Philadelphia University - Library & Information Resources


Retrieved Title(s):100
 
.
 
Publication type: Book
Tilte: Practical unix and internet security
Author(s):
Simson Garfinkel Gene Spafford
Publication Data:
Bonn: O'Reilly and associates, Inc.
Publication Year: 1996
ISBN: 1-56592-148-8
Copie(s) info.:
● Total number of Copie(s):2

 
.
 
Publication type: Book
Tilte: R X PC: The anti-virus handbook
Author(s):
Jenet Endrijonas
Publication Data:
Blue Ridge Summit: TAB Books
Publication Year: 1992
ISBN: 0-8306-4202-1
Copie(s) info.:
● Total number of Copie(s):1

 
.
 
Publication type: Book
Tilte: computer viruses: What they are, How the work, How ot avoid them
Author(s):
Jonathan L. Mayo
Publication Data:
Blue Ridge Summit: Wundcrest
Publication Year: 1989
ISBN: 0-8306-9582-6
Copie(s) info.:
● Total number of Copie(s):1

 
.
 
Publication type: Book
Tilte: Computer security basics
Author(s):
Deborah Russell G.T. Gangemi
Publication Data:
Sebastopol: O'Reilly & Associates
Publication Year: 1991
ISBN: 0-937175-71-4
Copie(s) info.:
● Total number of Copie(s):2

 
.
 
Publication type: Book
Tilte: The computer virus handbook
Author(s):
Richard B. Levin
Publication Data:
New York: Obsorne Mcgraw-Hill
Publication Year: 1990
ISBN: 0-07-881647-5
Copie(s) info.:
● Total number of Copie(s):2

 
.
 
Publication type: Book
Tilte: Unix system security: how to protect your data and prevent intruders
Author(s):
Rik Farrow
Publication Data:
Reading, Massachusetts: Addison-Wesley
Publication Year: 1990
ISBN: 0-201-57030-0
Copie(s) info.:
● Total number of Copie(s):1

 
.
 
Publication type: Book
Tilte: The stephen cobb complete book of PC and LAN security
Author(s):
Stephen Cobb
Publication Data:
N.Y: Windcrest
Publication Year: 1990
ISBN: 0-8306-9280-0
Copie(s) info.:
● Total number of Copie(s):1

 
.
 
Publication type: Book
Tilte: Unix security for the organization
Author(s):
R. Bringle Bryant
Publication Data:
Indianapolis: Sams publishing
Publication Year: 1994
Copie(s) info.:
● Total number of Copie(s):1

 
.
 
Publication type: Book
Tilte: Java security
Author(s):
Gary Mcgraw Edward Felten
Publication Data:
New York: John Wiley & Sons
Publication Year: 1996
Copie(s) info.:
● Total number of Copie(s):1

 
.
 
Publication type: Book
Tilte: Fundamentals of computer security technology
Author(s):
Edward G. Amoroso
Publication Data:
New Jersey: Prentice Hall
Publication Year: 1994
ISBN: 0-13-108929-3
Copie(s) info.:
● Total number of Copie(s):2

 
.
 
Publication type: Book
Tilte: Security in computing
Author(s):
Charles P. Pfleeger (Author),
Publication Data:
Upper Saddle River, New Jersey: Prentice Hall
Publication Year: 1997
Edition: 2nd ed.
Call Number: 005.8 PFL
ISBN: 0-13-185794-0
Copie(s) info.:
● Total number of Copie(s):2

 
.
 
Publication type: Book
Tilte: Cryptography and network security : principles and practice
Author(s):
William Stallings (Author),
Publication Data:
Upper Saddle River, New Jersey: Prentice Hall
Publication Year: 1998
Edition: 2nd ed.
ISBN: 0-13-869017-0
Copie(s) info.:
● Total number of Copie(s):2

 
.
 
Publication type: Book
Tilte: Introduction to data security and controls
Author(s):
Edward R. Buck
Publication Data:
Wellesley, Massachusetts: Q.E.D. Information Science, INC.
Publication Year: 1982
ISBN: 0-89435-062-5
Copie(s) info.:
● Total number of Copie(s):1

 
.
 
Publication type: Book
Tilte: Information and communications security: conference proceedings held in Beijing, China, 11 - 14, November, 1997
Author(s):
Yongfei Han Tatsuaki Okamoto Sihan Qing
Publication Data:
Berlin: Springer - Verlag
Publication Year: 1997
ISBN: 3-540-63696-x
Copie(s) info.:
● Total number of Copie(s):1

 
.
 
Publication type: Book
Tilte: Security protocols: workshop proceedings held in Cambridge, United Kingdom, 10 - 12 April, 1996
Author(s):
Mark Lomas
Publication Data:
Berlin: Springer - Verlag
Publication Year: 1997
ISBN: 3-540-62494-5
Copie(s) info.:
● Total number of Copie(s):1

 
.
 
Publication type: Book
Tilte: Information security and privacy: conference proceedings held in Brisbane, Australia, 13 - 15 July, 1998
Author(s):
Colin Boyd Ed Dawson
Publication Data:
Berlin: Springer - Verlag
Publication Year: 1998
ISBN: 3-540-64732-5
Copie(s) info.:
● Total number of Copie(s):1

 
.
 
Publication type: Book
Tilte: Digital signature schemes: general framework and fail-stop signatures
Author(s):
Birgit Pfitzmann
Publication Data:
Berlin: Springer - Verlag
Publication Year: 1996
ISBN: 3-540-61517-2
Copie(s) info.:
● Total number of Copie(s):1

 
.
 
Publication type: Book
Tilte: Hacking exposed: network security, secrets and solutions
Author(s):
Joel Scambray Stuart Mcclure George Kurtz
Publication Data:
Berkeley: Osborne/ McGraw - Hill
Publication Year: 2001
Edition: 2nd ed.
ISBN: 0-07-212748-1
Copie(s) info.:
● Total number of Copie(s):1

 
.
 
Publication type: Book
Tilte: Java security handbook
Author(s):
Jamie Jaworski Paul Perrone
Publication Data:
Indianapolis, Indiana: SAMS
Publication Year: 2000
Call Number: 005.8 JAW
ISBN: 0-0672-31602-1
Copie(s) info.:
● Total number of Copie(s):3

 
.
 
Publication type: Book
Tilte: Hacker attack
Author(s):
Richard Mansfield
Publication Data:
San Francisco: SYBEX
Publication Year: 2000
ISBN: 0-7821-2830-0
Copie(s) info.:
● Total number of Copie(s):3

 
.
 
Publication type: Book
Tilte: Protecting your web site with firewalls
Author(s):
Marcus Goncalves
Publication Data:
Upper Saddle River, New Jersey: Prentice - Hall
Publication Year: 1997
ISBN: 0-13-628207-5
Copie(s) info.:
● Total number of Copie(s):1

 
.
 
Publication type: Book
Tilte: Designing secure web-based applications for Microsoft Windows 2000
Author(s):
Michael Howard
Publication Data:
Redmond, Washington: Microsoft Press
Publication Year: 2000
ISBN: 0-7356-0995-0
Copie(s) info.:
● Total number of Copie(s):1

 
.
 
Publication type: Book
Tilte: Firewalls : a complete guide
Author(s):
Marcus Goncalves (Author),
Publication Data:
New York: McGraw - Hill
Publication Year: 2000
Call Number: 005.8 GON
ISBN: 0-07-135639-8
Copie(s) info.:
● Total number of Copie(s):1

 
.
 
Publication type: Book
Tilte: Practical firewalls
Author(s):
Terry William Ogletree
Publication Data:
Indianapolis, Indiana: Que
Publication Year: 2000
ISBN: 0-7892416-2
Copie(s) info.:
● Total number of Copie(s):2

 
.
 
Publication type: Book
Tilte: Developing secure applications with Visual Basic
Author(s):
Davis Chapman
Publication Data:
Indianapolis, Indiana: SAMS
Publication Year: 2000
ISBN: 0-672-31836-9
Copie(s) info.:
● Total number of Copie(s):3

 
.
 
Publication type: Book
Tilte: Information hiding: first international workshop, Cambridge, U.K., May 30 - June 1, 1996: Proceedings
Author(s):
Ross Anderson
Publication Data:
Berlin: Springer
Publication Year: 1996
ISBN: 3-540-61996-8
Copie(s) info.:
● Total number of Copie(s):1

 
.
 
Publication type: Book
Tilte: Advances in cryptology, 1981-1997: electronic proceedings and index of the crypto and Eurocrypt conferences 1981-1997
Author(s):
Kevin S. McCurley Claus Dieter Ziegler
Publication Data:
Berlin: Springer
Publication Year: 1998
ISBN: 3-540-65069-5
Copie(s) info.:
● Total number of Copie(s):1

 
.
 
Publication type: Book
Tilte: IT manager's guide to virtual private networks
Author(s):
David Leon Clark
Publication Data:
New York: McGraw - Hill
Publication Year: 1999
Call Number: 005.8 CLA
ISBN: 0-07-135202-3
Copie(s) info.:
● Total number of Copie(s):1

 
.
 
Publication type: Book
Tilte: Cisco network security
Author(s):
James Pike
Publication Data:
Upper Saddle River, New Jersey: Prentice - Hall
Publication Year: 2001
ISBN: 0-13-091518-1
Copie(s) info.:
● Total number of Copie(s):1

 
.
 
Publication type: Book
Tilte: Security complete

Publication Data:
San Francisco: SYBEX
Publication Year: 2001
ISBN: 0-7821-2968-4
Copie(s) info.:
● Total number of Copie(s):1

 
.
 
Publication type: Book
Tilte: Modern cryptography, probabilistic proofs and pseudorandomness
Author(s):
Oded Goldreich
Publication Data:
Berlin: Springer
Publication Year: 1999
ISBN: 3-540-64766-x
Copie(s) info.:
● Total number of Copie(s):1

 
.
 
Publication type: Book
Tilte: Information security: first international workshop, ISW'97, Tatsunokuchi, Ishikawa, Japan, September 17-19, 1997: Proceedings
Author(s):
Eiji Okamoto George Davida Masahiro Mambo
Publication Data:
Berlin: Springer
Publication Year: 1998
ISBN: 3-540-64382-6
Copie(s) info.:
● Total number of Copie(s):1

 
.
 
Publication type: Book
Tilte: Information security and privacy: 4th Australasian Conference, ACISP'99, Wollongong, NSW, Australia, April 7-9, 1999: Proceedings
Author(s):
Josef Pieprzyk Rei Safavi-Naini Jennifer Sebervy
Publication Data:
Berlin: Springer
Publication Year: 1999
ISBN: 3-540-65756-8
Copie(s) info.:
● Total number of Copie(s):1

 
.
 
Publication type: Book
Tilte: Information hiding:"second international workshop, IH'98: Portland, Oregon, USA, April 14-17, 1998: Proceedings
Author(s):
David Aucsmith
Publication Data:
Berlin: Springer
Publication Year: 1998
Copie(s) info.:
● Total number of Copie(s):1

 
.
 
Publication type: Book
Tilte: Security protocols: 6th international workshop, Cambridge, UK, April 15-17, 1998: proceedings
Author(s):
Bruce ... [et al.] Christianson
Publication Data:
Berlin: Springer
Publication Year: 1999
ISBN: 3-540-65663-4
Copie(s) info.:
● Total number of Copie(s):1

 
.
 
Publication type: Book
Tilte: Maximum Windows 2000 security
Author(s):
Anonymous
Publication Data:
Indianapolis, Indiana: Sams
Publication Year: 2002
Copie(s) info.:
● Total number of Copie(s):1

 
.
 
Publication type: Book
Tilte: Maximum security
Author(s):
Anonymous
Publication Data:
Indianapolis, Indiana: Sams
Publication Year: 2001
Edition: 3rd ed
ISBN: 0-672-31871-7
Copie(s) info.:
● Total number of Copie(s):1

 
.
 
Publication type: Book
Tilte: .NET framework security
Author(s):
Brian A....[et al.] LaMacchia
Publication Data:
Boston: Addison - Wesley
Publication Year: 2002
ISBN: 0-672-32184-X
Copie(s) info.:
● Total number of Copie(s):1

 
.
 
Publication type: Book
Tilte: Information security architecture: an integrated approach to security in the organization
Author(s):
Jan Killmeyer Tudor
Publication Data:
Boca Raton: Auerbach
Publication Year: 2000
ISBN: 0-8493-9988-2
Copie(s) info.:
● Total number of Copie(s):1

 
.
 
Publication type: Book
Tilte: Information security risk analysis
Author(s):
Thomas R. Peltier
Publication Data:
Boca Raton: Auerbach
Publication Year: 2001
ISBN: 0-8493-0880-1
Copie(s) info.:
● Total number of Copie(s):1

 
.
 
Publication type: Book
Tilte: Security in computing
Author(s):
Charles P. Pfleeger (Author), Shari Lawrence Pfleeger (Author),
Publication Data:
Upper Saddle River, New Jersey: Prentice Hall
Publication Year: 2003
Edition: 3rd ed.
Call Number: 005.8 PFL
ISBN: 0-13-035548-8
Copie(s) info.:
● Total number of Copie(s):13

 
.
 
Publication type: Book
Tilte: How secure is your wireless network? safeguarding your Wi-Fi Lan
Author(s):
Lee Barken (AUTHOR),
Publication Data:
Upper Saddle River, New Jersey: Prentice Hall
Publication Year: 2004
Call Number: 005.8 BAR
ISBN: 0-13-140206-4
Copie(s) info.:
● Total number of Copie(s):1

 
.
 
Publication type: Book
Tilte: PDA security: incorporating handhelds into the enterprise
Author(s):
David ... [et al.] Melnick (Author),
Publication Data:
New York: McGraw-Hill
Publication Year: 2003
Call Number: 005.8 PDA
ISBN: 0-07-142490-3
Copie(s) info.:
● Total number of Copie(s):1

 
.
 
Publication type: Book
Tilte: Wireless operational security
Author(s):
John W. Rittinghouse (Author), James F. Ransome (Author),
Publication Data:
Amsterdam: Elsevier
Publication Year: 2004
Call Number: 005.8 RIT
ISBN: 1-55558-317-2
Copie(s) info.:
● Total number of Copie(s):1

 
.
 
Publication type: Book
Tilte: Public key infrastructure: building trusted applications and web services
Author(s):
John R. Vacca (Author),
Publication Data:
Bocca Raton: Auerbach Publications
Publication Year: 2004
Call Number: 005.8 VAC
ISBN: 0-8493-0822-4
Copie(s) info.:
● Total number of Copie(s):1

 
.
 
Publication type: Book
Tilte: Defend I.T. : security by example
Author(s):
Ajay Gupta (Author), Scott Laliberte (Author),
Publication Data:
Boston: Addison-Wesley
Publication Year: 2004
Call Number: 005.8 GUP
ISBN: 0-321-19767-4
Copie(s) info.:
● Total number of Copie(s):1

 
.
 
Publication type: Book
Tilte: Designing network security
Author(s):
Merike Kaeo (Author),
Publication Data:
Indianapolis, Indiana: Cisco Press
Publication Year: 2004
Edition: 2nd ed.
Call Number: 005.8 KAE
ISBN: 1-58705-117-6
Copie(s) info.:
● Total number of Copie(s):1

 
.
 
Publication type: Book
Tilte: Software forensics: collecting evidence from the scene of a digital crime
Author(s):
Robert M. Slade (Author),
Publication Data:
New York: McGraw-Hill
Publication Year: 2004
Call Number: 005.8 SLA
ISBN: 0-07-142804-6
Copie(s) info.:
● Total number of Copie(s):1

 
.
 
Publication type: Book
Tilte: Bluetooth security
Author(s):
Christian Gehrmann (Author), Joakim Persson (Author), Ben Smeets (Author),
Publication Data:
Boston: Artech House
Publication Year: 2004
Call Number: 005.8 GEH
ISBN: 1-58053-504-6
Copie(s) info.:
● Total number of Copie(s):1

 
.
 
Publication type: Book
Tilte: Bulletproof wireless security: GSM, UMTS, 802.11 and ad hoc security
Author(s):
Praphul Chandra (Author),
Publication Data:
Amsterdam: Elsevier
Publication Year: 2005
Call Number: 005.8 CHA
ISBN: 0-7506-7746-5
Copie(s) info.:
● Total number of Copie(s):1

 
.
 
Publication type: Book
Tilte: ISA server 2004 unleashed
Author(s):
Michael Noel (Author),
Publication Data:
Indianapolis, Indiana: SAMS
Publication Year: 2006
Call Number: 005.8 NOE
ISBN: 0-672-32718-X
Copie(s) info.:
● Total number of Copie(s):2

 
.
 
Publication type: Book
Tilte: Cisco network security troubleshooting handbook
Author(s):
Mynul Hoda (Author),
Publication Data:
Indianapolis, Indiana: Cisco Press
Publication Year: 2006
Call Number: 005.8 HOD
ISBN: 1-58705-189-3
Copie(s) info.:
● Total number of Copie(s):1

 
.
 
Publication type: Book
Tilte: Core security patterns: best practices and strategies for J2EE, Web services and identity management
Author(s):
Christopher Steel (Author), Ramesh Nagappan (Author), Ray Lai (Author),
Publication Data:
Upper Saddle River, NJ: Prentice Hall
Publication Year: 2005
Call Number: 005.8 STE
ISBN: 0-13-146307-1
Copie(s) info.:
● Total number of Copie(s):1

 
.
 
Publication type: Book
Tilte: A simple guide to security and privacy on your PC
Author(s):
Manon Cassade (Author),
Publication Data:
Harlow: Prentice Hall
Publication Year: 2000
Call Number: 005.8 CAS
ISBN: 0-13-025781-8
Copie(s) info.:
● Total number of Copie(s):1

 
.
 
Publication type: Book
Tilte: CWSP certified wireless security professional: official study guide (exam PWO-200)
Author(s):
Grant Moerschel (Author), Richard Dreger (Author), Tom Carpenter (Author),
Publication Data:
New York: McGraw - Hill
Publication Year: 2007
Edition: 2nd ed.
Call Number: 005.8 MOE
ISBN: 07-226320-2
Copie(s) info.:
● Total number of Copie(s):1

 
.
 
Publication type: Book
Tilte: Administering Windows Vista security: the big surprises
Author(s):
Mark Minasi (Author), Byron Hynes
Publication Data:
Indianapolis, Indiana: Wiley Publishing, Inc.
Publication Year: 2007
Call Number: 005.8 MIN
ISBN: 0-470-10832-0
Copie(s) info.:
● Total number of Copie(s):1

 
.
 
Publication type: Book
Tilte: Hacking the Xbox: an introduction to reverse engineering
Author(s):
Andrew Huang (Author),
Publication Data:
San Francisco: No Starch Press, Inc.
Publication Year: 2003
Edition: Unlimited ed.
Call Number: 005.8 HAU
ISBN: 1-59327-029-1
Copie(s) info.:
● Total number of Copie(s):4

 
.
 
Publication type: Book
Tilte: Data protection and information lifecycle management
Author(s):
Tom Petrocelli (Author),
Publication Data:
Upper Saddle River, NJ: Prentice Hall
Publication Year: 2006
Call Number: 005.8 PET
ISBN: 0-13-192757-4
Copie(s) info.:
● Total number of Copie(s):1

 
.
 
Publication type: Book
Tilte: Microsoft Windows XP networking and security: inside out: also covers Windows 2000
Author(s):
ED Bott (Author), Carl Siechert (Author),
Publication Data:
New Delhi: Prentice Hall of India
Publication Year: 2006
Call Number: 005.8 BOT
ISBN: 81-203-2923-6
Copie(s) info.:
● Total number of Copie(s):1

 
.
 
Publication type: Book
Tilte: Network security: a practical approach
Author(s):
Jan L. Harrington (Author),
Publication Data:
New Delhi: Elsevier
Publication Year: 2006
Call Number: 005.8 HAR
ISBN: 81-312-0216-x
Copie(s) info.:
● Total number of Copie(s):1

 
.
 
Publication type: Book
Tilte: IT governance: a manager's guide to data security and BS 7799-ISO 17799
Author(s):
Alan Calder (Author), Steve Watkins (Author),
Publication Data:
London: Kogan Page
Publication Year: 2005
Edition: 3rd ed.
Call Number: 005.8 CAL
ISBN: 0-7494-4650-1
Copie(s) info.:
● Total number of Copie(s):1

 
.
 
Publication type: Book
Tilte: Internet security: a jumpstart for systems administrators and IT managers
Author(s):
Tim Speed (Author), Juanita Ellis (Author),
Publication Data:
New Delhi: Digital Press
Publication Year: 2003
Call Number: 005.8 SPE
ISBN: 81-312-0332-8
Copie(s) info.:
● Total number of Copie(s):1

 
.
 
Publication type: Book
Tilte: Wireless security: models, threats, and solutions
Author(s):
Randall K. Nichols (Author), Panos C. Lekkas (Author),
Publication Data:
New Delhi: Tata McGraw-Hill
Publication Year: 2006
Call Number: 005.8 NIC
ISBN: 0-07-061884-4
Copie(s) info.:
● Total number of Copie(s):1

 
.
 
Publication type: Book
Tilte: Network security: current status and future directions
Author(s):
Christos Douligeris (ed.), Dimitrios N. Serpanos (ed.),
Publication Data:
Hoboken, N.J.: John Wiley & Sons
Publication Year: 2007
Call Number: 005.8 NET
ISBN: 978-0-471-70355-6
Copie(s) info.:
● Total number of Copie(s):3

 
.
 
Publication type: Book
Tilte: Cryptography and network security: principles and practice
Author(s):
William Stallings (Author),
Publication Data:
Upper Saddle River, New Jersey: Pearson Prentice Hall
Publication Year: 2006
Edition: 4th ed.
Call Number: 005.8 STA
ISBN: 0-13-187316-4
Copie(s) info.:
● Total number of Copie(s):2

 
.
 
Publication type: Book
Tilte: Cisco ASA, PIX, and FWSM firewall handbook
Author(s):
David Hucaby (Author),
Publication Data:
Indianapolis, Indiana: Cisco Press
Publication Year: 2008
Edition: 2nd ed.
Call Number: 005.8 HUC
ISBN: 978-1-58705-457-0
Copie(s) info.:
● Total number of Copie(s):2

 
.
 
Publication type: Book
Tilte: The security development lifecycle : SDL, a process for developing demonstrably more secure software
Author(s):
Michael Howard (Author), Steve Lipner (Author),
Publication Data:
Redmond, Washington: Microsoft Press
Publication Year: 2006
Call Number: 005.8 HOW
ISBN: 978-07356-2214-2
Copie(s) info.:
● Total number of Copie(s):1

 
.
 
Publication type: Book
Tilte: Software security : building security in
Author(s):
Gary McGraw (Author),
Publication Data:
Upper Saddle River, NJ : Addison-Wesley
Publication Year: 2006
Call Number: 005.8 MCG
ISBN: 0-321-35670-5
Copie(s) info.:
● Total number of Copie(s):1

 
.
 
Publication type: Book
Tilte: CEH : certified ethical hacker study guide
Author(s):
Kimberly Graves (Author),
Publication Data:
Indianapolis, Ind.: Wiley Publishing, Inc.
Publication Year: 2010
Call Number: 005.8 GRA
ISBN: 978-0-470-52520-3
Copie(s) info.:
● Total number of Copie(s):2

 
.
 
Publication type: Book
Tilte: Gray hat hacking : the ethical hackerís handbook
Author(s):
Allen ... [et al.] Harper (Author),
Publication Data:
New York: McGraw-Hill
Publication Year: 2011
Edition: 3rd ed.
Call Number: 005.8 GRA
ISBN: 978-0-07-174255-9
Copie(s) info.:
● Total number of Copie(s):2

 
.
 
Publication type: Book
Tilte: Computer security: principles and practice
Author(s):
William Stallings (Author), Lawrie Brown (Author),
Publication Data:
Upper Saddle River, NJ.: Pearson/Prentice Hall
Publication Year: 2008
Call Number: 005.8 STA
ISBN: 978-0-13-513711-6
Copie(s) info.:
● Total number of Copie(s):1

 
.
 
Publication type: Book
Tilte: Information security and cyber laws
Author(s):
Pankaj Sharma (Author), Ashwin Perti (Author),
Publication Data:
New Delhi: S. K. Kataria & Sons
Publication Year: 2010
Call Number: 005.8 SHA
ISBN: 978-93-5014-071-0
Copie(s) info.:
● Total number of Copie(s):1

 
.
 
Publication type: Book
Tilte: Information security and cyber laws
Author(s):
Pankaj Sharma (Author),
Publication Data:
New Delhi: S. K. Kataria & Sons
Publication Year: 2011
Edition: 2nd ed.
Call Number: 005.8 SHA
Copie(s) info.:
● Total number of Copie(s):3

 
.
 
Publication type: Book
Tilte: Information security: principles and practice
Author(s):
Mark Stamp (Author),
Publication Data:
Hoboken, New Jersey: Wiley
Publication Year: 2011
Edition: 2nd ed.
Call Number: 005.8 STA
ISBN: 978-0-470-62639-9
Copie(s) info.:
● Total number of Copie(s):2

 
.
 
Publication type: Book
Tilte: Principles of information security
Author(s):
Michael E. Whitman (Author), Herbert J. Mattord (Author),
Publication Data:
Delhi: Cengage Learning India
Publication Year: 2013
Edition: 4th ed.
Call Number: 005.8 WHI
ISBN: 978-81-315-1645-4 81-315-1645-8
Copie(s) info.:
● Total number of Copie(s):2

 
.
 
Publication type: Book
Tilte: Network security
Author(s):
Neha Ghai (Author),
Publication Data:
New Delhi: S. K. Kataria & Sons
Publication Year: 2012
Call Number: 005.8 GHA
ISBN: 978-93-5014-231-8
Copie(s) info.:
● Total number of Copie(s):1

 
.
 
Publication type: Book
Tilte: Network security : private communication in a public world
Author(s):
Charlie Kaufman (Author), Radia Perlman (Author), Mike Speciner (Author),
Publication Data:
New Delhi: PHI Learning Private Limited
Publication Year: 2013
Call Number: 005.8 KAU
ISBN: 978-81-203-2213-4
Copie(s) info.:
● Total number of Copie(s):1

 
.
 
Publication type: Book
Tilte: Information security and cyber laws
Author(s):
Sanjeev Puri (Author),
Publication Data:
New Delhi: Technical Publications
Publication Year: 2014
Call Number: 005.8 PUR
ISBN: 978-93-5099-279-1
Copie(s) info.:
● Total number of Copie(s):1

 
.
 
Publication type: Book
Tilte: Computer and information security handbook
Author(s):
John R. Vacca (ed.),
Publication Data:
Amsterdam: Elsevier
Publication Year: 2013
Edition: 2nd ed.
Call Number: 005.8 COM
ISBN: 978-0-12-394397-2
Copie(s) info.:
● Total number of Copie(s):1

 
.
 
Publication type: Book
Tilte: Introduction to computer security
Author(s):
Michael Goodrich (Author), Roberto Tamassia (Author),
Publication Data:
Harlow: Pearson Education Limited
Publication Year: 2014
Call Number: 005.8 GOO
ISBN: 978-1-29202-540-7
Copie(s) info.:
● Total number of Copie(s):1

 
.
 
Publication type: Book
Tilte: Network security essentials : applications and standards
Author(s):
William Stallings (Author),
Publication Data:
Harlow: Pearson Education Limited
Publication Year: 2014
Edition: 5th ed.
Call Number: 005.8 STA
ISBN: 978-0-273-79336-6
Copie(s) info.:
● Total number of Copie(s):1

 
.
 
Publication type: Book
Tilte: Security + guide to network security fundamentals
Author(s):
Mark Ciampa (Author),
Publication Data:
Australia: Course Technology
Publication Year: 2012
Call Number: 005.8 CIA
ISBN: 978-1-111-64012-5
Copie(s) info.:
● Total number of Copie(s):2

 
.
 
Publication type: Book
Tilte: Handbook of research on emerging developments in data privacy
Author(s):
Manish Gupta (ed.),
Publication Data:
USA: IGI Global
Publication Year: 2015
Call Number: 005.8 HAN
ISBN: 978-1-4666-7381-6
Copie(s) info.:
● Total number of Copie(s):2

 
.
 
Publication type: Book
Tilte: Virtualization security : protecting virtualized environments
Author(s):
Dave Shackleford (Author),
Publication Data:
New Delhi: John Wiley & Sons, Inc
Publication Year: 2013
Call Number: 005.8 SHA
ISBN: 978-81-265-4017-4
Copie(s) info.:
● Total number of Copie(s):1

 
.
 
Publication type: Book
Tilte: Securing the virtual environment : how to defend the enterprise against attack
Author(s):
Davi Ottenheimer (Author), Matthew Wallace (Author),
Publication Data:
New Delhi: Wiley India Pvt. Ltd
Publication Year: 2012
Call Number: 005.8 OTT
ISBN: 978-81-265-3605-4
Copie(s) info.:
● Total number of Copie(s):1

 
.
 
Publication type: Book
Tilte: Network security
Author(s):
Neha Ghai (Author),
Publication Data:
New Delhi: S. K. Kataria & Sons
Publication Year: 2013
Edition: 2nd ed.
Call Number: 005.8 GHA
Copie(s) info.:
● Total number of Copie(s):1

 
.
 
Publication type: Book
Tilte: Information security management handbook
Author(s):
Harold F. Tipton (ed.), Micki Krause Nozaki (ed.),
Publication Data:
London: CRC Press/ Taylor & Francis
Publication Year: 2012
Edition: 6th ed.
Call Number: 005.8 INF
ISBN: 978-1-4398-9313-5
Copie(s) info.:
● Total number of Copie(s):1

 
.
 
Publication type: Book
Tilte: Computer security: principles and practice
Author(s):
William Stallings (Author), Lawrie Brown (Author),
Publication Data:
Boston: Pearson Education Limited
Publication Year: 2015
Edition: 3rd ed. , Global edition
Call Number: 005.8 STA
ISBN: 978-1-292-06617-2
Copie(s) info.:
● Total number of Copie(s):3

 
.
 
Publication type: Book
Tilte: Cryptography and network security: principles and practice
Author(s):
William Stallings (Author),
Publication Data:
Boston: Pearson Education Limited
Publication Year: 2014
Edition: 6th ed. , international edition
Call Number: 005.8 STA
ISBN: 978-0-273-79335-9
Copie(s) info.:
● Total number of Copie(s):3

 
.
 
Publication type: Book
Tilte: Core software security : security at the source
Author(s):
James Ransome (Author), Anmol Misra (Author),
Publication Data:
London: CRC Press, Taylor & Francis Group
Publication Year: 2014
Call Number: 005.8 RAN
ISBN: 978-1-4665-6095-6
Copie(s) info.:
● Total number of Copie(s):2

 
.
 
Publication type: Book
Tilte: Secure and resilient software development
Author(s):
Mark S. Merkow (Author), Lakshmikanth Raghavan (Author),
Publication Data:
London: CRC Press/Taylor & Francis Group
Publication Year: 2010
Call Number: 005.8 MER
ISBN: 978-1-4398-2696-6
Copie(s) info.:
● Total number of Copie(s):2

 
.
 
Publication type: Book
Tilte: Secure software design
Author(s):
Theodor Richardson (Author), Charles Thies (Author),
Publication Data:
Burlington: Johnes & Bartlett Learning
Publication Year: 2013
Call Number: 005.8 RIC
ISBN: 978-1-4496-2632-7
Copie(s) info.:
● Total number of Copie(s):5

 
.
 
Publication type: Book
Tilte: Principles of information security
Author(s):
Michael E. Whitman (Author), Herbert J. Mattord (Author),
Publication Data:
Boston: Cengage Learning
Publication Year: 2016
Edition: 5th ed.
Call Number: 005.8 WHI
ISBN: 978-1-285-44836-7
Copie(s) info.:
● Total number of Copie(s):1

 
.
 
Publication type: Book
Tilte: The web application : hacker's handbook
Author(s):
Dafydd Stuttard (Author), Marcus Pinto (Author),
Publication Data:
Indianapolis: Wiley Publishing , Inc.
Publication Year: 2011
Edition: 2nd ed.
Call Number: 005.8 STU
ISBN: 978-1-118-02647-2
Copie(s) info.:
● Total number of Copie(s):1

 
.
 
Publication type: Book
Tilte: Computer security fundamentals
Author(s):
Chuck Easttom (Author),
Publication Data:
Indianapolis: Pearson Education
Publication Year: 2016
Edition: 3rd ed.
Call Number: 005.8 EAS
ISBN: 978-0-7897-5746-3
Copie(s) info.:
● Total number of Copie(s):5

 
.
 
Publication type: Book
Tilte: Security + guide to network security fundamentals
Author(s):
Mark Ciampa (Author),
Publication Data:
Australia: Cengage Learning
Publication Year: 2018
Edition: 6th ed.
Call Number: 005.8 CIA
ISBN: 978-1-337-28878-1 1-337-28878-0
Copie(s) info.:
● Total number of Copie(s):2

 
.
 
Publication type: Book
Tilte: Foundations of information security : a straightforward introduction
Author(s):
Jason Andress (Author),
Publication Data:
San Francisco: No Starch Press
Publication Year: 2019
Call Number: 005.8 AND
ISBN: 978-1-7185-0004-4
Copie(s) info.:
● Total number of Copie(s):2

 
.
 
Publication type: Book
Tilte: Security of web developers
Author(s):
John Paul Mueller (Author),
Publication Data:
Beijing: O'Reilly Media
Publication Year: 2016
Call Number: 005.8 MUE
ISBN: 978-1-491-92864-6
Copie(s) info.:
● Total number of Copie(s):2