76.9.A25 P45 2012<br/>Publisher Prentice Hall,<br/>Publication Date 2012<br/>ISBN 9780132789462<br/>Securing the cloud : cloud computer security techniques and tacticsent://SD_ILS/0/SD_ILS:7488172024-05-07T12:48:56Z2024-05-07T12:48:56Zby Winkler, J. R. (Joachim R.)<br/>Author Winkler, J. R. (Joachim R.)<br/>Format: Books<br/>Call Number QA76.585 W56 2011<br/>Publisher Elsevier,<br/>Publication Date 2011<br/>ISBN 9781597495929<br/>The Stuxnet Computer Worm and industrial control system securityent://SD_ILS/0/SD_ILS:7989462024-05-07T12:48:56Z2024-05-07T12:48:56Zby Rebane, Jackson C.<br/>Author Rebane, Jackson C.<br/>Format: Books<br/>Call Number TS156.8 S78 2011<br/>Publisher Nova Science Publisher’s, Inc.,<br/>Publication Date 2011<br/>ISBN 9781612099859<br/>Principles of computer security : CompTIA security+ and beyondent://SD_ILS/0/SD_ILS:6434452024-05-07T12:48:56Z2024-05-07T12:48:56Zby Conklin, Wm. Arthur (William Arthur)<br/>Author Conklin, Wm. Arthur (William Arthur)<br/>Format: Books<br/>Call Number QA76.3 P75 2010 f<br/>Edition 2nd ed.<br/>Publisher McGraw-Hill,<br/>Publication Date 2010<br/>ISBN 9780071633758<br/>Visualization for computer security : 5th International Workshop, VizSec 2008, Cambridge, MA, USA, September 15, 2008, Proceedingsent://SD_ILS/0/SD_ILS:2929442024-05-07T12:48:56Z2024-05-07T12:48:56Zby VizSec 2008 2008 : Cambridge, Mass.)<br/>Author VizSec 2008 2008 : Cambridge, Mass.), Goodall, John R., Conti, Greg, Ma, Kwan-liu<br/>Format: Books<br/>Call Number QA76.9.A25 V59 2008<br/>Publisher Springer,<br/>Publication Date 2008<br/>ISBN 9783540859314<br/>Hardware-based computer security : from biometrics to quantum cryptographyent://SD_ILS/0/SD_ILS:2900712024-05-07T12:48:56Z2024-05-07T12:48:56Zby Dube, Roger R.<br/>Author Dube, Roger R.<br/>Format: Books<br/>Call Number QA76.9.A25 D82 2008<br/>Publisher Wiley,<br/>Publication Date 2008<br/>ISBN 9780470193396<br/>Computer system security : basic concepts and solved exercisesent://SD_ILS/0/SD_ILS:3283722024-05-07T12:48:56Z2024-05-07T12:48:56Zby Avoine, Gildas<br/>Author Avoine, Gildas, Junod, Pascal, Oechslin, Philippe<br/>Format: Books<br/>Call Number QA76.9.A25 A96 2004<br/>Publisher EFPL Press,<br/>Publication Date 2007<br/>ISBN 9781420046205<br/>Biometrics, computer security systems and artificial intelligence applicationsent://SD_ILS/0/SD_ILS:1912802024-05-07T12:48:56Z2024-05-07T12:48:56Zby Saeed, Khalid<br/>Author Saeed, Khalid, Pejas, Jerzy, 1954-, Mosdorf, Romuald<br/>Format: Books<br/>Call Number QA76.9.A25 B56 2006<br/>Publisher Springer,<br/>Publication Date 2006<br/>ISBN 9780387362328<br/>Minoli-Cordovana's authoritative computer & network security dictionaryent://SD_ILS/0/SD_ILS:1379022024-05-07T12:48:56Z2024-05-07T12:48:56Zby Minoli, Daniel, 1952-<br/>Author Minoli, Daniel, 1952-, Cordovana, James, 1973-<br/>Format: Books<br/>Call Number QA76.9.A25 M565 2006<br/>Publisher Wiley-Interscience,<br/>Publication Date 2006<br/>ISBN 9780471782636<br/>Advances in information and computer security : first International Workshop on Security, IWSEC 2006, Kyoto, Japan, October 23-24, 2006 : proceedingsent://SD_ILS/0/SD_ILS:1422202024-05-07T12:48:56Z2024-05-07T12:48:56Zby International Workshop on Security (1st : 2006 : Kyoto, Japan)<br/>Author International Workshop on Security (1st : 2006 : Kyoto, Japan), Yoshiura, Hiroshi<br/>Format: Books<br/>Call Number QA76.9.A25 I575 2006<br/>Publisher Springer,<br/>Publication Date 2006<br/>ISBN 9783540476993<br/>Network control and engineering for QoS, security and mobility, V : IFIP 19th World Computer Congress, TC-6, 5th IFIP International Conference on Network Control and Engineering for QoS, Security and Mobility, August 20-25, 2006, Santiago, Chileent://SD_ILS/0/SD_ILS:1163862024-05-07T12:48:56Z2024-05-07T12:48:56Zby IFIP International Conference on Network Control and Engineering for QoS, Security, and Mobility (5th : 2006 : Santiago, Chile)<br/>Author IFIP International Conference on Network Control and Engineering for QoS, Security, and Mobility (5th : 2006 : Santiago, Chile), Gaiti, Dominique, IFIP World Computer Congress (19th : 2006 : Santiago, Chile)<br/>Format: Books<br/>Call Number TK5105.5 I34 2006<br/>Publisher Springer,<br/>Publication Date 2006<br/>ISBN 9780387348254<br/>Machine learning and data mining for computer security : methods and applicationsent://SD_ILS/0/SD_ILS:4705192024-05-07T12:48:56Z2024-05-07T12:48:56Zby Maloof , Marcus A.<br/>Author Maloof , Marcus A.<br/>Format: Books<br/>Call Number QA76.9.A25 M34 2006<br/>Publisher Springer,<br/>Publication Date 2006<br/>ISBN 9781846280290<br/>Defeating the hacker : a non-technical guide to computer securityent://SD_ILS/0/SD_ILS:2867832024-05-07T12:48:56Z2024-05-07T12:48:56Zby Schifreen, Robert<br/>Author Schifreen, Robert<br/>Format: Books<br/>Call Number QA76.9.A25 S335 2006<br/>Publisher John Wiley & Sons,<br/>Publication Date 2006<br/>ISBN 9780470025550<br/>Risk management for computer security : Protecting your network and information assetsent://SD_ILS/0/SD_ILS:1045702024-05-07T12:48:56Z2024-05-07T12:48:56Zby Jones, Andy, 1952-<br/>Author Jones, Andy, 1952-, Ashenden, Debi<br/>Format: Books<br/>Call Number T55 J66 2005<br/>Publisher Elsevier Butterworth-Heinemann,<br/>Publication Date 2005<br/>ISBN 9780750677950<br/>Real digital forensics : computer security and incident responseent://SD_ILS/0/SD_ILS:4704502024-05-07T12:48:56Z2024-05-07T12:48:56Zby Jones, Keith J. (Keith John)<br/>Author Jones, Keith J. (Keith John), Bejtlich, Richard, Rose, Curtis W.<br/>Format: Books<br/>Call Number HV8079.C65 J66 2005<br/>Publisher Addison-Wesley,<br/>Publication Date 2005<br/>ISBN 9780321240699<br/>Computer security : 20 things every employee should knowent://SD_ILS/0/SD_ILS:4671172024-05-07T12:48:56Z2024-05-07T12:48:56Zby Rothke, Ben<br/>Author Rothke, Ben<br/>Format: Books<br/>Call Number HF5548.37 R67 2005<br/>Edition 2nd ed.<br/>Publisher McGraw-Hill,<br/>Publication Date 2005<br/>ISBN 9780072262827<br/>Computer security : 20 things every employee should knowent://SD_ILS/0/SD_ILS:3632972024-05-07T12:48:56Z2024-05-07T12:48:56Zby Rothke, Ben<br/>Author Rothke, Ben<br/>Format: Books<br/>Call Number HF5548.37 R67 2004<br/>Publisher McGraw-Hill Osborne,<br/>Publication Date 2004<br/>ISBN 9780072230833<br/>Certification and security in e-services : from e-government to e-business : IFIP 17th World Computer Congress, TC11 stream on security in e-services, August 26-29, 2002, Montr�eal, Qu�ebec, Canadaent://SD_ILS/0/SD_ILS:3486792024-05-07T12:48:56Z2024-05-07T12:48:56Zby IFIP World Computer Congress (17th : 2002 : Montreal, Quebec)<br/>Author IFIP World Computer Congress (17th : 2002 : Montreal, Quebec), Nardelli, Enrico, Posadziejewski, Sabina, Talamo, Maurizio<br/>Format: Books<br/>Call Number QA76.9.A25 I36 2003<br/>Publisher Kluwer Academic Pubs,<br/>Publication Date 2003<br/>ISBN 9781402074936<br/>Commonsense computer security : your practical guide to information protectionent://SD_ILS/0/SD_ILS:3511832024-05-07T12:48:56Z2024-05-07T12:48:56Zby Smith, Martin<br/>Author Smith, Martin<br/>Format: Books<br/>Call Number QA76.9.A25 S64 1993<br/>Edition 2nd ed<br/>Publisher McGraw-Hill,<br/>Publication Date 1993<br/>ISBN 9780077078058<br/>Security for computer networks : an introduction to data security in teleprocessing and electronic funds transferent://SD_ILS/0/SD_ILS:1149892024-05-07T12:48:56Z2024-05-07T12:48:56Zby Davies, D. W.<br/>Author Davies, D. W., Price, W. L.<br/>Format: Books<br/>Call Number TK5105 D35 1989<br/>Edition 2nd ed.<br/>Publisher John Wiley & Sons,<br/>Publication Date 1989<br/>ISBN 9780471921370<br/>Computer and communications security : strategies for the 1990sent://SD_ILS/0/SD_ILS:4546272024-05-07T12:48:56Z2024-05-07T12:48:56Zby Cooper, James Arlin<br/>Author Cooper, James Arlin<br/>Format: Books<br/>Call Number QA76.9.A25 C67 1989<br/>Publisher McGraw-Hill,<br/>Publication Date 1989<br/>ISBN 9780070129269<br/>Auditing computer security : a manual with case studiesent://SD_ILS/0/SD_ILS:1048612024-05-07T12:48:56Z2024-05-07T12:48:56Zby Vallabhaneni, S. Rao<br/>Author Vallabhaneni, S. Rao<br/>Format: Books<br/>Call Number QA76.9.A25 V35 1989 f<br/>Publisher Wiley,<br/>Publication Date 1989<br/>ISBN 9780471626046<br/>Foiling the systems breakers : computer security and access controlent://SD_ILS/0/SD_ILS:4603882024-05-07T12:48:56Z2024-05-07T12:48:56Zby Lobel, Jerome<br/>Author Lobel, Jerome<br/>Format: Books<br/>Call Number QA76.9.A25 L62 1986<br/>Publisher McGraw-Hill,<br/>Publication Date 1986<br/>ISBN 9780070383579<br/>Security for computer networks : an introduction to data security in teleprocessing and electronic funds transferent://SD_ILS/0/SD_ILS:1380112024-05-07T12:48:56Z2024-05-07T12:48:56Zby Davies, D. W.<br/>Author Davies, D. W., Price, W. L.<br/>Format: Books<br/>Call Number TK5105 D35 1984<br/>Publisher John Wiley,<br/>Publication Date 1984<br/>ISBN 9780471900634<br/>Computer security management : a framework for effective management involvementent://SD_ILS/0/SD_ILS:4628932024-05-07T12:48:56Z2024-05-07T12:48:56Zby Solms, R. Von<br/>Author Solms, R. Von, Eloff, J. H. P., Solms, S. H. Von<br/>Format: Books<br/>Call Number MAK 10032<br/>Computer security : computer crime is a threat to be recognized by everyoneent://SD_ILS/0/SD_ILS:3905932024-05-07T12:48:56Z2024-05-07T12:48:56Zby Mohd. Daud Kasmuni<br/>Author Mohd. Daud Kasmuni, Seminar on EDP Audit and Controls a Better Realization of EDP Audit and Controls in Malaysia (1992 : Kuala Lumpur)<br/>Format: Books<br/>Call Number MAK 11739 a<br/>Cryptography : a new dimension in computer data security : a guide for the design and implementation of secure systemsent://SD_ILS/0/SD_ILS:3420982024-05-07T12:48:56Z2024-05-07T12:48:56Zby Meyer, Carl H.<br/>Author Meyer, Carl H., Matyas, Stephen M.<br/>Format: Books<br/>Call Number Z103.M49 1982<br/>ISBN 9780471048923<br/>Security, Privacy and Reliability in Computer Communications and Networksent://SD_ILS/0/SD_ILS:8669672024-05-07T12:48:56Z2024-05-07T12:48:56Zby Sha, Kewei<br/>Author Sha, Kewei, Striegel, Aaron, Song, Min<br/>Format: Books<br/>Call Number TK5105.59 S43 2017<br/>ISBN 9788793379893<br/>Security and the 1984 data protection : guidance for computer usersent://SD_ILS/0/SD_ILS:1654142024-05-07T12:48:56Z2024-05-07T12:48:56ZFormat: Books<br/>Call Number KD1957.C65 S42 1987<br/>Publisher National Computing Centre,<br/>Publication Date 1987<br/>ISBN 9780850126952<br/>European Computer Systems Security: the key to computer integrityent://SD_ILS/0/SD_ILS:2295182024-05-07T12:48:56Z2024-05-07T12:48:56ZFormat: Books<br/>Call Number HF5548.2 .E97 1984 f<br/>Publisher Online,<br/>Publication Date 1984<br/>ISBN 9780863530180<br/>Commonsense computer security : your practical guide to preventing accidental and deliberate electronic data lossent://SD_ILS/0/SD_ILS:4614542024-05-07T12:48:56Z2024-05-07T12:48:56ZFormat: Books<br/>Call Number QA76.9.A25 S44 1989<br/>Privacy protection and computer forensicsent://SD_ILS/0/SD_ILS:4203022024-05-07T12:48:56Z2024-05-07T12:48:56Zby Caloyannides, Michael A.<br/>Author Caloyannides, Michael A.<br/>Format: Books<br/>Call Number QA76.9.A25 C345 2004<br/>Edition 2nd ed.<br/>Publisher Artech House,<br/>Publication Date 2004<br/>ISBN 9781580538305<br/>Implementing electronic card payment systemsent://SD_ILS/0/SD_ILS:3401472024-05-07T12:48:56Z2024-05-07T12:48:56Zby Radu, Cristian<br/>Author Radu, Cristian<br/>Format: Books<br/>Call Number HG1710 R33 2003<br/>Publisher Artech House,<br/>Publication Date 2003<br/>ISBN 9781580533058<br/>Role-based access controlent://SD_ILS/0/SD_ILS:3401532024-05-07T12:48:56Z2024-05-07T12:48:56Zby Ferraiolo, David F.<br/>Author Ferraiolo, David F., Kuhn, D. Richard, Chandramouli, Ramaswamy<br/>Format: Books<br/>Call Number QA76.9.A25 F47 2003<br/>Publisher Artech House,<br/>Publication Date 2003<br/>ISBN 9781580533706<br/>Firewall design and analysis /cAlex X. Liuent://SD_ILS/0/SD_ILS:7640642024-05-07T12:48:56Z2024-05-07T12:48:56Zby Liu, Alex X.<br/>Author Liu, Alex X.<br/>Format: Books<br/>Call Number TK5105.59 L57 2011<br/>Publisher World Scientific,<br/>Publication Date 2010<br/>ISBN 9789814261654<br/>Trust and security in collaborative computingent://SD_ILS/0/SD_ILS:2321872024-05-07T12:48:56Z2024-05-07T12:48:56Zby Zou, Xukai, 1963-<br/>Author Zou, Xukai, 1963-, Dai, Yuan-Shun, Pan, Yi, 1960-<br/>Format: Books<br/>Call Number QA76.9.A25 Z68 2008<br/>Publisher World Scientific,<br/>Publication Date 2008<br/>ISBN 9789812703682<br/>Securing information and communications systems : principles, technologies, and applicationsent://SD_ILS/0/SD_ILS:2637952024-05-07T12:48:56Z2024-05-07T12:48:56Zby Furnell, Steven M.<br/>Author Furnell, Steven M.<br/>Format: Books<br/>Call Number QA76.9.A25 S4244 2008<br/>Publisher Artech House Publishers,<br/>Publication Date 2008<br/>ISBN 9781596932289<br/>User's guide to cryptography and standardsent://SD_ILS/0/SD_ILS:4180342024-05-07T12:48:56Z2024-05-07T12:48:56Zby Dent, Alexander W.<br/>Author Dent, Alexander W., Mitchell, Chris J.<br/>Format: Books<br/>Call Number QA76.9.A25 D464 2005<br/>Publisher Artech House,<br/>Publication Date 2005<br/>ISBN 9781580535304<br/>Defense and detection strategies against Internet wormsent://SD_ILS/0/SD_ILS:4178392024-05-07T12:48:56Z2024-05-07T12:48:56Zby Nazario, Jose<br/>Author Nazario, Jose<br/>Format: Books<br/>Call Number QA76.9.A25 N394 2004<br/>Publisher Artech House,<br/>Publication Date 2004<br/>ISBN 9781580535373<br/>Implementing security for ATM networksent://SD_ILS/0/SD_ILS:3124532024-05-07T12:48:56Z2024-05-07T12:48:56Zby Tarman, Thomas D.<br/>Author Tarman, Thomas D., Witzke, Edward L.<br/>Format: Books<br/>Call Number TK5105.59 T37 2002<br/>Publisher Artech House,<br/>Publication Date 2002<br/>ISBN 9781580532938<br/>Security in wireless LANs and MANsent://SD_ILS/0/SD_ILS:4705552024-05-07T12:48:56Z2024-05-07T12:48:56Zby Hardjono, Thomas<br/>Author Hardjono, Thomas, Dondeti, Lakshminath R.<br/>Format: Books<br/>Call Number TK5103.2 H374 2005<br/>Publisher Artech House,<br/>Publication Date 2005<br/>ISBN 9781580537551<br/>Contemporary cryptographyent://SD_ILS/0/SD_ILS:4542992024-05-07T12:48:56Z2024-05-07T12:48:56Zby Oppliger, Rolf<br/>Author Oppliger, Rolf<br/>Format: Books<br/>Call Number Z103 O66 2005<br/>Publisher Artech House,<br/>Publication Date 2005<br/>ISBN 9781580536424<br/>The German enigma cipher machine : beginnings, success, and ultimate failureent://SD_ILS/0/SD_ILS:1412252024-05-07T12:48:56Z2024-05-07T12:48:56Zby Winkel, Brian J.<br/>Author Winkel, Brian J.<br/>Format: Books<br/>Call Number D810.C88 G47 2005<br/>Publisher Artech House,<br/>Publication Date 2005<br/>ISBN 9781580539968<br/>Bluetooth securityent://SD_ILS/0/SD_ILS:4192762024-05-07T12:48:56Z2024-05-07T12:48:56Zby Gehrmann, Christian<br/>Author Gehrmann, Christian, Persson, Joakim, Smeets, Ben<br/>Format: Books<br/>Call Number TK5103.3 G43 2004<br/>Publisher Artech House,<br/>Publication Date 2004<br/>ISBN 9781580535045<br/>Developing secure distributed systems with CORBAent://SD_ILS/0/SD_ILS:3174752024-05-07T12:48:56Z2024-05-07T12:48:56Zby Lang, Ulrich<br/>Author Lang, Ulrich, Schreiner, Rudolf<br/>Format: Books<br/>Call Number QA76.9.A73 L36 2002<br/>Publisher Artech House,<br/>Publication Date 2002<br/>ISBN 9781580532952<br/>Java card for e-payment applicationsent://SD_ILS/0/SD_ILS:3175572024-05-07T12:48:56Z2024-05-07T12:48:56Zby Hassler, Vesna<br/>Author Hassler, Vesna<br/>Format: Books<br/>Call Number QA76.73.J38 J37 2002<br/>Publisher Artech House,<br/>Publication Date 2002<br/>ISBN 9781580532914<br/>Non-repudiation in electronic commerceent://SD_ILS/0/SD_ILS:3170732024-05-07T12:48:56Z2024-05-07T12:48:56Zby Zhou, Jianying<br/>Author Zhou, Jianying<br/>Format: Books<br/>Call Number HF5548.32 Z49 2001<br/>Publisher Artech House,<br/>Publication Date 2001<br/>ISBN 9781580532471<br/>Electronic payment systems for e-commerceent://SD_ILS/0/SD_ILS:3174712024-05-07T12:48:56Z2024-05-07T12:48:56Zby O'Mahony, Donal, 1961-<br/>Author O'Mahony, Donal, 1961-, Peirce, M. A. (Michael A.)<br/>Format: Books<br/>Call Number HG1710 O45 2001<br/>Edition 2nd ed.<br/>Publisher Artech House,<br/>Publication Date 2001<br/>ISBN 9781580532686<br/>Demystifying the IPsec puzzleent://SD_ILS/0/SD_ILS:3174772024-05-07T12:48:56Z2024-05-07T12:48:56Zby Frankel, Sheila<br/>Author Frankel, Sheila<br/>Format: Books<br/>Call Number TK5105.567 F73 2001<br/>Publisher Artech House,<br/>Publication Date 2001<br/>ISBN 9781580530798<br/>Protecting intellectual property in spaceent://SD_ILS/0/SD_ILS:3330382024-05-07T12:48:56Z2024-05-07T12:48:56Zby Aerospace Computer Security Conference (1985 : McLean, Virginia)<br/>Author Aerospace Computer Security Conference (1985 : McLean, Virginia)<br/>Format: Books<br/>Call Number QA76 A37 1985<br/>Publisher IEEE Computer Society,<br/>Publication Date 1985<br/>ISBN 9780818606267<br/>Security and protection in information systement://SD_ILS/0/SD_ILS:4546232024-05-07T12:48:56Z2024-05-07T12:48:56Zby IFIP TC 11 International Conference on Computer Security (4th : 1986 : Monte Carlo, Monaco)<br/>Author IFIP TC 11 International Conference on Computer Security (4th : 1986 : Monte Carlo, Monaco), Grissonnanche, Andre<br/>Format: Books<br/>Call Number QA76.9.A25 I34 1986<br/>Publisher North-Holland,<br/>Publication Date 1989<br/>ISBN 9780444873453<br/>The need for securityent://SD_ILS/0/SD_ILS:1041142024-05-07T12:48:56Z2024-05-07T12:48:56Zby The Housley Computer Network Security Seminar (1987 : Melbourne)<br/>Author The Housley Computer Network Security Seminar (1987 : Melbourne), Davies, D. W.<br/>Format: Books<br/>Call Number QA76.9.A25 H68 1987 f<br/>Proceedings of a symposium on trends and applicationsent://SD_ILS/0/SD_ILS:3489122024-05-07T12:48:56Z2024-05-07T12:48:56Zby Symposium on Trends and Applications (1976-)<br/>Author Symposium on Trends and Applications (1976-), Institute of Electrical and Electronics Engineers. Computer Society<br/>Format: Books<br/>Call Number TK7885.A1 S98 1976 f<br/>Publisher IEEE,<br/>Publication Date 2020 2019 2018 2017 2016<br/>Cybersecurity Analyticsent://SD_ILS/0/SD_ILS:8872462024-05-07T12:48:56Z2024-05-07T12:48:56Zby Verma, Rakesh M., author<br/>Author Verma, Rakesh M., author, Marchette, David J., author<br/>Format: Books<br/>Call Number QA76.9.A25 V47 2020<br/>Publication Date 2020<br/>ISBN 9780367346010<br/>CYBER INFLUENCE AND COGNITIVE THREATSent://SD_ILS/0/SD_ILS:8879352024-05-07T12:48:56Z2024-05-07T12:48:56Zby Benson, Vladlena, editor<br/>Author Benson, Vladlena, editor, McAlaney, John, editor<br/>Format: Books<br/>Call Number QA76.9.A25 C933 2020<br/>Publication Date 2020<br/>ISBN 9780128192047<br/>Digital Image Watermarking : Theoretical and Computational Advancesent://SD_ILS/0/SD_ILS:8821972024-05-07T12:48:56Z2024-05-07T12:48:56Zby Borra, Surekha, author<br/>Author Borra, Surekha, author, Thanki, Rohit, author, Dey, Nilanjan, 1984-, author<br/>Format: Books<br/>Call Number QA76.9.A25 B673 2019<br/>Publication Date 2019<br/>ISBN 9781138390638<br/>Security in IoT-Enabled Spaceent://SD_ILS/0/SD_ILS:8822842024-05-07T12:48:56Z2024-05-07T12:48:56Zby Al-Turjman, Fadi, author<br/>Author Al-Turjman, Fadi, author<br/>Format: Books<br/>Call Number TK5105.8857 A48 2019<br/>Publication Date 2019<br/>ISBN 9780367111236<br/>Advances of DNA computing in cryptographyent://SD_ILS/0/SD_ILS:8823842024-05-07T12:48:56Z2024-05-07T12:48:56Zby Namasudra, Suyel, editor<br/>Author Namasudra, Suyel, editor, Deka, Ganesh Chandra, 1969- editor<br/>Format: Books<br/>Call Number QA76.9 .A25 A378 2019<br/>Publication Date 2019<br/>ISBN 9780815385325<br/>AWS Certified Cloud Practitioner Study Guide : CLF-C01 Exament://SD_ILS/0/SD_ILS:8871222024-05-07T12:48:56Z2024-05-07T12:48:56Zby Piper, Ben, author<br/>Author Piper, Ben, author, Clinton, David, author<br/>Format: Books<br/>Call Number QA76.3 P57 2019<br/>Publication Date 2019<br/>ISBN 9781119490708<br/>CRYPTOLOGY : Classical and Modernent://SD_ILS/0/SD_ILS:8823292024-05-07T12:48:56Z2024-05-07T12:48:56Zby Klima, Richard E., author<br/>Author Klima, Richard E., author, Sigmon, Neil, author<br/>Format: Books<br/>Call Number TK5102.94 K55 2019<br/>Edition Second Edition<br/>Publication Date 2019<br/>ISBN 9781138047624<br/>GUIDE TO COMPUTER FORENSICS AND INVESTIGATIONSent://SD_ILS/0/SD_ILS:8881522024-05-07T12:48:56Z2024-05-07T12:48:56Zby Nelson, Bill, author<br/>Author Nelson, Bill, author, Phillips, Amelia, author, Steuart, Christopher, author<br/>Format: Books<br/>Call Number QA76.9.A25 G84 2019<br/>Edition Sixth edition<br/>Publication Date 2019<br/>ISBN 9781337568944<br/>CompTIA security+ guide to network security fundamentalsent://SD_ILS/0/SD_ILS:8732292024-05-07T12:48:56Z2024-05-07T12:48:56Zby Ciampa, Mark D., author<br/>Author Ciampa, Mark D., author<br/>Format: Books<br/>Call Number TK5105.59 C574 2018<br/>Edition Sixth edition<br/>Publication Date 2018<br/>ISBN 9781337288781<br/>Security and Privacy in Cyber-Physical Systems : Foundations, Principles, and Applicationsent://SD_ILS/0/SD_ILS:8732412024-05-07T12:48:56Z2024-05-07T12:48:56Zby Song, Houbing, editor<br/>Author Song, Houbing, editor, Fink, Glenn A., editor, Jeschke, Sabina, editor<br/>Format: Books<br/>Call Number TK5105.59 S434 2018<br/>Edition First edition<br/>Publication Date 2018<br/>ISBN 9781119226048<br/>CYBERSECURITY ESSENTIALSent://SD_ILS/0/SD_ILS:8823362024-05-07T12:48:56Z2024-05-07T12:48:56Zby Brooks, Charles J., author<br/>Author Brooks, Charles J., author, Grow, Christophe, author, Craig, Philip, author, Short, Donald, author<br/>Format: Books<br/>Call Number TK5105.59 B76 2018<br/>Publication Date 2018<br/>ISBN 9781119362395<br/>Digital Forensics and Investigations : People, Processes, and Technologies to Defend the Enterpriseent://SD_ILS/0/SD_ILS:8872562024-05-07T12:48:56Z2024-05-07T12:48:56Zby Sachowski, Jason, author<br/>Author Sachowski, Jason, author<br/>Format: Books<br/>Call Number HV8079.C65 S23 2018<br/>Publication Date 2018<br/>ISBN 9781138720930<br/>Advanced Persistent Security : A Cyberwarfare Approach to Implementing Adaptive Enterprise Protection, Detection, and Reaction Strategiesent://SD_ILS/0/SD_ILS:8732362024-05-07T12:48:56Z2024-05-07T12:48:56Zby Winkler, Ira, author<br/>Author Winkler, Ira, author, Gomes, Araceli Treu, author, Shackleford, Dave, editor<br/>Format: Books<br/>Call Number TK5105.59 W56 2017<br/>Publication Date 2017<br/>ISBN 9780128093160<br/>Advanced Penetration Testing : Hacking the World's Most Secure Networksent://SD_ILS/0/SD_ILS:8732382024-05-07T12:48:56Z2024-05-07T12:48:56Zby Allsopp, Wil, author<br/>Author Allsopp, Wil, author<br/>Format: Books<br/>Call Number QA76.9.A25 A4544 2017<br/>Publication Date 2017<br/>ISBN 9781119367680<br/>Privacy and Security Policies in Big Dataent://SD_ILS/0/SD_ILS:8667302024-05-07T12:48:56Z2024-05-07T12:48:56Zby Tamane, Sharvari, 1973-, editor<br/>Author Tamane, Sharvari, 1973-, editor, Solanki, Vijender Kumar, 1980-, editor, Dey, Nilanjan, 1984-, editor<br/>Format: Books<br/>Call Number QA76.9.B45 P75 2017 f<br/>Publisher IGI Global, Information Science Reference,<br/>Publication Date 2017<br/>ISBN 9781522524861<br/>Network Forensicsent://SD_ILS/0/SD_ILS:8731732024-05-07T12:48:56Z2024-05-07T12:48:56Zby Messier, Ric, author<br/>Author Messier, Ric, author<br/>Format: Books<br/>Call Number TK5105.59 M47 2017<br/>Publication Date 2017<br/>ISBN 9781119328285<br/>Discovering Computers 2017 : Tools, Apps, Devices, and the Impact of Technologyent://SD_ILS/0/SD_ILS:8861462024-05-07T12:48:56Z2024-05-07T12:48:56Zby Vermaat, Misty, author<br/>Author Vermaat, Misty, author, Sebok, Susan L., author, Freund, Steven M., author, Campbell, Jennifer T.,, author, Frydenberg, Mark (Mark E.), author<br/>Format: Books<br/>Call Number QA76.5 V47 2017 f<br/>Edition Enhanced edition<br/>Publication Date 2017<br/>ISBN 9781305657458<br/>CYBER-RISK INFORMATICS : Engineering Evaluation with Data Scienceent://SD_ILS/0/SD_ILS:8667932024-05-07T12:48:56Z2024-05-07T12:48:56Zby Sahinoglu, Mehmet, 1951-, author<br/>Author Sahinoglu, Mehmet, 1951-, author<br/>Format: Books<br/>Call Number QA76.9.A25 S246 2016<br/>Publication Date 2016<br/>ISBN 9781119087519<br/>Secure development for mobile apps : how to design and code secure mobile applications with PHP and javascriptent://SD_ILS/0/SD_ILS:8225122024-05-07T12:48:56Z2024-05-07T12:48:56Zby Glaser, J. D.<br/>Author Glaser, J. D.<br/>Format: Books<br/>Call Number QA76.9.A25 G535 2015<br/>Publisher CRC Press, Taylor & Francis Group, CRC Press is an imprint of the Taylor & Francis Group, an informa business,<br/>Publication Date 2015<br/>ISBN 9781482209037<br/>Cybersecurity : engineering a secure information technology organizationent://SD_ILS/0/SD_ILS:8282762024-05-07T12:48:56Z2024-05-07T12:48:56Zby Shoemaker, Dan<br/>Author Shoemaker, Dan, Sigler, Kenneth, author<br/>Format: Books<br/>Call Number QA76.9.A25 S49 2015 f<br/>Publisher Cengage Learning,<br/>Publication Date 2015<br/>ISBN 9781285169903<br/>Computing security & cryptography handbookent://SD_ILS/0/SD_ILS:8347472024-05-07T12:48:56Z2024-05-07T12:48:56Zby Mason, Stephen<br/>Author Mason, Stephen<br/>Format: Books<br/>Call Number QA76.9.A25 C667 2015<br/>Publisher Clanrye International,<br/>Publication Date 2015<br/>ISBN 9781632401137<br/>Biometric technology : authentication, biocryptography, and cloud-based architectureent://SD_ILS/0/SD_ILS:8348782024-05-07T12:48:56Z2024-05-07T12:48:56Zby Das, Ravindra, author<br/>Author Das, Ravindra, author<br/>Format: Books<br/>Call Number TK7882.B56 D37 2015<br/>Publisher CRC Press/Taylor & Francis,<br/>Publication Date 2015<br/>ISBN 9781466592452<br/>Applications of cryptography and network securityent://SD_ILS/0/SD_ILS:8369342024-05-07T12:48:56Z2024-05-07T12:48:56Zby Mason, Stephen<br/>Author Mason, Stephen<br/>Format: Books<br/>Call Number TK5102.94 A675 2015<br/>Publisher Clanrye Intl.,<br/>Publication Date 2015<br/>ISBN 9781632400659<br/>Ethical hacking and penetration testing guideent://SD_ILS/0/SD_ILS:8372182024-05-07T12:48:56Z2024-05-07T12:48:56Zby Baloch, Rafay<br/>Author Baloch, Rafay<br/>Format: Books<br/>Call Number QA76.9.A25 B35 2015<br/>Publisher CRC Press, Taylor & Francis Group,<br/>Publication Date 2015<br/>ISBN 9781482231618<br/>Legal issues in information securityent://SD_ILS/0/SD_ILS:8391302024-05-07T12:48:56Z2024-05-07T12:48:56Zby Grama, Joanna Lyn<br/>Author Grama, Joanna Lyn<br/>Format: Books<br/>Call Number KF1263.C65 G73 2015<br/>Edition 2nd ed.<br/>Publisher Jones & Bartlett Learning,<br/>Publication Date 2015<br/>ISBN 9781284054743<br/>Industrial network security : securing critical infrastructure networks for smart grid, SCADA, and other industrial control systemsent://SD_ILS/0/SD_ILS:8410372024-05-07T12:48:56Z2024-05-07T12:48:56Zby Knapp, Eric D.<br/>Author Knapp, Eric D., Langill, Joel Thomas<br/>Format: Books<br/>Call Number TS156.8 K53 2015<br/>Edition 2nd ed.<br/>Publisher Syngress ,<br/>Publication Date 2015<br/>ISBN 9780124201149<br/>Information hiding in speech signals for secure communicationent://SD_ILS/0/SD_ILS:8410382024-05-07T12:48:56Z2024-05-07T12:48:56Zby Wu, Zhijun<br/>Author Wu, Zhijun<br/>Format: Books<br/>Call Number TK7882.S65 W8 2015<br/>Publisher Syngress ,<br/>Publication Date 2015<br/>ISBN 9780128013281<br/>CHFI computer hacking forensic investigator : exam guideent://SD_ILS/0/SD_ILS:8431592024-05-07T12:48:56Z2024-05-07T12:48:56Zby Brooks, Charles L.<br/>Author Brooks, Charles L.<br/>Format: Books<br/>Call Number QA76.9.A25 B766 2015<br/>Publisher McGraw-Hill Education ,<br/>Publication Date 2015<br/>ISBN 9780071831567<br/>Pervasive Computing and Communications. Part II : QOS & SECURITYent://SD_ILS/0/SD_ILS:8647142024-05-07T12:48:56Z2024-05-07T12:48:56Zby Yahaya Coulibaly, editor<br/>Author Yahaya Coulibaly, editor, Mohammad Abdur Razzaque, editor, Adekemi Adedokun, contributor, Chong, Yuh Chwen, contributor, Fauziah Abdul Razak, contributor<br/>Format: Books<br/>Call Number QA76.9.A25 P473 2015 a<br/>Edition First Edition 2015<br/>Publication Date 2015<br/>ISBN 9789835210501<br/>SECURITY IN COMPUTING & NETWORKING. PART IIent://SD_ILS/0/SD_ILS:8658392024-05-07T12:48:56Z2024-05-07T12:48:56Zby Hassan Chizari, 1975-, editor<br/>Author Hassan Chizari, 1975-, editor, Hazinah Kutty Mammi, editor, Hassan Chizari, 1975-, contributor, Mahnoush Babaeizadeh, 1988-, contributor, Majid Bakhtiari, 1961-, contributor<br/>Format: Books<br/>Call Number QA76.9.A25 S439 2015 a<br/>Edition First Edition 2015<br/>Publication Date 2015<br/>ISBN 9789835211515<br/>Protocols and procedures of cryptography and network securityent://SD_ILS/0/SD_ILS:8351562024-05-07T12:48:56Z2024-05-07T12:48:56Zby Mason, Stephen<br/>Author Mason, Stephen<br/>Format: Books<br/>Call Number TK5105.59 P768 2015<br/>Publisher Clanrye International,<br/>Publication Date 2015<br/>ISBN 9781632404237<br/>Introduction to modern cryptographyent://SD_ILS/0/SD_ILS:8358552024-05-07T12:48:56Z2024-05-07T12:48:56Zby Katz, Jonathan, 1974- author<br/>Author Katz, Jonathan, 1974- author, Lindell, Yehuda, author<br/>Format: Books<br/>Call Number QA76.9.A25 K38 2015<br/>Edition Second edition<br/>Publisher CRC Press/Taylor & Francis,<br/>Publication Date 2015<br/>ISBN 9781466570269<br/>Web security : a WhiteHat perspectiveent://SD_ILS/0/SD_ILS:8358692024-05-07T12:48:56Z2024-05-07T12:48:56Zby Hanqing, Wu, author<br/>Author Hanqing, Wu, author, Zhao, Liz, author<br/>Format: Books<br/>Call Number TK5105.59 H363 2015<br/>Publisher CRC Press is an imprint of Taylor & Francis ; Publishing House of Electronics Industry,<br/>Publication Date 2015<br/>ISBN 9781466592612<br/>Case studies in secure computing : achievements and trendsent://SD_ILS/0/SD_ILS:8358812024-05-07T12:48:56Z2024-05-07T12:48:56Zby Issac, Biju, editor<br/>Author Issac, Biju, editor, Israr, Nauman, editor<br/>Format: Books<br/>Call Number QA76.9.A25 C375 2015<br/>Publisher Taylor & Francis, CRC Press,<br/>Publication Date 2015<br/>ISBN 9781482207064<br/>Information security : principles and new conceptsent://SD_ILS/0/SD_ILS:8370582024-05-07T12:48:56Z2024-05-07T12:48:56Zby Hobbs, Fiona, editor<br/>Author Hobbs, Fiona, editor<br/>Format: Books<br/>Call Number QA76.9.A25 I549 2015 f v.1<br/>Publisher Clanrye Intl.,<br/>Publication Date 2015<br/>ISBN 9781632403063 9781632403070 9781632403087 9781632403094<br/>Integrated researh in steganographyent://SD_ILS/0/SD_ILS:8371022024-05-07T12:48:56Z2024-05-07T12:48:56Zby Coon, Audrey, editor<br/>Author Coon, Audrey, editor<br/>Format: Books<br/>Call Number TK5102.94 I58 2015<br/>Publisher Clanrye Intl.,<br/>Publication Date 2015<br/>ISBN 9781632403131<br/>Hardware security : design, threats, and safeguardsent://SD_ILS/0/SD_ILS:8372192024-05-07T12:48:56Z2024-05-07T12:48:56Zby Mukhopadhyay, Debdeep, author<br/>Author Mukhopadhyay, Debdeep, author, Chakraborty, Rajat Subhra, author<br/>Format: Books<br/>Call Number QA76.9.A25 M85 2015<br/>Publisher CRC Press,<br/>Publication Date 2015<br/>ISBN 9781439895832<br/>CSA guide to cloud computing : implementing cloud privacy and securityent://SD_ILS/0/SD_ILS:8383622024-05-07T12:48:56Z2024-05-07T12:48:56Zby Samani, Raj author<br/>Author Samani, Raj author, Honan, Brian author, Reavis, Jim author, Jirasek, Vladimir author, CSA (Organization)<br/>Format: Books<br/>Call Number QA76.585 S26 2015<br/>Publisher Elsevier/Syngress, an imprint of Elsevier,<br/>Publication Date 2015<br/>ISBN 9780124201255<br/>Designing and building security operations centerent://SD_ILS/0/SD_ILS:8383652024-05-07T12:48:56Z2024-05-07T12:48:56Zby Nathans, David<br/>Author Nathans, David<br/>Format: Books<br/>Call Number HV8290 N38 2015<br/>Publisher Syngress ,<br/>Publication Date 2015<br/>ISBN 9780128008997<br/>Information security analytics : finding security insights, patterns, and anomalies in big dataent://SD_ILS/0/SD_ILS:8383662024-05-07T12:48:56Z2024-05-07T12:48:56Zby Talabis, Mark, author<br/>Author Talabis, Mark, author, McPherson, Robert, author, Miyamoto, I., author, Martin, Jason L., author<br/>Format: Books<br/>Call Number QA76.9.A25 T355 2015<br/>Publisher Syngress,<br/>Publication Date 2015<br/>ISBN 9780128002070<br/>Computational network science : an algorithmic approachent://SD_ILS/0/SD_ILS:8383722024-05-07T12:48:56Z2024-05-07T12:48:56Zby Hexmoor, Henry, author<br/>Author Hexmoor, Henry, author<br/>Format: Books<br/>Call Number TK5105.59 H49 2015<br/>Publisher Morgan Kaufmann,<br/>Publication Date 2015<br/>ISBN 9780128008911<br/>Cyberwarfare : information operations in a connected worldent://SD_ILS/0/SD_ILS:8391262024-05-07T12:48:56Z2024-05-07T12:48:56Zby Chapple, Mike, author<br/>Author Chapple, Mike, author, Seidl, David, author<br/>Format: Books<br/>Call Number QA76.9.A25 C437 2015<br/>Publisher Jones & Bartlett Learning,<br/>Publication Date 2015<br/>ISBN 9781284058482<br/>Managing risk in information systemsent://SD_ILS/0/SD_ILS:8391282024-05-07T12:48:56Z2024-05-07T12:48:56Zby Gibson, Darril, author<br/>Author Gibson, Darril, author<br/>Format: Books<br/>Call Number QA76.9.A25 G53 2015<br/>Edition Second edition<br/>Publisher Jones & Bartlett Learning,<br/>Publication Date 2015<br/>ISBN 9781284055955<br/>Security policies and implementation issuesent://SD_ILS/0/SD_ILS:8391312024-05-07T12:48:56Z2024-05-07T12:48:56Zby Johnson, Robert, 1946- author<br/>Author Johnson, Robert, 1946- author<br/>Format: Books<br/>Call Number TK5105.59 J64 2015<br/>Publisher Jones & Bartlett Learning,<br/>Publication Date 2015<br/>ISBN 9781284055993<br/>SECURITY IN COMPUTING & NETWORKING. PART 1ent://SD_ILS/0/SD_ILS:8643802024-05-07T12:48:56Z2024-05-07T12:48:56Zby Hassan Chizari, 1975-, editor<br/>Author Hassan Chizari, 1975-, editor, Hazinah Kutty Mammi, editor, A. Ahmed Ibrahim Alkilary, contributor, Affandi Husain, contributor, Hassan Chizari, 1975-, contributor<br/>Format: Books<br/>Call Number QA76.9.A25 S438 2015 a<br/>Edition First Edition 2015<br/>Publication Date 2015<br/>ISBN 35000000012313<br/>Cybersecurity : managing systems, conducting testing, and investigating intrusionsent://SD_ILS/0/SD_ILS:8225492024-05-07T12:48:56Z2024-05-07T12:48:56Zby Mowbray, Thomas J.<br/>Author Mowbray, Thomas J.<br/>Format: Books<br/>Call Number QA76.9.A25 M69 2014<br/>Publisher John Wiley and Sons,<br/>Publication Date 2014 2013<br/>ISBN 9781118697115<br/>Guide to network defense and countermeasuresent://SD_ILS/0/SD_ILS:8225862024-05-07T12:48:56Z2024-05-07T12:48:56Zby Weaver, Randy, author<br/>Author Weaver, Randy, author, Weaver, Dawn, author, Farwood, Dean, author<br/>Format: Books<br/>Call Number TK5105.59 W424 2014<br/>Edition Third edition<br/>Publisher Cengage Learning,<br/>Publication Date 2014<br/>ISBN 9781133727941<br/>Security management of next generation telecommunications networks and servicesent://SD_ILS/0/SD_ILS:8257332024-05-07T12:48:56Z2024-05-07T12:48:56Zby Jacobs, Stuart<br/>Author Jacobs, Stuart<br/>Format: Books<br/>Call Number TK5105.59 J334 2014<br/>Publisher IEEE Press/Wiley,<br/>Publication Date 2014<br/>ISBN 9780470565131<br/>Digital communication : communication, multimedia, securityent://SD_ILS/0/SD_ILS:8257862024-05-07T12:48:56Z2024-05-07T12:48:56Zby Meinel, Christoph, 1954-, author<br/>Author Meinel, Christoph, 1954-, author, Sack, Harald, author<br/>Format: Books<br/>Call Number TK5103.7 M45 2014<br/>Publisher Springer,<br/>Publication Date 2014<br/>ISBN 9783642543302<br/>Hands-on information security lab manualent://SD_ILS/0/SD_ILS:8282872024-05-07T12:48:56Z2024-05-07T12:48:56Zby Whitman, Michael E., 1964-, author<br/>Author Whitman, Michael E., 1964-, author, Mattord, Herbert J., author, Green, Andrew, author<br/>Format: Books<br/>Call Number HD30.38 W45 2014 f<br/>Publisher Cengage Learning,<br/>Publication Date 2014<br/>ISBN 9781285167572<br/>Image encryption : a communication perspectiveent://SD_ILS/0/SD_ILS:8289342024-05-07T12:48:56Z2024-05-07T12:48:56Zby Abd el-Samie, Fathi E.<br/>Author Abd el-Samie, Fathi E., Ahmed, Hossam Eldin H., author, Elashry, Ibrahim F., author, Shahieen, Mai H., author, Faragallah, Osama S., author<br/>Format: Books<br/>Call Number TA1637 A23 2014<br/>Publisher CRC Press, Tayllor & Francis Group,<br/>Publication Date 2014<br/>ISBN 9781466576988<br/>Introduction to information security : a strategic-based approachent://SD_ILS/0/SD_ILS:8291242024-05-07T12:48:56Z2024-05-07T12:48:56Zby Shimeall, Timothy J.<br/>Author Shimeall, Timothy J., Spring, Jonathan M.<br/>Format: Books<br/>Call Number TK5102.85 S55 2014<br/>Publisher Syngress ,<br/>Publication Date 2014<br/>ISBN 9781597499699<br/>Emerging trends in ICT securityent://SD_ILS/0/SD_ILS:8310312024-05-07T12:48:56Z2024-05-07T12:48:56Zby Akhgar, Babak, editor<br/>Author Akhgar, Babak, editor, Arabnia, Hamid R., editor<br/>Format: Books<br/>Call Number QA76.9.A25 E46 2014<br/>Publisher Elsevier,<br/>Publication Date 2014<br/>ISBN 9780124114746<br/>Managing information securityent://SD_ILS/0/SD_ILS:8310362024-05-07T12:48:56Z2024-05-07T12:48:56Zby Vacca, John R., editor<br/>Author Vacca, John R., editor<br/>Format: Books<br/>Call Number QA76.9.A25 M36 2014<br/>Edition 2nd ed.<br/>Publisher Elsevier,<br/>Publication Date 2014<br/>ISBN 9780124166882<br/>Business continuity and disaster recovery planning for IT professionalsent://SD_ILS/0/SD_ILS:8310372024-05-07T12:48:56Z2024-05-07T12:48:56Zby Snedaker, Susan<br/>Author Snedaker, Susan, Rima, Chris<br/>Format: Books<br/>Call Number HF5548.37 S67 2014<br/>Edition 2nd edition.<br/>Publisher Syngress,<br/>Publication Date 2014<br/>ISBN 9780124105263<br/>The basics of IT audit : purposes, processes, and practical informationent://SD_ILS/0/SD_ILS:8310382024-05-07T12:48:56Z2024-05-07T12:48:56Zby Gantz, Stephen D.<br/>Author Gantz, Stephen D., Maske, Steve<br/>Format: Books<br/>Call Number T58.5 G37 2014<br/>Publisher Syngress, an imprint of Elsevier,<br/>Publication Date 2014<br/>ISBN 9780124171596<br/>Social media security : leveraging social networking while mitigating riskent://SD_ILS/0/SD_ILS:8310392024-05-07T12:48:56Z2024-05-07T12:48:56Zby Cross, Michael, 1965-<br/>Author Cross, Michael, 1965-<br/>Format: Books<br/>Call Number HM742 C77 2013<br/>Publisher Elsevier,<br/>Publication Date 2014 2013<br/>ISBN 9781597499866<br/>Identity and access management : business performanve through connected intelligenceent://SD_ILS/0/SD_ILS:8312282024-05-07T12:48:56Z2024-05-07T12:48:56Zby Osmanoglu, Ertem<br/>Author Osmanoglu, Ertem<br/>Format: Books<br/>Call Number QA76.9.A25 O78 2013<br/>Publisher Syngress, an imprint of Elsevier,<br/>Publication Date 2014<br/>ISBN 9780124081406<br/>Cyber security and IT infrastructure protectionent://SD_ILS/0/SD_ILS:8312392024-05-07T12:48:56Z2024-05-07T12:48:56Zby Vacca, John R., editor<br/>Author Vacca, John R., editor<br/>Format: Books<br/>Call Number QA76.9.A25 C934 2014<br/>Publisher Elsevier,<br/>Publication Date 2014<br/>ISBN 9780124166813<br/>Network and system securityent://SD_ILS/0/SD_ILS:8312412024-05-07T12:48:56Z2024-05-07T12:48:56Zby Vacca, John R., editor<br/>Author Vacca, John R., editor<br/>Format: Books<br/>Call Number TK5105.59 N486 2014<br/>Edition 2nd ed.<br/>Publisher Elsevier,<br/>Publication Date 2014<br/>ISBN 9780124166899<br/>The basics of digital privacy : simple tools to protect your personal information and your identity onlineent://SD_ILS/0/SD_ILS:8312662024-05-07T12:48:56Z2024-05-07T12:48:56Zby Cherry, Denny<br/>Author Cherry, Denny, Larock, Thomas, technical editor<br/>Format: Books<br/>Call Number QA76.9.A25 C444 2014<br/>Publisher Elsevier,<br/>Publication Date 2014<br/>ISBN 9780128000113<br/>Hacking with Kali : practical penetration testing techniquesent://SD_ILS/0/SD_ILS:8312782024-05-07T12:48:56Z2024-05-07T12:48:56Zby Broad, James<br/>Author Broad, James, Bindner, Andrew<br/>Format: Books<br/>Call Number QA76.9.A25 B764 2014<br/>Publisher Elsevier Science,<br/>Publication Date 2014<br/>ISBN 9780124077492<br/>System forensics, investigation and responseent://SD_ILS/0/SD_ILS:8314082024-05-07T12:48:56Z2024-05-07T12:48:56Zby Easttom, Chuck<br/>Author Easttom, Chuck<br/>Format: Books<br/>Call Number HV8079.C65 E27 2014<br/>Edition 2nd ed.<br/>Publisher Jones & Bartlett Learning,<br/>Publication Date 2014<br/>ISBN 9781284031058<br/>Fundamentals of information systems securityent://SD_ILS/0/SD_ILS:8314092024-05-07T12:48:56Z2024-05-07T12:48:56Zby Kim, David<br/>Author Kim, David, Solomon, Michael G.<br/>Format: Books<br/>Call Number QA76.9.A25 K564 2014<br/>Edition 2nd ed.<br/>Publisher Jones & Bartlett Learning ,<br/>Publication Date 2014<br/>ISBN 9781284031621<br/>Network security firewalls, and VPNsent://SD_ILS/0/SD_ILS:8314122024-05-07T12:48:56Z2024-05-07T12:48:56Zby Stewart, J. Michael<br/>Author Stewart, J. Michael<br/>Format: Books<br/>Call Number TK5105.59 S74 2014<br/>Edition 2nd ed.<br/>Publisher Jones & Bartlett Learning,<br/>Publication Date 2014<br/>ISBN 9781284031676<br/>Security strategies in windows platforms and applicationsent://SD_ILS/0/SD_ILS:8314142024-05-07T12:48:56Z2024-05-07T12:48:56Zby Solomon, Michael G.<br/>Author Solomon, Michael G.<br/>Format: Books<br/>Call Number QA76.76.O63 S656 2014<br/>Edition 2nd ed.<br/>Publisher Jones & Bartlett Learning,<br/>Publication Date 2014<br/>ISBN 9781284031652<br/>Hacker techniques, tools, and incident handlingent://SD_ILS/0/SD_ILS:8314152024-05-07T12:48:56Z2024-05-07T12:48:56Zby Oriyano, Sean-Philip<br/>Author Oriyano, Sean-Philip<br/>Format: Books<br/>Call Number TK5105.59 O75 2014<br/>Edition 2nd ed.<br/>Publisher Jones & Bartlett Learning,<br/>Publication Date 2014<br/>ISBN 9781284031713<br/>Learning nessus for penetration testing : master how to perfom IT infrastructure security vulnerability assessments using nessus with tips and insights from real-world challenges faced during vulnerability assessmentent://SD_ILS/0/SD_ILS:8314362024-05-07T12:48:56Z2024-05-07T12:48:56Zby Kumar, Himanshu<br/>Author Kumar, Himanshu<br/>Format: Books<br/>Call Number QA76.9.A25 K864 2014<br/>Publisher Packt Publiching,<br/>Publication Date 2014<br/>ISBN 9781783550999<br/>Conducting network penetration and espionage in a global environmentent://SD_ILS/0/SD_ILS:8330942024-05-07T12:48:56Z2024-05-07T12:48:56Zby Middleton, Bruce, 1953-, author<br/>Author Middleton, Bruce, 1953-, author<br/>Format: Books<br/>Call Number TK5105.59 M53 2014<br/>Publisher CRC Press,<br/>Publication Date 2014<br/>ISBN 9781482206470<br/>Security management : a critical thinking approachent://SD_ILS/0/SD_ILS:8041862024-05-07T12:48:56Z2024-05-07T12:48:56Zby Land, Michael<br/>Author Land, Michael, Ricks, Truett, Rocks, Bobby<br/>Format: Books<br/>Call Number HD61.51 L36 2014<br/>Publisher CRC Press,<br/>Publication Date 2014<br/>ISBN 9781466561779<br/>Cryptography for security and privacy in cloud computingent://SD_ILS/0/SD_ILS:8140262024-05-07T12:48:56Z2024-05-07T12:48:56Zby Rass, Stefan<br/>Author Rass, Stefan, Slamanig, Daniel, author<br/>Format: Books<br/>Call Number QA76.9.A25 R37 2014<br/>Publisher Artech House,<br/>Publication Date 2014<br/>ISBN 9781608075751<br/>Cryptography and network security : principles and practiceent://SD_ILS/0/SD_ILS:8211522024-05-07T12:48:56Z2024-05-07T12:48:56Zby Stallings, William<br/>Author Stallings, William<br/>Format: Books<br/>Call Number TK5105.59 S713 2014<br/>Edition 6th ed.<br/>Publisher Prentice Hall,<br/>Publication Date 2014 2011<br/>ISBN 9780133354690<br/>Network security essentials applications and standardsent://SD_ILS/0/SD_ILS:8212202024-05-07T12:48:56Z2024-05-07T12:48:56Zby Stallings, William<br/>Author Stallings, William<br/>Format: Books<br/>Call Number TK5105.59 S725 2014<br/>Edition 5th ed.<br/>Publisher Prentice Hall,<br/>Publication Date 2014<br/>ISBN 9780133370430<br/>Security without obscurity : a guide to confidentiality, authentication, and integrityent://SD_ILS/0/SD_ILS:8213652024-05-07T12:48:56Z2024-05-07T12:48:56Zby Stapleton, J. J. (Jeffrey James)<br/>Author Stapleton, J. J. (Jeffrey James)<br/>Format: Books<br/>Call Number QA76.9.A25 S84 2014<br/>Publisher CRC Press,<br/>Publication Date 2014<br/>ISBN 9781466592148<br/>Principles of incident response and disaster recoveryent://SD_ILS/0/SD_ILS:8226942024-05-07T12:48:56Z2024-05-07T12:48:56Zby Whitman, Michael E., 1964-, author<br/>Author Whitman, Michael E., 1964-, author, Mattord, Herbert J., author, Green, Andrew, 1952-, author<br/>Format: Books<br/>Call Number HF5548.37 W44 2014<br/>Edition 2nd ed.<br/>Publisher Course Technology, Cengage Learning,<br/>Publication Date 2014<br/>ISBN 9781111138059<br/>Applied network security monitoring : collection, detection, and analysisent://SD_ILS/0/SD_ILS:8284382024-05-07T12:48:56Z2024-05-07T12:48:56Zby Sanders, Chris, 1986-<br/>Author Sanders, Chris, 1986-, Smith, Jason (Adjunct associate professor), author<br/>Format: Books<br/>Call Number QA76.9.A25 S264 2014<br/>Publisher Syngress, an imprint of Elsevier,<br/>Publication Date 2014<br/>ISBN 9780124172081<br/>Security for multihop wireless networksent://SD_ILS/0/SD_ILS:8329172024-05-07T12:48:56Z2024-05-07T12:48:56Zby Khan, Shafiullah, editor<br/>Author Khan, Shafiullah, editor, Lloret Mauri, Jaime, editor<br/>Format: Books<br/>Call Number TK5103.2 S434 2014<br/>Publisher CRC Press, Taylor & Francis Group,<br/>Publication Date 2014<br/>ISBN 9781466578036<br/>Access control, authentication, and public key infrastructureent://SD_ILS/0/SD_ILS:8329842024-05-07T12:48:56Z2024-05-07T12:48:56Zby Chapple, Mike, author<br/>Author Chapple, Mike, author<br/>Format: Books<br/>Call Number TK5105.59 A234 2014<br/>Edition 2nd ed.<br/>Publisher Jones & Bartlett Learning,<br/>Publication Date 2014<br/>ISBN 9781284031591<br/>Security for service oriented architecturesent://SD_ILS/0/SD_ILS:8372132024-05-07T12:48:56Z2024-05-07T12:48:56Zby Williams, Walter, author<br/>Author Williams, Walter, author<br/>Format: Books<br/>Call Number TK5105.5828 W55 2014<br/>Publisher CRC Press,<br/>Publication Date 2014<br/>ISBN 9781466584020<br/>Core software security : security at the sourceent://SD_ILS/0/SD_ILS:8372162024-05-07T12:48:56Z2024-05-07T12:48:56Zby Ransome, James F., author<br/>Author Ransome, James F., author, Misra, Anmol, author, Schoenfield, Brook, author<br/>Format: Books<br/>Call Number QA76.9.A25 R364 2014<br/>Publisher Taylor & Francis,<br/>Publication Date 2014<br/>ISBN 9781466560956<br/>The science and technology of counterterrorism : measuring physical and electronic security riskent://SD_ILS/0/SD_ILS:8381452024-05-07T12:48:56Z2024-05-07T12:48:56Zby Young, Carl S., author<br/>Author Young, Carl S., author<br/>Format: Books<br/>Call Number HV6431 Y68 2014<br/>Publication Date 2014<br/>ISBN 9780124200562<br/>The basics of information security : understanding the fundamentals of InfoSec in theory and practiceent://SD_ILS/0/SD_ILS:8383882024-05-07T12:48:56Z2024-05-07T12:48:56Zby Andress, Jason<br/>Author Andress, Jason<br/>Format: Books<br/>Call Number QA76.9.A25 A535 2014<br/>Edition 2nd ed.<br/>Publisher Elsevier/Syngress, Syngress is a imprint of Elsevier,<br/>Publication Date 2014<br/>ISBN 9780128007440<br/>Advances in secure computing, internet services, and applicationsent://SD_ILS/0/SD_ILS:8412032024-05-07T12:48:56Z2024-05-07T12:48:56Zby Tripathy, B. K. editor<br/>Author Tripathy, B. K. editor, Acharjya, D. P. editor<br/>Format: Books<br/>Call Number TK5105.59 A38 2014 f<br/>Publisher Information Science Reference, an imprint of IGI Global,<br/>Publication Date 2014<br/>ISBN 9781466649408<br/>Analyzing security, trust, and crime in the digital worldent://SD_ILS/0/SD_ILS:8412042024-05-07T12:48:56Z2024-05-07T12:48:56Zby Nemati, Hamid R., 1958- editor<br/>Author Nemati, Hamid R., 1958- editor<br/>Format: Books<br/>Call Number HF5548.37 A53 2014 f<br/>Publisher Information Science Reference,<br/>Publication Date 2014<br/>ISBN 9781466648562<br/>Architectures and protocols for secure information technology infrastructuresent://SD_ILS/0/SD_ILS:8412052024-05-07T12:48:56Z2024-05-07T12:48:56Zby Martinez, Antonio Ruiz, 1976-, editor<br/>Author Martinez, Antonio Ruiz, 1976-, editor, Marin-Lopez, Rafael, 1977-, editor, Garcia, Fernando Pereniguez, 1984-, editor<br/>Format: Books<br/>Call Number QA76.9.A25 A73 2014 f<br/>Publisher Information Science Reference, an imprint of IGI Global,<br/>Publication Date 2014<br/>ISBN 9781466645141<br/>Network security technologies : design and applicationsent://SD_ILS/0/SD_ILS:8412102024-05-07T12:48:56Z2024-05-07T12:48:56Zby Amine, Abdelmalek, editor<br/>Author Amine, Abdelmalek, editor, Ait Mohamed, Otmane, editor, Benatallah, Boualem, editor<br/>Format: Books<br/>Call Number TK5105.59 N483 2014 f<br/>Publisher Information Science Reference, an imprint of IGI Global,<br/>Publication Date 2014<br/>ISBN 9781466647893<br/>Organizational, legal, and technological dimensions of information system administrationent://SD_ILS/0/SD_ILS:8412122024-05-07T12:48:56Z2024-05-07T12:48:56Zby Portela, Irene Maria, 1965-, editor<br/>Author Portela, Irene Maria, 1965-, editor, Almeida, Fernando, 1979-, editor<br/>Format: Books<br/>Call Number T58.64 O74 2014 f<br/>Publisher Information Science Reference,<br/>Publication Date 2014<br/>ISBN 9781466645264<br/>Security, privacy, trust, and resource management in mobile and wireless communicationsent://SD_ILS/0/SD_ILS:8412642024-05-07T12:48:56Z2024-05-07T12:48:56Zby Rawat, Danda B., 1977-, editor<br/>Author Rawat, Danda B., 1977-, editor, Bista, Bhed B., 1967-, editor, Yan, Gongjun, 1976-, editor<br/>Format: Books<br/>Call Number TK5103.2 S435 2014 f<br/>Publisher Information Science Reference, an imprint of IGI Global,<br/>Publication Date 2014<br/>ISBN 9781466646919<br/>Cloud management and securityent://SD_ILS/0/SD_ILS:8355702024-05-07T12:48:56Z2024-05-07T12:48:56Zby Abbadi, Imad M., author<br/>Author Abbadi, Imad M., author<br/>Format: Books<br/>Call Number QA76.585 A235 2014<br/>Publisher Wiley,<br/>Publication Date 2014<br/>ISBN 9781118817094<br/>A cryptography primer : secrets and promisesent://SD_ILS/0/SD_ILS:8358482024-05-07T12:48:56Z2024-05-07T12:48:56Zby Klein, Philip N., author<br/>Author Klein, Philip N., author<br/>Format: Books<br/>Call Number QA76.9.A25 K545 2014<br/>Publisher Cambridge University Press,<br/>Publication Date 2014<br/>ISBN 9781107017887<br/>What every engineer should know about cyber security and digital forensicsent://SD_ILS/0/SD_ILS:8372822024-05-07T12:48:56Z2024-05-07T12:48:56Zby DeFranco, Joanna F author<br/>Author DeFranco, Joanna F author<br/>Format: Books<br/>Call Number TK5105.59 D44 2013<br/>Publisher CRC Press,<br/>Publication Date 2014<br/>ISBN 9781466564527<br/>The Intrusion detection networks : a key to collaborative securityent://SD_ILS/0/SD_ILS:8372902024-05-07T12:48:56Z2024-05-07T12:48:56Zby Fung, Carol author<br/>Author Fung, Carol author, Boutaba, Raouf<br/>Format: Books<br/>Call Number QA76.9 A25 F85 2014<br/>Publisher Auerbach Pub.,<br/>Publication Date 2014<br/>ISBN 9781466564121<br/>Responsive security : be ready to be secureent://SD_ILS/0/SD_ILS:8372952024-05-07T12:48:56Z2024-05-07T12:48:56Zby Meng-Chow Kang author<br/>Author Meng-Chow Kang author<br/>Format: Books<br/>Call Number HF5548.37 K36 2014<br/>Publisher CRC Press/Taylor & Francis,<br/>Publication Date 2014<br/>ISBN 9781466584303<br/>The art of memory forensics : detecting malware and threats in Windows, Linux, and Mac memoryent://SD_ILS/0/SD_ILS:8379442024-05-07T12:48:56Z2024-05-07T12:48:56Zby Ligh, Michael Hale, author<br/>Author Ligh, Michael Hale, author, Case, Andrew, author, Levy, Jamie, author, Walters, Aaron, author<br/>Format: Books<br/>Call Number QA76.9.A25 L54 2014<br/>Publication Date 2014<br/>ISBN 9781118825099<br/>CompTIA security+ review guide : exam sy0-401ent://SD_ILS/0/SD_ILS:8379622024-05-07T12:48:56Z2024-05-07T12:48:56Zby Stewart, James M. author?UNAUTHORIZED<br/>Author Stewart, James M. author?UNAUTHORIZED<br/>Format: Books<br/>Call Number QA76.3 S73 2014<br/>Edition 3rd edition.<br/>Publication Date 2014<br/>ISBN 9781118901373<br/>Collaboration with cloud computing : security, social media, and unified communicationsent://SD_ILS/0/SD_ILS:8380732024-05-07T12:48:56Z2024-05-07T12:48:56Zby Messier, Ric, author<br/>Author Messier, Ric, author, Konar, Allan, editor<br/>Format: Books<br/>Call Number QA76.9.A25 M475 2014<br/>Publisher Syngress,<br/>Publication Date 2014<br/>ISBN 9780124170407<br/>Windows forensic analysis toolkit : advanced analysis techniques for Windows 8ent://SD_ILS/0/SD_ILS:8380762024-05-07T12:48:56Z2024-05-07T12:48:56Zby Carvey, Harlan A., author<br/>Author Carvey, Harlan A., author<br/>Format: Books<br/>Call Number HV8079.C65 C374 2014<br/>Edition Fourth edition<br/>Publisher Syngress,<br/>Publication Date 2014<br/>ISBN 9780124171572<br/>Targeted cyber attacks : multi-staged attacks driven by exploits and malwareent://SD_ILS/0/SD_ILS:8380792024-05-07T12:48:56Z2024-05-07T12:48:56Zby Sood, Aditya K., author<br/>Author Sood, Aditya K., author, Enbody, Richard J.<br/>Format: Books<br/>Call Number TK5105.59 S66 2014<br/>Publisher Syngress,<br/>Publication Date 2014<br/>ISBN 9780128006047<br/>Engineering safe and secure software systemsent://SD_ILS/0/SD_ILS:7980472024-05-07T12:48:56Z2024-05-07T12:48:56Zby Axelrod, C. Warren<br/>Author Axelrod, C. Warren<br/>Format: Books<br/>Call Number QA76.9.A25 A93 2013<br/>Publisher Artech House,<br/>Publication Date 2013<br/>ISBN 9781608074723<br/>Network intrusion analysis : methodologies, tools, and techniques for incident analysis and responseent://SD_ILS/0/SD_ILS:7989222024-05-07T12:48:56Z2024-05-07T12:48:56Zby Fichera, Joe<br/>Author Fichera, Joe, Bolt, Steven<br/>Format: Books<br/>Call Number TK5105.59 F53 2013<br/>Publisher Syngress,<br/>Publication Date 2013<br/>ISBN 9781597499620<br/>Digital forensics for handheld devicesent://SD_ILS/0/SD_ILS:7995692024-05-07T12:48:56Z2024-05-07T12:48:56Zby Doherty, Eamon P.<br/>Author Doherty, Eamon P.<br/>Format: Books<br/>Call Number HV8079.C65 D64 2013<br/>Publisher CRC Press,<br/>Publication Date 2013<br/>ISBN 9781439898772<br/>UTM security with Fortinet : Mastering FortiOSent://SD_ILS/0/SD_ILS:8038172024-05-07T12:48:56Z2024-05-07T12:48:56Zby Tam, Kenneth<br/>Author Tam, Kenneth<br/>Format: Books<br/>Call Number TK5105.59 U86 2013 a<br/>Publisher Syngress,<br/>Publication Date 2013<br/>ISBN 9781597497473<br/>Security patterns in practice : designing secure architectures using software patternsent://SD_ILS/0/SD_ILS:8041742024-05-07T12:48:56Z2024-05-07T12:48:56Zby Fernandez, Eduardo B.<br/>Author Fernandez, Eduardo B.<br/>Format: Books<br/>Call Number TK5105.59 F47 2013<br/>Publisher Wiley,<br/>Publication Date 2013<br/>ISBN 9781119998945<br/>Risk propagation assessment for network security : application to airport communication network designent://SD_ILS/0/SD_ILS:8042912024-05-07T12:48:56Z2024-05-07T12:48:56Zby Ben Mahmoud, Mohamed Slim<br/>Author Ben Mahmoud, Mohamed Slim, Larrieu, Nicolas, Pirovano, Alain<br/>Format: Books<br/>Call Number TK5105.59 B46 2013<br/>Publisher ISTE Ltd/John Wiley and Sons Inc,<br/>Publication Date 2013<br/>ISBN 9781848214545<br/>Information securityent://SD_ILS/0/SD_ILS:8042932024-05-07T12:48:56Z2024-05-07T12:48:56Zby Rhodes-Ousley, Mark<br/>Author Rhodes-Ousley, Mark<br/>Format: Books<br/>Call Number TK5105.59 R46 2013<br/>Edition 2nd ed.<br/>Publisher McGraw Hill Education,<br/>Publication Date 2013<br/>ISBN 9780071784351<br/>Network attacks and defenses : a hands-on approachent://SD_ILS/0/SD_ILS:8053032024-05-07T12:48:56Z2024-05-07T12:48:56Zby Trabelsi, Zouheir<br/>Author Trabelsi, Zouheir<br/>Format: Books<br/>Call Number TK5105.59 N48 2013<br/>Publisher CRC Press,<br/>Publication Date 2013<br/>ISBN 9781466517943<br/>Network and information security : issues, challenges and research trendsent://SD_ILS/0/SD_ILS:8054292024-05-07T12:48:56Z2024-05-07T12:48:56Zby Sarma, Nityananda<br/>Author Sarma, Nityananda, Bhattacharyya, Dhruba K.<br/>Format: Books<br/>Call Number TK5105.59 N484 2013<br/>Publisher Narosa Publishing House,<br/>Publication Date 2013<br/>ISBN 9788184873146<br/>Intelligent systems for security informaticsent://SD_ILS/0/SD_ILS:8056972024-05-07T12:48:56Z2024-05-07T12:48:56Zby Yang, Christopher C.<br/>Author Yang, Christopher C.<br/>Format: Books<br/>Call Number QA76.9.A25 I58 2013<br/>Edition 1st ed.<br/>Publisher Elsevier/Academic Press ; Zhejiang University Press,<br/>Publication Date 2013<br/>ISBN 9780124047020<br/>Computer forensics : infoSec Pro guideent://SD_ILS/0/SD_ILS:8064192024-05-07T12:48:56Z2024-05-07T12:48:56Zby Cowen, David.<br/>Author Cowen, David.<br/>Format: Books<br/>Call Number HV8079.C65 C68 2013<br/>Publisher McGraw-Hill,<br/>Publication Date 2013<br/>ISBN 9780071742450<br/>Malware, rootkits & botnets : a beginner's guideent://SD_ILS/0/SD_ILS:8064232024-05-07T12:48:56Z2024-05-07T12:48:56Zby Elisan, Christopher C. QA76.76.C68<br/>Author Elisan, Christopher C. QA76.76.C68<br/>Format: Books<br/>Call Number QA76.76 .C68 E45 2013<br/>Publisher McGraw-Hill,<br/>Publication Date 2013<br/>ISBN 9780071792066<br/>Network security : a beginner's guideent://SD_ILS/0/SD_ILS:8064262024-05-07T12:48:56Z2024-05-07T12:48:56Zby Maiwald, Eric.<br/>Author Maiwald, Eric.<br/>Format: Books<br/>Call Number TK5105.59 M35 2013<br/>Edition 3rd ed.<br/>Publisher McGraw-Hill,<br/>Publication Date 2013<br/>ISBN 9780071795708<br/>Information security for managersent://SD_ILS/0/SD_ILS:8083282024-05-07T12:48:56Z2024-05-07T12:48:56Zby Workman, Michael<br/>Author Workman, Michael, Phelps, Daniel C., Gathegi, John N.<br/>Format: Books<br/>Call Number HF5548.37 W67 2013<br/>Publisher Jones & Bartlett Learning,<br/>Publication Date 2013<br/>ISBN 9780763793012<br/>Security risks in social media technologies : safe practices in public service applicationsent://SD_ILS/0/SD_ILS:8139312024-05-07T12:48:56Z2024-05-07T12:48:56Zby Oxley, Alan<br/>Author Oxley, Alan<br/>Format: Books<br/>Call Number TK5105.59 O95 2013<br/>Publisher Chandos Pub.,<br/>Publication Date 2013<br/>ISBN 9781843347149<br/>Lindungi HP & tablet android dari virus dan apa sahajaent://SD_ILS/0/SD_ILS:8156452024-05-07T12:48:56Z2024-05-07T12:48:56Zby Nazri Muhd.<br/>Author Nazri Muhd., Hassan Noor, Dayang Nor Azizah Azmi<br/>Format: Books<br/>Call Number TK5105.885.G66 N39 2013<br/>Publisher Synergy Media,<br/>Publication Date 2013<br/>ISBN 9789670585994<br/>Introduction to computer networks and cybersecurityent://SD_ILS/0/SD_ILS:8175432024-05-07T12:48:56Z2024-05-07T12:48:56Zby Wu, Chwan-Hwa (John)<br/>Author Wu, Chwan-Hwa (John), Irwin, J David<br/>Format: Books<br/>Call Number TK5105.5 W78 2013 f<br/>Publisher CRC Press/Taylor & Francis Group,<br/>Publication Date 2013<br/>ISBN 9781466572133<br/>Safety management for software-based equipmentent://SD_ILS/0/SD_ILS:8186362024-05-07T12:48:56Z2024-05-07T12:48:56Zby Boulanger, Jean-Louis<br/>Author Boulanger, Jean-Louis<br/>Format: Books<br/>Call Number QA76.9.A25 B684 2013<br/>Publisher ISTE Ltd/John Wiley and Sons Inc,<br/>Publication Date 2013<br/>ISBN 9781848214521<br/>Trust, privacy, and security in digital business : 10th International conference, TrustBus 2013, Prague, Czech Republic, August 28-29, 2013 : proceedingsent://SD_ILS/0/SD_ILS:8196482024-05-07T12:48:56Z2024-05-07T12:48:56Zby TrustBus (Conference) (10th : 2013 : Prague, Czech Republic)<br/>Author TrustBus (Conference) (10th : 2013 : Prague, Czech Republic), Furnell, Steven, 1970-, Lambrinoudakis, Costas, López, Javier<br/>Format: Books<br/>Call Number HF5548.32 T78 2013<br/>Edition 1st ed.<br/>Publisher Springer,<br/>Publication Date 2013<br/>ISBN 9783642403422<br/>Data management and security : applications in medicine, science and engineeringent://SD_ILS/0/SD_ILS:8200842024-05-07T12:48:56Z2024-05-07T12:48:56Zby Rabasa, A. (Alejandro), editor of compilation<br/>Author Rabasa, A. (Alejandro), editor of compilation, Brebbia, C. A.<br/>Format: Books<br/>Call Number QA76.9 .D314 D377 2013<br/>Publisher WIT Press,<br/>Publication Date 2013<br/>ISBN 9781845647087<br/>Digital forensics explainedent://SD_ILS/0/SD_ILS:8210622024-05-07T12:48:56Z2024-05-07T12:48:56Zby Gogolin, Greg.<br/>Author Gogolin, Greg.<br/>Format: Books<br/>Call Number HV8079.C65 G64 2013<br/>Publisher Taylor & Francis, CRC Press,<br/>Publication Date 2013<br/>ISBN 9781439874950<br/>Computational number theory and modern cryptographyent://SD_ILS/0/SD_ILS:8211672024-05-07T12:48:56Z2024-05-07T12:48:56Zby Yan, Song Y.<br/>Author Yan, Song Y.<br/>Format: Books<br/>Call Number QA76.9.A25 Y36 2013<br/>Publisher Wiley,<br/>Publication Date 2013<br/>ISBN 9781118188583<br/>Hacking for dummiesent://SD_ILS/0/SD_ILS:8264112024-05-07T12:48:56Z2024-05-07T12:48:56Zby Beaver, Kevin<br/>Author Beaver, Kevin<br/>Format: Books<br/>Call Number QA76.9.A25 B43 2013<br/>Edition 4th edition.<br/>Publisher John Wiley & Sons, Inc.,<br/>Publication Date 2013<br/>ISBN 9781118380932<br/>Cryptography in C and C++ent://SD_ILS/0/SD_ILS:8292472024-05-07T12:48:56Z2024-05-07T12:48:56Zby Welschenbach, Michael, author<br/>Author Welschenbach, Michael, author<br/>Format: Books<br/>Call Number QA76.9.A25 W45 2013<br/>Edition 2nd ed.<br/>Publisher Apress,<br/>Publication Date 2013<br/>ISBN 9781430250982<br/>The basics of web hacking : tools and techniques to attack the Webent://SD_ILS/0/SD_ILS:8310352024-05-07T12:48:56Z2024-05-07T12:48:56Zby Pauli, Josh<br/>Author Pauli, Josh<br/>Format: Books<br/>Call Number TK5105.59 P39 2013<br/>Publisher Syngress, an imprint of Elsevier,<br/>Publication Date 2013<br/>ISBN 9780124166004<br/>Cyber warfare : techniques, tactics and tools for security practitionersent://SD_ILS/0/SD_ILS:8312352024-05-07T12:48:56Z2024-05-07T12:48:56Zby Andress, Jason<br/>Author Andress, Jason, Winterfeld, Steve, Ablon, Lilian<br/>Format: Books<br/>Call Number U163 A53 2014<br/>Edition 2nd ed.<br/>Publisher Elsevier.<br/>Publication Date 2013<br/>ISBN 9780124166721<br/>Eleventh hour CISSP : study guideent://SD_ILS/0/SD_ILS:8312422024-05-07T12:48:56Z2024-05-07T12:48:56Zby Conrad, Eric, 1967-<br/>Author Conrad, Eric, 1967-, Misenar, Seth., Feldman, Joshua., Riggins, Kevin, technical editor<br/>Format: Books<br/>Call Number TK5105.59 C664 2014<br/>Edition 2nd ed.<br/>Publisher Syngress,<br/>Publication Date 2013<br/>ISBN 9780124171428<br/>Cyber crime, security and digital intelligenceent://SD_ILS/0/SD_ILS:8313512024-05-07T12:48:56Z2024-05-07T12:48:56Zby Johnson, Mark, 1959- author<br/>Author Johnson, Mark, 1959- author<br/>Format: Books<br/>Call Number HV6773 J64 2013<br/>Publisher Gower,<br/>Publication Date 2013<br/>ISBN 9781409454496 9781409454502<br/>Secure software designent://SD_ILS/0/SD_ILS:8314172024-05-07T12:48:56Z2024-05-07T12:48:56Zby Richardson, Theodor<br/>Author Richardson, Theodor, Thies, Charles<br/>Format: Books<br/>Call Number QA76.76.D47 R57 2013<br/>Publisher Jones & Bartlett Learning,<br/>Publication Date 2013<br/>ISBN 9781449626327<br/>Arguments that count : physics, computing, and missile defense, 1949-2012ent://SD_ILS/0/SD_ILS:8314332024-05-07T12:48:56Z2024-05-07T12:48:56Zby Slayton, Rebecca, 1974-<br/>Author Slayton, Rebecca, 1974-<br/>Format: Books<br/>Call Number UA22 S57 2013<br/>Publisher The MIT Press,<br/>Publication Date 2013<br/>ISBN 9780262019446<br/>Web penetration testing with kali linux : a practical guide to implementing penetration testing strategies on websites, web applications, and standard web protocol with kali linuxent://SD_ILS/0/SD_ILS:8314392024-05-07T12:48:56Z2024-05-07T12:48:56Zby Muniz, Joseph<br/>Author Muniz, Joseph, Lakhani, Aamir<br/>Format: Books<br/>Call Number QA76.9.A25 M86 2013<br/>Publisher Packt publishing ,<br/>Publication Date 2013<br/>ISBN 9781782163169<br/>Sailing safe in cyberspace : protect your identity and dataent://SD_ILS/0/SD_ILS:8314412024-05-07T12:48:56Z2024-05-07T12:48:56Zby Kaushik, Anjali<br/>Author Kaushik, Anjali<br/>Format: Books<br/>Call Number HV8079 .C65 K38 2013<br/>Publisher SAGE Publications,<br/>Publication Date 2013<br/>ISBN 9788132111221<br/>Android security : attacks and defensesent://SD_ILS/0/SD_ILS:8042382024-05-07T12:48:56Z2024-05-07T12:48:56Zby Misram, Anmol<br/>Author Misram, Anmol, Dubey, Abhisbek<br/>Format: Books<br/>Call Number QA76.774.A53 M57 2013<br/>Publisher Taylor & Francis,<br/>Publication Date 2013<br/>ISBN 9781439896464<br/>Information security policy development for compliance : ISO/IEC 27001, NIST SP 800-53, HIPAA standard, PCI DSS V2.0, and AUP V5.0ent://SD_ILS/0/SD_ILS:8052872024-05-07T12:48:56Z2024-05-07T12:48:56Zby Williams, Barry L.<br/>Author Williams, Barry L.<br/>Format: Books<br/>Call Number QA76.9.A25 W55 2013<br/>Publisher CRC Press, Taylor & Francis Group,<br/>Publication Date 2013<br/>ISBN 9781466580589<br/>Cyberspace and cybersecurityent://SD_ILS/0/SD_ILS:8052642024-05-07T12:48:56Z2024-05-07T12:48:56Zby Kostopoulos, George K.<br/>Author Kostopoulos, George K.<br/>Format: Books<br/>Call Number TK5105.59 C94 2013<br/>Publisher CRC Press,<br/>Publication Date 2013<br/>ISBN 9781466501331<br/>Network anomaly detection : a machine learning perspectiveent://SD_ILS/0/SD_ILS:8053022024-05-07T12:48:56Z2024-05-07T12:48:56Zby Bhattacharyya, Dhruba K.<br/>Author Bhattacharyya, Dhruba K., Kalita, Jugal Kumar<br/>Format: Books<br/>Call Number TK5105.59 B474 2013<br/>Publisher CRC Press,<br/>Publication Date 2013<br/>ISBN 9781466582088<br/>Business data communications : infrastructure, networking and securityent://SD_ILS/0/SD_ILS:8064972024-05-07T12:48:56Z2024-05-07T12:48:56Zby Stallings, William author<br/>Author Stallings, William author, Case, Thomas author<br/>Format: Books<br/>Call Number TK5105 S72 2013<br/>Edition Seventh edition.<br/>Publisher Pearson,<br/>Publication Date 2013<br/>ISBN 9780133023893<br/>Web application defender's cookbook : battling hackers and protecting usersent://SD_ILS/0/SD_ILS:8065072024-05-07T12:48:56Z2024-05-07T12:48:56Zby Barnett, Ryan C.<br/>Author Barnett, Ryan C.<br/>Format: Books<br/>Call Number QA76.9.A25 B377 2013<br/>Edition 1st ed.<br/>Publisher Wiley Pub., Inc.,<br/>Publication Date 2013 2012<br/>ISBN 9781118362181<br/>Distributed networks : intelligence, security, and applicationsent://SD_ILS/0/SD_ILS:8117272024-05-07T12:48:56Z2024-05-07T12:48:56Zby Memon, Qurban A.<br/>Author Memon, Qurban A.<br/>Format: Books<br/>Call Number QA76.9.D5 D556 2014<br/>Publisher CRC Press,<br/>Publication Date 2013<br/>ISBN 9781466559578<br/>Secure multi-party computationent://SD_ILS/0/SD_ILS:8137162024-05-07T12:48:56Z2024-05-07T12:48:56Zby Prabhakaran, Manoj, 1979-, editor<br/>Author Prabhakaran, Manoj, 1979-, editor, Sahai, Amit, editor<br/>Format: Books<br/>Call Number QA76.9.A25 S43 2013<br/>Publisher IOS Press,<br/>Publication Date 2013<br/>ISBN 9781614991687<br/>The practice of network security monitoring : understanding incident detection and responseent://SD_ILS/0/SD_ILS:8147622024-05-07T12:48:56Z2024-05-07T12:48:56Zby Bejtlich, Richard<br/>Author Bejtlich, Richard<br/>Format: Books<br/>Call Number TK5105.59 B455 2013<br/>Publisher No Starch Press,<br/>Publication Date 2013<br/>ISBN 9781593275099<br/>Iris biometric model for secured network accessent://SD_ILS/0/SD_ILS:8172252024-05-07T12:48:56Z2024-05-07T12:48:56Zby Khoury, Franjieh El<br/>Author Khoury, Franjieh El<br/>Format: Books<br/>Call Number TK7882.B56 K46 2013<br/>Publisher CRC Press,<br/>Publication Date 2013<br/>ISBN 9781466502130<br/>FISMA and the risk management framework : the new practice of federal cyber securityent://SD_ILS/0/SD_ILS:8183872024-05-07T12:48:56Z2024-05-07T12:48:56Zby Gantz, Stephen D., editor<br/>Author Gantz, Stephen D., editor, Philpott, Daniel R., editor, Windham, Darren, editor<br/>Format: Books<br/>Call Number QA76.9.A25 F574 2013<br/>Publisher Elsevier/Syngress,<br/>Publication Date 2013<br/>ISBN 9781597496414<br/>Data hiding : exposing concealed data in multimedia, operating systems, mobile devices and network protocolsent://SD_ILS/0/SD_ILS:8184482024-05-07T12:48:56Z2024-05-07T12:48:56Zby Raggo, Michael T., author<br/>Author Raggo, Michael T., author, Hosmer, Chet, author, McGrew, Wesley, editor<br/>Format: Books<br/>Call Number QA76.9.A25 R346 2013<br/>Edition 1st ed.<br/>Publisher Syngress,<br/>Publication Date 2013<br/>ISBN 9781597497435<br/>Multimedia information hiding technologies and methodologies for controlling dataent://SD_ILS/0/SD_ILS:8200742024-05-07T12:48:56Z2024-05-07T12:48:56Zby Kondo, Kazuhiro<br/>Author Kondo, Kazuhiro<br/>Format: Books<br/>Call Number QA76.575 M832 2013<br/>Publisher Information Science Reference,<br/>Publication Date 2013<br/>ISBN 9781466622173<br/>Pragmatic security metrics : applying metametrics to information securityent://SD_ILS/0/SD_ILS:8211582024-05-07T12:48:56Z2024-05-07T12:48:56Zby Brotby, W. Krag<br/>Author Brotby, W. Krag, Hinson, Gary, Kabay, M.E.<br/>Format: Books<br/>Call Number QA76.9.A25 B76 2013<br/>Publisher CRC Press,<br/>Publication Date 2013<br/>ISBN 9781439881521<br/>Management of information securityent://SD_ILS/0/SD_ILS:8226902024-05-07T12:48:56Z2024-05-07T12:48:56Zby Whitman, Michael E.<br/>Author Whitman, Michael E., Mattord, Herbert J.<br/>Format: Books<br/>Call Number T58.6 W45 2013<br/>Edition 4th ed.<br/>Publisher Cengage Learning,<br/>Publication Date 2013<br/>ISBN 9781285062297<br/>Information security risk assessment toolkit : practical assessments through data collection and data analysisent://SD_ILS/0/SD_ILS:7979732024-05-07T12:48:56Z2024-05-07T12:48:56Zby Talabis, Mark<br/>Author Talabis, Mark, Martin, Jason<br/>Format: Books<br/>Call Number QA76.9.A25 T354 2013<br/>Publisher Elsevier,<br/>Publication Date 2013<br/>ISBN 9781597497350<br/>The basics of cyber warfare : understanding the fundamentals of cyber warfare in theory and practiceent://SD_ILS/0/SD_ILS:7979862024-05-07T12:48:56Z2024-05-07T12:48:56Zby Winterfeld, Steve<br/>Author Winterfeld, Steve, Andress, Jason<br/>Format: Books<br/>Call Number U163 W56 2013<br/>Publisher Syngress,<br/>Publication Date 2013<br/>ISBN 9780124047372<br/>The hacker's guide to OS X : exploiting OS X from the root-upent://SD_ILS/0/SD_ILS:7979872024-05-07T12:48:56Z2024-05-07T12:48:56Zby Bathurst, Robert<br/>Author Bathurst, Robert, Rogers, Russ, Ghassemlouei, Alijohn<br/>Format: Books<br/>Call Number QA76.774.M33 B38 2013<br/>Publisher Syngress,<br/>Publication Date 2013<br/>ISBN 9781597499507<br/>Discrete dynamical systems and chaotic machines : theory and applicationsent://SD_ILS/0/SD_ILS:8288232024-05-07T12:48:56Z2024-05-07T12:48:56Zby Bahi, Jacques Mohcine, author<br/>Author Bahi, Jacques Mohcine, author, Guyeux, Christophe, author<br/>Format: Books<br/>Call Number QA76.9.A25 B344 2013<br/>Publisher CRC Press,<br/>Publication Date 2013<br/>ISBN 9781466554504<br/>Elementary information securityent://SD_ILS/0/SD_ILS:8291212024-05-07T12:48:56Z2024-05-07T12:48:56Zby Smith, Richard E.<br/>Author Smith, Richard E.<br/>Format: Books<br/>Call Number QA76.9.A25 S658 2013<br/>Publisher Jones & Bartlett Learning,<br/>Publication Date 2013<br/>ISBN 9781449648206<br/>Cyber security for educational leaders : a guide to understanding and implementing technology policiesent://SD_ILS/0/SD_ILS:8300492024-05-07T12:48:56Z2024-05-07T12:48:56Zby Phillips, Richard A.<br/>Author Phillips, Richard A., Sianjina, Rayton R.<br/>Format: Books<br/>Call Number LB1028.3 P454 2013<br/>Publisher Routledge,<br/>Publication Date 2013<br/>ISBN 9780415631969 9780415631976<br/>Applied cyber security and the smart grid : implementing Security Controls into the Modern Power Infrastructureent://SD_ILS/0/SD_ILS:8380592024-05-07T12:48:56Z2024-05-07T12:48:56Zby Knapp, Eric D. editor<br/>Author Knapp, Eric D. editor, Samani, Raj editor<br/>Format: Books<br/>Call Number TK3105 A67 2013<br/>Publisher Elsevier Science,<br/>Publication Date 2013<br/>ISBN 9781597499989<br/>New directions of modern cryptographyent://SD_ILS/0/SD_ILS:8372922024-05-07T12:48:56Z2024-05-07T12:48:56Zby Cao, Zhenfu, author<br/>Author Cao, Zhenfu, author<br/>Format: Books<br/>Call Number TK5102.94 C36 2013<br/>Publisher CRC Press, Taylor & Francis Group,<br/>Publication Date 2013<br/>ISBN 9781466501386<br/>Linux Malware Incident Response : a practitioner's guide to forensic collection and examination of volatile data : an excerpt from Malware Forensic Field Guide for Linux Systemsent://SD_ILS/0/SD_ILS:8379862024-05-07T12:48:56Z2024-05-07T12:48:56Zby Malin, Cameron H., author<br/>Author Malin, Cameron H., author, Aquilina, James M., Casey, Eoghan<br/>Format: Books<br/>Call Number QA76.3 M353 2013<br/>Publisher Elsevier Science,<br/>Publication Date 2013<br/>ISBN 9780124095076<br/>Professional penetration testingent://SD_ILS/0/SD_ILS:8383102024-05-07T12:48:56Z2024-05-07T12:48:56Zby Wilhelm, Thomas, author<br/>Author Wilhelm, Thomas, author, Neely, Matthew, editor<br/>Format: Books<br/>Call Number TK5105.59 W544 2013<br/>Edition Second edition<br/>Publisher Syngress, an imprint of Elsevier,<br/>Publication Date 2013<br/>ISBN 9781597499934<br/>Engineering dependable software systemsent://SD_ILS/0/SD_ILS:8413802024-05-07T12:48:56Z2024-05-07T12:48:56Zby NATO Advanced Study Institute on Engineering Dependable Software Systems (2012 : Marktoberdorf, Germany)<br/>Author NATO Advanced Study Institute on Engineering Dependable Software Systems (2012 : Marktoberdorf, Germany), Broy, M., 1949- editor, Peled, Doron A., 1962- editor, Kalus, Georg editor, NATO Emerging Security Challenges Division<br/>Format: Books<br/>Call Number QA76.76.V47 N38 2013<br/>Publisher IOS Press : published in cooperation with NATO Emerging Security Challenges Division,<br/>Publication Date 2013<br/>ISBN 9781614992066<br/>Software safety and security : tools for analysis and verificationent://SD_ILS/0/SD_ILS:7960582024-05-07T12:48:56Z2024-05-07T12:48:56Zby Nipkow, Tobias<br/>Author Nipkow, Tobias, Grumberg, Orna, Hauptmann, Benedikt<br/>Format: Books<br/>Call Number QA76.76.V47 S64 2012<br/>Publisher IOS Press,<br/>Publication Date 2012<br/>ISBN 9781614990277<br/>Client-side attacks and defenseent://SD_ILS/0/SD_ILS:7979482024-05-07T12:48:56Z2024-05-07T12:48:56Zby Shimonski, Robert<br/>Author Shimonski, Robert, Oriyano, Sean-Philip<br/>Format: Books<br/>Call Number TK5105.59 S55 2012<br/>Publisher Syngress,<br/>Publication Date 2012<br/>ISBN 9781597495905<br/>Hacking web apps : detecting and preventing web application security problemsent://SD_ILS/0/SD_ILS:7979622024-05-07T12:48:56Z2024-05-07T12:48:56Zby Shema, Mike<br/>Author Shema, Mike<br/>Format: Books<br/>Call Number TK5105.59 S545 2012<br/>Publisher Syngress,<br/>Publication Date 2012<br/>ISBN 9781597499514<br/>Advances in intelligence and security informaticsent://SD_ILS/0/SD_ILS:7989232024-05-07T12:48:56Z2024-05-07T12:48:56Zby Mao, Wenji<br/>Author Mao, Wenji, Wang, Fei-Yue<br/>Format: Books<br/>Call Number QA76.9.A25 M335 2012<br/>Edition 1st ed.<br/>Publisher Academic Press ; Zhejiang University Press,<br/>Publication Date 2012<br/>ISBN 9780123972002<br/>Hacking exposed 7 : network security secrets & solutionsent://SD_ILS/0/SD_ILS:8013632024-05-07T12:48:56Z2024-05-07T12:48:56Zby McClure, Stuart<br/>Author McClure, Stuart, McClure, Stuart, Scambray, Joel, Kurtz, George<br/>Format: Books<br/>Call Number TK5105.59 M483 2012<br/>Edition 7th ed.<br/>Publisher McGraw-Hill Osborne Media,<br/>Publication Date 2012<br/>ISBN 9780071780285<br/>The computer incident response planning handbook : executable plans for protecting information at riskent://SD_ILS/0/SD_ILS:8013832024-05-07T12:48:56Z2024-05-07T12:48:56Zby McCarthy, N. K.<br/>Author McCarthy, N. K.<br/>Format: Books<br/>Call Number QA76.9.D314 M364 2012<br/>Publisher McGraw-Hill Osborne Media,<br/>Publication Date 2012<br/>ISBN 9780071790390<br/>Information security management handbook. Volume 5ent://SD_ILS/0/SD_ILS:8024242024-05-07T12:48:56Z2024-05-07T12:48:56Zby Tipton, Harold F.<br/>Author Tipton, Harold F., Nozaki, Micki Krause<br/>Format: Books<br/>Call Number QA76.9.A25 I544 2012<br/>Edition 6th ed.<br/>Publisher Auerbach Publications,<br/>Publication Date 2012<br/>ISBN 9781439853450<br/>Operating systems : internals and design principlesent://SD_ILS/0/SD_ILS:8041362024-05-07T12:48:56Z2024-05-07T12:48:56Zby Stallings, William<br/>Author Stallings, William<br/>Format: Books<br/>Call Number QA76.76.O63 S72 2012<br/>Edition 7th ed.<br/>Publisher Prentice Hall,<br/>Publication Date 2012<br/>ISBN 9780273751502<br/>Network and application security fundamentals and practicesent://SD_ILS/0/SD_ILS:8053012024-05-07T12:48:56Z2024-05-07T12:48:56Zby Ganguly, Debashis<br/>Author Ganguly, Debashis, Lahiri, Shibamouli<br/>Format: Books<br/>Call Number TK5105.59 G365 2012<br/>Publisher Science Publishers ; Distributed by CRC Press,<br/>Publication Date 2012<br/>ISBN 9781578087556<br/>