|
# | Type | Title | Auther(s)\ Publisher | Pub. Year |
1. |
Book
|
The stephen cobb complete book of PC and LAN security
|
Cobb, Stephen
|
1990
|
2. |
Book
|
Cryptography and network security : principles and practice
|
William Stallings
|
1998
|
3. |
Book
|
Hacking exposed: network security, secrets and solutions
|
Scambray, Joel
Mcclure, Stuart
Kurtz, George
|
2001
|
4. |
Book
|
Windows 2000 security handbook
|
Cox, Philip
Sheldon, Tom
|
2001
|
5. |
Book
|
Windows 2000 user management
|
Sanders, Lori
|
2000
|
6. |
Book
|
Firewalls : a complete guide
|
Marcus Goncalves
|
2000
|
7. |
Book
|
Practical firewalls
|
Ogletree, Terry William
|
2000
|
8. |
Book
|
Configuring Windows 2000 server security
|
Syngress Media
|
2000
|
9. |
Book
|
IT manager's guide to virtual private networks
|
Clark, David Leon
|
1999
|
10. |
Book
|
Cisco network security
|
Pike, James
|
2001
|
11. |
Book
|
Security complete
|
SYBEX
|
2001
|
12. |
Book
|
Financial cryptography : First International Conference, FC '97, Anguilla, British West Indies, February 24-28, 1997 : proceedings
|
Rafael Hirschfeld (ed.)
|
1997
|
13. |
Book
|
Maximum security
|
Sams
|
2001
|
14. |
Book
|
Information security risk analysis
|
Peltier, Thomas R.
|
2001
|
15. |
Book
|
Security and privacy for e-business
|
Ghosh, Anup K.
|
2001
|
16. |
Book
|
How secure is your wireless network? safeguarding your Wi-Fi Lan
|
Barken, Lee
|
2004
|
17. |
Book
|
Wireless operational security
|
Rittinghouse, John W.
Ransome, James F.
|
2004
|
18. |
Book
|
Public key infrastructure: building trusted applications and web services
|
John R. Vacca
|
2004
|
19. |
Book
|
Defend I.T. : security by example
|
Ajay Gupta, Scott Laliberte
|
2004
|
20. |
Book
|
Designing network security
|
Merike Kaeo
|
2004
|
21. |
Book
|
Cisco network security troubleshooting handbook
|
Mynul Hoda
|
2006
|
22. |
Book
|
A simple guide to security and privacy on your PC
|
Manon Cassade
|
2000
|
23. |
Book
|
Microsoft Windows XP networking and security: inside out: also covers Windows 2000
|
Ed Bott, Carl Siechert
|
2006
|
24. |
Book
|
Network security: a practical approach
|
Jan L. Harrington
|
2006
|
25. |
Book
|
IT governance: a manager's guide to data security and BS 7799-ISO 17799
|
Alan Calder, Steve Watkins
|
2005
|
26. |
Book
|
Internet security: a jumpstart for systems administrators and IT managers
|
Tim Speed, Juanita Ellis
|
2003
|
27. |
Book
|
Network security: current status and future directions
|
edited by Christos Douligeris, Dimitrios N. Serpanos
|
2007
|
28. |
Book
|
Cryptography and network security: principles and practice
|
William Stallings
|
2006
|
29. |
Journal
|
Security and communication networks
|
John Wiley & Sons, Ltd.
|
Vol. 1, no. 1 (Jan.- Feb. 2008)-
|
30. |
Book
|
Cisco ASA, PIX, and FWSM firewall handbook
|
David Hucaby
|
2008
|
31. |
Book
|
Computer security: principles and practice
|
William Stallings, Lawrie Brown; with contributions by Mick Bauer, Michael Howard
|
2008
|
32. |
Book
|
Information security and cyber laws
|
Pankaj Sharma, Ashwin Perti
|
2010
|
33. |
Book
|
Information security and cyber laws
|
Pankaj Sharma
|
2011
|
34. |
Book
|
The art of enterprise information architecture: a systems-based approach for unlocking business insight
|
Mario Godinez ... [et al.]
|
2010
|
35. |
Book
|
Business data networks and security
|
Raymond R. Panko, Julia L. Panko
|
2013
|
36. |
Book
|
Principles of information security
|
Michael E. Whitman, Herbert J. Mattord
|
2013
|
37. |
Book
|
Network security
|
Neha Ghai
|
2012
|
38. |
Book
|
Network security : private communication in a public world
|
Charlie Kaufman, Radia Perlman, Mike Speciner
|
2013
|
39. |
Book
|
Information security and cyber laws
|
Sanjeev Puri
|
2014
|
40. |
Book
|
Computer and information security handbook
|
edited by John R. Vacca
|
2013
|
41. |
Book
|
Network security essentials : applications and standards
|
William Stallings
|
2014
|
42. |
Book
|
Security + guide to network security fundamentals
|
Mark Ciampa
|
2012
|
43. |
Book
|
Securing the virtual environment : how to defend the enterprise against attack
|
Davi Ottenheimer, Matthew Wallace
|
2012
|
44. |
Book
|
CompTIA security + (Exam SYO-301) : training kit
|
David Seidl, Mike Chapple, James Michael
|
2014
|
45. |
Book
|
Network security
|
Neha Ghai
|
2013
|
46. |
Book
|
Computer security: principles and practice
|
William Stallings, Lawrie Brown
|
2015
|
47. |
Book
|
Cryptography and network security: principles and practice
|
William Stallings; international edition contributions by Mohit P. Tahiliani
|
2014
|
48. |
Book
|
Principles of information security
|
Michael E. Whitman, Herbert J. Mattord
|
2016
|
49. |
Book
|
Computer security fundamentals
|
Chuck Easttom
|
2016
|
50. |
Book
|
Security + guide to network security fundamentals
|
Mark Ciampa
|
2018
|
51. |
Book
|
Security + guide to network security fundamentals
|
Mark Ciampa
|
2012
|
52. |
Book
|
Cryptography and network security: principles and practice
|
William Stallings; international edition contributions by Mohit P. Tahiliani
|
2023
|
|