Search Results for Internet (Computer network) -- Security measures - Narrowed by: Open Access Book
SirsiDynix Enterprise
http://portal.utm.my/client/en_AU/main/main/qu$003dInternet$002b$002528Computer$002bnetwork$002529$002b--$002bSecurity$002bmeasures$0026qf$003dITYPE$002509Material$002bType$0025091$00253AOPEN_BK$002509Open$002bAccess$002bBook$0026ic$003dtrue$0026ps$003d300?dt=list
2024-04-30T18:44:21Z
Security in IoT-Enabled Space
ent://SD_ILS/0/SD_ILS:882284
2024-04-30T18:44:21Z
2024-04-30T18:44:21Z
by Al-Turjman, Fadi, author<br/>Author Al-Turjman, Fadi, author<br/>Format: Books<br/>Call Number TK5105.8857 A48 2019<br/>Publication Date 2019<br/>ISBN 9780367111236<br/>
Network Forensics
ent://SD_ILS/0/SD_ILS:873173
2024-04-30T18:44:21Z
2024-04-30T18:44:21Z
by Messier, Ric, author<br/>Author Messier, Ric, author<br/>Format: Books<br/>Call Number TK5105.59 M47 2017<br/>Publication Date 2017<br/>ISBN 9781119328285<br/>
Web security : a WhiteHat perspective
ent://SD_ILS/0/SD_ILS:835869
2024-04-30T18:44:21Z
2024-04-30T18:44:21Z
by Hanqing, Wu, author<br/>Author Hanqing, Wu, author, Zhao, Liz, author<br/>Format: Books<br/>Call Number TK5105.59 H363 2015<br/>Publisher CRC Press is an imprint of Taylor & Francis ; Publishing House of Electronics Industry,<br/>Publication Date 2015<br/>ISBN 9781466592612<br/>
Computational network science : an algorithmic approach
ent://SD_ILS/0/SD_ILS:838372
2024-04-30T18:44:21Z
2024-04-30T18:44:21Z
by Hexmoor, Henry, author<br/>Author Hexmoor, Henry, author<br/>Format: Books<br/>Call Number TK5105.59 H49 2015<br/>Publisher Morgan Kaufmann,<br/>Publication Date 2015<br/>ISBN 9780128008911<br/>
Advances in secure computing, internet services, and applications
ent://SD_ILS/0/SD_ILS:841203
2024-04-30T18:44:21Z
2024-04-30T18:44:21Z
by Tripathy, B. K. editor<br/>Author Tripathy, B. K. editor, Acharjya, D. P. editor<br/>Format: Books<br/>Call Number TK5105.59 A38 2014 f<br/>Publisher Information Science Reference, an imprint of IGI Global,<br/>Publication Date 2014<br/>ISBN 9781466649408<br/>
Windows forensic analysis toolkit : advanced analysis techniques for Windows 8
ent://SD_ILS/0/SD_ILS:838076
2024-04-30T18:44:21Z
2024-04-30T18:44:21Z
by Carvey, Harlan A., author<br/>Author Carvey, Harlan A., author<br/>Format: Books<br/>Call Number HV8079.C65 C374 2014<br/>Edition Fourth edition<br/>Publisher Syngress,<br/>Publication Date 2014<br/>ISBN 9780124171572<br/>
Trust, privacy, and security in digital business : 10th International conference, TrustBus 2013, Prague, Czech Republic, August 28-29, 2013 : proceedings
ent://SD_ILS/0/SD_ILS:819648
2024-04-30T18:44:21Z
2024-04-30T18:44:21Z
by TrustBus (Conference) (10th : 2013 : Prague, Czech Republic)<br/>Author TrustBus (Conference) (10th : 2013 : Prague, Czech Republic), Furnell, Steven, 1970-, Lambrinoudakis, Costas, López, Javier<br/>Format: Books<br/>Call Number HF5548.32 T78 2013<br/>Edition 1st ed.<br/>Publisher Springer,<br/>Publication Date 2013<br/>ISBN 9783642403422<br/>
Staying safe online in simple steps
ent://SD_ILS/0/SD_ILS:816086
2024-04-30T18:44:21Z
2024-04-30T18:44:21Z
by Ballew, Joli<br/>Author Ballew, Joli<br/>Format: Books<br/>Call Number TK5105.59 B355 2012<br/>Publisher Pearson,<br/>Publication Date 2012<br/>ISBN 9780273774730<br/>
Digital forensics for network, internet, and cloud computing : a forensic evidence guide for moving targets and data
ent://SD_ILS/0/SD_ILS:640462
2024-04-30T18:44:21Z
2024-04-30T18:44:21Z
by Lillard, Terrence V.<br/>Author Lillard, Terrence V., Lillard, Terrence<br/>Format: Books<br/>Call Number HV8079.C65 D54 2010<br/>Publisher Syngress,<br/>Publication Date 2010<br/>ISBN 9781597495370<br/>
Network intrusion detection and prevention : concepts and techniques
ent://SD_ILS/0/SD_ILS:334955
2024-04-30T18:44:21Z
2024-04-30T18:44:21Z
by Ali A. Ghorbani<br/>Author Ali A. Ghorbani, Lu, Wei, Tavallaee, Mahbod<br/>Format: Books<br/>Call Number TK5105.59 A43 2010<br/>Publisher Springer,<br/>Publication Date 2010<br/>ISBN 9780387887708<br/>
Disappearing cryptography : information hiding : steganography and watermarking
ent://SD_ILS/0/SD_ILS:335029
2024-04-30T18:44:21Z
2024-04-30T18:44:21Z
by Wayner, Peter<br/>Author Wayner, Peter<br/>Format: Books<br/>Call Number TK5105.59 W39 2009<br/>Edition 3rd ed.<br/>Publisher Morgan Kaufmann,<br/>Publication Date 2009<br/>ISBN 9780123744791<br/>
Securing the information infrastructure
ent://SD_ILS/0/SD_ILS:631867
2024-04-30T18:44:21Z
2024-04-30T18:44:21Z
by Kizza, Joseph Migga<br/>Author Kizza, Joseph Migga, Kizza, Florence Migga<br/>Format: Books<br/>Call Number HV6773 K59 2008<br/>Publisher Cybertech Pub.,<br/>Publication Date 2008<br/>ISBN 9781599043791 9781599043814<br/>
ICT futures : delivering pervasive, real-time and secure services
ent://SD_ILS/0/SD_ILS:288455
2024-04-30T18:44:21Z
2024-04-30T18:44:21Z
by Warren, Paul<br/>Author Warren, Paul, Davies, J., Brown, David<br/>Format: Books<br/>Call Number TK5102.5 I95 2008<br/>Publisher Wiley,<br/>Publication Date 2008<br/>ISBN 9780470997703<br/>
Cryptography and network security
ent://SD_ILS/0/SD_ILS:353804
2024-04-30T18:44:21Z
2024-04-30T18:44:21Z
by Kahate, Atul<br/>Author Kahate, Atul<br/>Format: Books<br/>Call Number TK5105.59 K33 2008<br/>Edition 2nd ed.,<br/>Publisher Tata McGraw-Hill,<br/>Publication Date 2008<br/>ISBN 9780070648234<br/>
Trust and new technologies : marketing and management on the Internet and mobile media
ent://SD_ILS/0/SD_ILS:323829
2024-04-30T18:44:21Z
2024-04-30T18:44:21Z
by Kautonen, Teemu<br/>Author Kautonen, Teemu, Karjaluoto, Heikki<br/>Format: Books<br/>Call Number HF5415.1265 T78 2008<br/>Publisher Northampton, MA : Edward Elgar,<br/>Publication Date 2008<br/>ISBN 9781847205681<br/>
Synchronizing internet protocol security (SIPSec)
ent://SD_ILS/0/SD_ILS:209758
2024-04-30T18:44:21Z
2024-04-30T18:44:21Z
by Shoniregun, Charles A.<br/>Author Shoniregun, Charles A.<br/>Format: Books<br/>Call Number TK5105.875.I57 S56 2007<br/>Publisher Springer,<br/>Publication Date 2007<br/>ISBN 9780387327242<br/><a href="http://dx.doi.org/10.1007/978-0-387-68569-4">Fulltext</a><br/>
Practical internet security
ent://SD_ILS/0/SD_ILS:158413
2024-04-30T18:44:21Z
2024-04-30T18:44:21Z
by Vacca, John R.<br/>Author Vacca, John R.<br/>Format: Books<br/>Call Number TK5105.59 V324 2007<br/>Publisher Springer,<br/>Publication Date 2007<br/>ISBN 9780387405339<br/><a href="http://dx.doi.org/10.1007/978-0-387-29844-3">FullText</a><br/>
Hackers challenge 3 : 20 brand-new forensic scenarios & solutions
ent://SD_ILS/0/SD_ILS:100571
2024-04-30T18:44:21Z
2024-04-30T18:44:21Z
by Pollino, David<br/>Author Pollino, David<br/>Format: Books<br/>Call Number QA76.9.A25 H324 2006<br/>Publisher McGraw-Hill,<br/>Publication Date 2006<br/>ISBN 9780072263046<br/>
Understanding Voice over IP security
ent://SD_ILS/0/SD_ILS:91890
2024-04-30T18:44:21Z
2024-04-30T18:44:21Z
by Johnson, Alan B.<br/>Author Johnson, Alan B., Piscitello, David M.<br/>Format: Books<br/>Call Number TK5105.8865 J63 2006<br/>Publisher Artech House,<br/>Publication Date 2006<br/>ISBN 9781596930506<br/>
Extrusion detection : security monitoring for internal intrusions
ent://SD_ILS/0/SD_ILS:470452
2024-04-30T18:44:21Z
2024-04-30T18:44:21Z
by Bejtlich, Richard<br/>Author Bejtlich, Richard<br/>Format: Books<br/>Call Number TK5105.59 B44 2006<br/>Publisher Addison-Wesley,<br/>Publication Date 2006<br/>ISBN 9780321349965<br/>
Windows forensics : the field guide for corporate computer investigations
ent://SD_ILS/0/SD_ILS:277857
2024-04-30T18:44:21Z
2024-04-30T18:44:21Z
by Steel, Chad<br/>Author Steel, Chad<br/>Format: Books<br/>Call Number HV8079.C65 S84 2006<br/>Publisher Wiley Pub.,<br/>Publication Date 2006<br/>ISBN 9780470038628<br/>
Professional pen testing for Web applications
ent://SD_ILS/0/SD_ILS:132813
2024-04-30T18:44:21Z
2024-04-30T18:44:21Z
by Andreu, Andres, 1968-<br/>Author Andreu, Andres, 1968-<br/>Format: Books<br/>Call Number QA76.9.A25 A525 2006<br/>Publisher Wiley Pub.,<br/>Publication Date 2006<br/>ISBN 9780471789666<br/>
Scalable and secure internet services and architecture
ent://SD_ILS/0/SD_ILS:156614
2024-04-30T18:44:21Z
2024-04-30T18:44:21Z
by Xu, Chengzhong<br/>Author Xu, Chengzhong<br/>Format: Books<br/>Call Number TK5105.875.I57 X82 2005<br/>Publisher Chapman & Hall,<br/>Publication Date 2005<br/>ISBN 9781584883777<br/>
The executive guide to information security : threats, challenges, and solutions
ent://SD_ILS/0/SD_ILS:430485
2024-04-30T18:44:21Z
2024-04-30T18:44:21Z
by Egan, Mark<br/>Author Egan, Mark<br/>Format: Books<br/>Call Number HF5548.32 E32 2005<br/>Publisher Addison-Wesley,<br/>Publication Date 2005<br/>ISBN 9780321304513<br/>
Network firewall development with multilevel security policy
ent://SD_ILS/0/SD_ILS:395124
2024-04-30T18:44:21Z
2024-04-30T18:44:21Z
by Cahyo Crysdian<br/>Author Cahyo Crysdian, Abdul Hanan Abdullah, International Conference on Computer Theory and Applications (14th. : 2004 : Egypt)<br/>Format: Books<br/>Call Number TK5105.59 C334 2004<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2004<br/>
Principles and practice of information security : protecting computers from hackers and lawyers
ent://SD_ILS/0/SD_ILS:389219
2024-04-30T18:44:21Z
2024-04-30T18:44:21Z
by Volonino, Linda<br/>Author Volonino, Linda, Robinson, Stephen R., Volonino, Charles P.<br/>Format: Books<br/>Call Number TK5105.59 V64 2004<br/>Publisher Pearson/Prentice Hall,<br/>Publication Date 2004<br/>ISBN 9780131840270<br/>
Defense and detection strategies against Internet worms
ent://SD_ILS/0/SD_ILS:417839
2024-04-30T18:44:21Z
2024-04-30T18:44:21Z
by Nazario, Jose<br/>Author Nazario, Jose<br/>Format: Books<br/>Call Number QA76.9.A25 N394 2004<br/>Publisher Artech House,<br/>Publication Date 2004<br/>ISBN 9781580535373<br/>
Designing network security
ent://SD_ILS/0/SD_ILS:135032
2024-04-30T18:44:21Z
2024-04-30T18:44:21Z
by Kaeo, Merike<br/>Author Kaeo, Merike<br/>Format: Books<br/>Call Number TK5105.59 K34 2004<br/>Edition 2nd ed.<br/>Publisher Cisco Press,<br/>Publication Date 2004<br/>ISBN 9781587051173<br/>
Security + guide to network security fundamentals
ent://SD_ILS/0/SD_ILS:364391
2024-04-30T18:44:21Z
2024-04-30T18:44:21Z
by Cisco Learning Institute<br/>Author Cisco Learning Institute, Campbell, Paul, Calvert, Ben, Boswell, Steven<br/>Format: Books<br/>Call Number TK5105.59 C57 2003<br/>Publisher Thomson Learning,<br/>Publication Date 2003<br/>ISBN 9780619212940<br/>
Hacker V : pakar keselamatan rangkaian Norton Internet security
ent://SD_ILS/0/SD_ILS:411441
2024-04-30T18:44:21Z
2024-04-30T18:44:21Z
by Man, P. C.<br/>Author Man, P. C.<br/>Format: Books<br/>Call Number TK5105.59 H32 2003<br/>Publisher King Information,<br/>Publication Date 2003<br/>ISBN 9789861250694<br/>
Network intrusion detection
ent://SD_ILS/0/SD_ILS:386349
2024-04-30T18:44:21Z
2024-04-30T18:44:21Z
by Northcutt, Stephen<br/>Author Northcutt, Stephen, Novak, Judy<br/>Format: Books<br/>Call Number TK5105.59 N673 2003<br/>Edition 3rd ed.<br/>Publisher New Riders,<br/>Publication Date 2003<br/>ISBN 9780735712652<br/>
Financial cryptography : 6th International Conference, FC 2002 Southampton, Bermuda, March 11-14, 2002 : revised papers
ent://SD_ILS/0/SD_ILS:397182
2024-04-30T18:44:21Z
2024-04-30T18:44:21Z
by International conference Financial cryptography, (6th : 2002 : Southamton, Bermuda Islands)<br/>Author International conference Financial cryptography, (6th : 2002 : Southamton, Bermuda Islands), Blaze, Matt<br/>Format: Books<br/>Call Number HG1710 F56 2003<br/>Publisher Springer-Verlag,<br/>Publication Date 2003<br/>ISBN 9783540006466<br/>
Enforcing multilevel security policies for network firewall
ent://SD_ILS/0/SD_ILS:352173
2024-04-30T18:44:21Z
2024-04-30T18:44:21Z
by Cahyo Crysdian<br/>Author Cahyo Crysdian, Abdul Hanan Abdullah, Mohd. Aizaini Maarof, International Conference Information Technology in Asia (2003 : Kuching, Sarawak)<br/>Format: Books<br/>Call Number TK5105.59 C34 2003<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2003<br/>
A Benchmarking methodology for NPU-based stateful firewall
ent://SD_ILS/0/SD_ILS:352612
2024-04-30T18:44:21Z
2024-04-30T18:44:21Z
by Lee, Eng Kean<br/>Author Lee, Eng Kean, Sulaiman Mohd. Nor, IEEE Asia Pacific Conference on Communication APCC 2003 (9th : 2003 : Penang)<br/>Format: Books<br/>Call Number TK5105.59 L44 2003<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2003<br/>
Network security : a beginner's guide
ent://SD_ILS/0/SD_ILS:347401
2024-04-30T18:44:21Z
2024-04-30T18:44:21Z
by Maiwald, Eric<br/>Author Maiwald, Eric<br/>Format: Books<br/>Call Number TK5105.59 M35 2003<br/>Edition 2nd ed.<br/>Publisher McGraw-Hill/Osborne,<br/>Publication Date 2003<br/>ISBN 9780072229578<br/>
Access controlling firewall using Bell-LaPadula security model
ent://SD_ILS/0/SD_ILS:353549
2024-04-30T18:44:21Z
2024-04-30T18:44:21Z
by Cahyo Crysdian<br/>Author Cahyo Crysdian, Abdul Hanan Abdullah, Quality in Research Seminar (6th : 2003 : Indonesia)<br/>Format: Books<br/>Call Number TK5105.59 C33 2003<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2003<br/>
Cryptography and network security
ent://SD_ILS/0/SD_ILS:354853
2024-04-30T18:44:21Z
2024-04-30T18:44:21Z
by Kahate, Atul<br/>Author Kahate, Atul<br/>Format: Books<br/>Call Number TK5105.59 K33 2003<br/>Publisher Tata McGraw-Hill,<br/>Publication Date 2003<br/>ISBN 9780070494831<br/>
Practical Unix and internet security
ent://SD_ILS/0/SD_ILS:334147
2024-04-30T18:44:21Z
2024-04-30T18:44:21Z
by Garfinkel, Simson<br/>Author Garfinkel, Simson, Spafford, Gene, Schwartz, Alan<br/>Format: Books<br/>Call Number TK5105.59 G37 2003<br/>Edition 3rd ed.<br/>Publisher O'Reilly & Associates,<br/>Publication Date 2003<br/>ISBN 9780596003234<br/>
Securing E-business systems : a guide for managers and executives
ent://SD_ILS/0/SD_ILS:370726
2024-04-30T18:44:21Z
2024-04-30T18:44:21Z
by Braithwaite, Timothy, 1942-<br/>Author Braithwaite, Timothy, 1942-<br/>Format: Books<br/>Call Number HF5548.32 B72 2002<br/>Publisher John Wiley,<br/>Publication Date 2002<br/>ISBN 9780471072980<br/>
Internet and wireless security
ent://SD_ILS/0/SD_ILS:475589
2024-04-30T18:44:21Z
2024-04-30T18:44:21Z
by Temple, Robert, 1963-<br/>Author Temple, Robert, 1963-, Regnault, John<br/>Format: Books<br/>Call Number TK5105.59 I55 2002<br/>Publisher Institution of Electrical Engineers,<br/>Publication Date 2002<br/>ISBN 9780852961971<br/>
Packet filtering personal firewall based on microsoft's internet protocol helper API
ent://SD_ILS/0/SD_ILS:326714
2024-04-30T18:44:21Z
2024-04-30T18:44:21Z
by Abdul Hanan Abdullah<br/>Author Abdul Hanan Abdullah, Lau, Sei Ping, International Arab Conference on Information Technology (2002 : University of Qatar, Doha, Qatar)<br/>Format: Books<br/>Call Number TK5105.59 A32 2002<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2002<br/>
Implementation of Brands' digital cash system in TCP/IP networking environment
ent://SD_ILS/0/SD_ILS:327744
2024-04-30T18:44:21Z
2024-04-30T18:44:21Z
by Teo, Pock Chueng<br/>Author Teo, Pock Chueng, Ahmad Zuri Sha'ameri, Zulkarnain Mohd. Yusof, International Symposium on Information and Communications Technologies (2002 : Selangor)<br/>Format: Books<br/>Call Number HG1710 T46 2002<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2002<br/>
File access permission change detection using immunological negative selection approach
ent://SD_ILS/0/SD_ILS:328443
2024-04-30T18:44:21Z
2024-04-30T18:44:21Z
by Mohd. Yazid Idris<br/>Author Mohd. Yazid Idris, Abdul Hanan Abdullah, Mohd. Aizaini Maarof, International Arab Conference on Information Technology (2002 : University of Qatar, Doha, Qatar)<br/>Format: Books<br/>Call Number TK5105.59 M92 2002<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2002<br/>
Authentication protocol : methods review
ent://SD_ILS/0/SD_ILS:326821
2024-04-30T18:44:21Z
2024-04-30T18:44:21Z
by Cahyo Crysdian<br/>Author Cahyo Crysdian, Abdul Hanan Abdullah, International Technical Conference on Circuits, Systems, Computer and Communications (2002 : Thailand)<br/>Format: Books<br/>Call Number QA76.9.A25 C35 2002<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2002<br/>
MCSE guide to microsoft internet security and acceleration ( ISA ) server 2000 /Jeremy Cioara
ent://SD_ILS/0/SD_ILS:328105
2024-04-30T18:44:21Z
2024-04-30T18:44:21Z
by Cioara, Jeremy<br/>Author Cioara, Jeremy<br/>Format: Books<br/>Call Number TK5105.875.I57 C56 2002<br/>Publisher Course Technology/Thomson ,<br/>Publication Date 2002<br/>ISBN 9780619062064<br/>
Security planning and disaster recovery
ent://SD_ILS/0/SD_ILS:341667
2024-04-30T18:44:21Z
2024-04-30T18:44:21Z
by Maiwald, Eric<br/>Author Maiwald, Eric, Sieglein, William<br/>Format: Books<br/>Call Number TK5105.59 M36 2002<br/>Publisher McGraw-Hill Osborne,<br/>Publication Date 2002<br/>ISBN 9780072224634<br/>
Internet and intranet security
ent://SD_ILS/0/SD_ILS:303203
2024-04-30T18:44:21Z
2024-04-30T18:44:21Z
by Oppliger, Rolf<br/>Author Oppliger, Rolf<br/>Format: Books<br/>Call Number TK5105.875.I57 O67 2002<br/>Edition 2nd ed.<br/>Publisher Artech House,<br/>Publication Date 2002<br/>ISBN 9781580531665<br/>
Network intrusion detection : an analyst's handbook
ent://SD_ILS/0/SD_ILS:159454
2024-04-30T18:44:21Z
2024-04-30T18:44:21Z
by Northcutt, Stephen<br/>Author Northcutt, Stephen, Novak, Judy, McLachlan, Donald<br/>Format: Books<br/>Call Number TK5105.59 N673 2000<br/>Edition 2nd ed.<br/>Publisher New Riders,<br/>Publication Date 2001<br/>ISBN 9780735710085<br/>
Security and privacy for e-commerce
ent://SD_ILS/0/SD_ILS:170004
2024-04-30T18:44:21Z
2024-04-30T18:44:21Z
by Ghosh, Anup K.<br/>Author Ghosh, Anup K.<br/>Format: Books<br/>Call Number HF5548.32 G57 2001<br/>Publisher Wiley,<br/>Publication Date 2001<br/>ISBN 9780471384212<br/>
Network security : a beginner's guide
ent://SD_ILS/0/SD_ILS:340640
2024-04-30T18:44:21Z
2024-04-30T18:44:21Z
by Maiwald, Eric<br/>Author Maiwald, Eric<br/>Format: Books<br/>Call Number TK5105.59 M35 2001<br/>Publisher McGraw-Hill/Osborne,<br/>Publication Date 2001<br/>ISBN 9780072133240<br/>
Non-repudiation in electronic commerce
ent://SD_ILS/0/SD_ILS:317073
2024-04-30T18:44:21Z
2024-04-30T18:44:21Z
by Zhou, Jianying<br/>Author Zhou, Jianying<br/>Format: Books<br/>Call Number HF5548.32 Z49 2001<br/>Publisher Artech House,<br/>Publication Date 2001<br/>ISBN 9781580532471<br/>
Agent technology approach for proxy server
ent://SD_ILS/0/SD_ILS:331108
2024-04-30T18:44:21Z
2024-04-30T18:44:21Z
by Fazidah Othman<br/>Author Fazidah Othman, Abdul Hanan Abdullah, Malaysian Science and Technology Congress (2000 : Genting Highlands, Pahang)<br/>Format: Books<br/>Call Number TK5105.59 F39 2000<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2001 2000<br/>
The complete guide to internet security
ent://SD_ILS/0/SD_ILS:137665
2024-04-30T18:44:21Z
2024-04-30T18:44:21Z
by Merkow, Mark S.<br/>Author Merkow, Mark S., Breithaupt, Jim<br/>Format: Books<br/>Call Number TK5105.875.I57 M47 2000<br/>Publisher Amacom,<br/>Publication Date 2000<br/>ISBN 9780814470701<br/>
Electronic commerce relationships : trust by design
ent://SD_ILS/0/SD_ILS:141849
2024-04-30T18:44:21Z
2024-04-30T18:44:21Z
by Keen, Peter<br/>Author Keen, Peter<br/>Format: Books<br/>Call Number HF5548.32 E53 2000<br/>Publisher Prentice Hall,<br/>Publication Date 2000<br/>ISBN 9780130170378<br/>
iPRO agent
ent://SD_ILS/0/SD_ILS:146591
2024-04-30T18:44:21Z
2024-04-30T18:44:21Z
by Fazidah Othman<br/>Author Fazidah Othman, Abdul Hanan Abdullah, Malaysian Science and Technology Congress (2000 : Genting Highlands, Pahang)<br/>Format: Books<br/>Call Number TK5105.59 F38 2000<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2000<br/>
Network intrusion detection : an analyst's handbook
ent://SD_ILS/0/SD_ILS:155582
2024-04-30T18:44:21Z
2024-04-30T18:44:21Z
by Northcutt, Stephen<br/>Author Northcutt, Stephen<br/>Format: Books<br/>Call Number TK5105.59 N673 1999<br/>Publisher New Riders,<br/>Publication Date 1999<br/>ISBN 9780735708686<br/>
Designing network security
ent://SD_ILS/0/SD_ILS:129261
2024-04-30T18:44:21Z
2024-04-30T18:44:21Z
by Kaeo, Merike<br/>Author Kaeo, Merike<br/>Format: Books<br/>Call Number TK5105.59 K34 1999<br/>Publisher Cisci Press,<br/>Publication Date 1999<br/>ISBN 9781578700431<br/>
E-commerce security strategies : protecting the enterprise
ent://SD_ILS/0/SD_ILS:136356
2024-04-30T18:44:21Z
2024-04-30T18:44:21Z
by Cameron, Debra<br/>Author Cameron, Debra<br/>Format: Books<br/>Call Number HF5548.32 C353 1998 f<br/>Publisher Computer Technology Research,<br/>Publication Date 1998<br/>ISBN 9781566070577<br/>
E-commerce security : weak links, best defenses
ent://SD_ILS/0/SD_ILS:114354
2024-04-30T18:44:21Z
2024-04-30T18:44:21Z
by Ghosh, Anup K.<br/>Author Ghosh, Anup K.<br/>Format: Books<br/>Call Number HF5548.32 G56 1998<br/>Publisher John Wiley,<br/>Publication Date 1998<br/>ISBN 9780471192237<br/>
Intranet security : stories from the trenches
ent://SD_ILS/0/SD_ILS:481417
2024-04-30T18:44:21Z
2024-04-30T18:44:21Z
by McCarthy, Linda<br/>Author McCarthy, Linda<br/>Format: Books<br/>Call Number TK5105.875.I6 M33 1998<br/>Publisher Sun Microsystems Press,<br/>Publication Date 1998<br/>ISBN 9780138947590<br/>
Intranet firewalls : planning & implementing your network security system
ent://SD_ILS/0/SD_ILS:456836
2024-04-30T18:44:21Z
2024-04-30T18:44:21Z
by Fuller, Scott<br/>Author Fuller, Scott, Pagan, Kevin<br/>Format: Books<br/>Call Number TK5105.59 F84 1996<br/>Publisher Ventana Communications Group, Inc.,<br/>Publication Date 1997<br/>ISBN 9781566045063<br/>
Digital cash : commerce on the net
ent://SD_ILS/0/SD_ILS:468154
2024-04-30T18:44:21Z
2024-04-30T18:44:21Z
by Wayner, Peter<br/>Author Wayner, Peter<br/>Format: Books<br/>Call Number HG1710 W39 1997<br/>Edition 2nd ed<br/>Publisher AP Professional,<br/>Publication Date 1997<br/>ISBN 9780127887722<br/>
Internet security : risk analysis, strategies and firewalls
ent://SD_ILS/0/SD_ILS:462849
2024-04-30T18:44:21Z
2024-04-30T18:44:21Z
by Kyas, Othmar<br/>Author Kyas, Othmar<br/>Format: Books<br/>Call Number TK5105.875.I57 K92 1997<br/>Publisher International Thomson Computer Press,<br/>Publication Date 1997<br/>ISBN 9781850323020<br/>
Digital crime : policing the cybernation
ent://SD_ILS/0/SD_ILS:487305
2024-04-30T18:44:21Z
2024-04-30T18:44:21Z
by Barrett, Neil<br/>Author Barrett, Neil<br/>Format: Books<br/>Call Number TK5105.875.I57 B36 1997<br/>Publisher Kogan Page,<br/>Publication Date 1997<br/>ISBN 9780749420970<br/>
Internet security : professional reference
ent://SD_ILS/0/SD_ILS:94244
2024-04-30T18:44:21Z
2024-04-30T18:44:21Z
by Atkins, Derek<br/>Author Atkins, Derek<br/>Format: Books<br/>Call Number TK5105.875 I57 1997<br/>Edition 2nd ed.<br/>Publisher New Riders Pub.,<br/>Publication Date 1997<br/>ISBN 9781562057602<br/>
Internet security for business
ent://SD_ILS/0/SD_ILS:112376
2024-04-30T18:44:21Z
2024-04-30T18:44:21Z
by Bernstein, Terry<br/>Author Bernstein, Terry<br/>Format: Books<br/>Call Number HD30.38 I57 1996<br/>Publisher John Wiley,<br/>Publication Date 1996<br/>ISBN 9780471137528<br/>
Network and Internet security
ent://SD_ILS/0/SD_ILS:424640
2024-04-30T18:44:21Z
2024-04-30T18:44:21Z
by Ahuja, Vijay<br/>Author Ahuja, Vijay<br/>Format: Books<br/>Call Number TK5105.59 A38 1996<br/>Publisher AP Professional,<br/>Publication Date 1996<br/>ISBN 9780120455959<br/>
What you need to know : bandits on the information superhighway
ent://SD_ILS/0/SD_ILS:477227
2024-04-30T18:44:21Z
2024-04-30T18:44:21Z
by Barrett, Daniel J.<br/>Author Barrett, Daniel J.<br/>Format: Books<br/>Call Number HV6773 B37 1992<br/>Publisher O'Reilly & Associates,<br/>Publication Date 1996<br/>ISBN 9781565921566<br/>
Internet firewalls and network security
ent://SD_ILS/0/SD_ILS:368519
2024-04-30T18:44:21Z
2024-04-30T18:44:21Z
by Hare, R. Christopher E.<br/>Author Hare, R. Christopher E., Siyan, Karanjit S.<br/>Format: Books<br/>Call Number TK5105.875.I57 H27 1995<br/>Publisher New Riders Pub.,<br/>Publication Date 1995<br/>ISBN 9781562054373<br/>
The computer privacy handbook
ent://SD_ILS/0/SD_ILS:410431
2024-04-30T18:44:21Z
2024-04-30T18:44:21Z
by Bacard, Andre<br/>Author Bacard, Andre<br/>Format: Books<br/>Call Number QA76.9.A25 B32 1995<br/>Publisher Peachpit Press,<br/>Publication Date 1995<br/>ISBN 9781566091718<br/>
Implementing internet security
ent://SD_ILS/0/SD_ILS:458580
2024-04-30T18:44:21Z
2024-04-30T18:44:21Z
by Cooper, Frederic J.<br/>Author Cooper, Frederic J.<br/>Format: Books<br/>Call Number TK5105.59 I46 1995<br/>Publisher New Riders,<br/>Publication Date 1995<br/>ISBN 9781562054717<br/>
Firewalls and Internet security : repelling the wily hacker
ent://SD_ILS/0/SD_ILS:410439
2024-04-30T18:44:21Z
2024-04-30T18:44:21Z
by Cheswick, William R.<br/>Author Cheswick, William R., Bellovin, Steven M.<br/>Format: Books<br/>Call Number TK5105.875.I57 C43 1994<br/>Publisher Addison-Wesley,<br/>Publication Date 1994<br/>ISBN 9780201633573<br/>