.
|
Publication type:
Book
Tilte:
Practical unix and internet security
Author(s):
Simson
Garfinkel
Gene
Spafford
Publication Data: Bonn:
O'Reilly and associates, Inc.
Publication Year: 1996
ISBN: 1-56592-148-8
Copie(s) info.:
● Total number of Copie(s):2
|
.
|
Publication type:
Book
Tilte:
R X PC: The anti-virus handbook
Author(s):
Jenet
Endrijonas
Publication Data: Blue Ridge Summit:
TAB Books
Publication Year: 1992
ISBN: 0-8306-4202-1
Copie(s) info.:
● Total number of Copie(s):1
|
.
|
Publication type:
Book
Tilte:
computer viruses: What they are, How the work, How ot avoid them
Author(s):
Jonathan L.
Mayo
Publication Data: Blue Ridge Summit:
Wundcrest
Publication Year: 1989
ISBN: 0-8306-9582-6
Copie(s) info.:
● Total number of Copie(s):1
|
.
|
Publication type:
Book
Tilte:
Computer security basics
Author(s):
Deborah
Russell
G.T.
Gangemi
Publication Data: Sebastopol:
O'Reilly & Associates
Publication Year: 1991
ISBN: 0-937175-71-4
Copie(s) info.:
● Total number of Copie(s):2
|
.
|
Publication type:
Book
Tilte:
The computer virus handbook
Author(s):
Richard B.
Levin
Publication Data: New York:
Obsorne Mcgraw-Hill
Publication Year: 1990
ISBN: 0-07-881647-5
Copie(s) info.:
● Total number of Copie(s):2
|
.
|
Publication type:
Book
Tilte:
Unix system security: how to protect your data and prevent intruders
Author(s):
Rik
Farrow
Publication Data: Reading, Massachusetts:
Addison-Wesley
Publication Year: 1990
ISBN: 0-201-57030-0
Copie(s) info.:
● Total number of Copie(s):1
|
.
|
Publication type:
Book
Tilte:
The stephen cobb complete book of PC and LAN security
Author(s):
Stephen
Cobb
Publication Data: N.Y:
Windcrest
Publication Year: 1990
ISBN: 0-8306-9280-0
Copie(s) info.:
● Total number of Copie(s):1
|
.
|
Publication type:
Book
Tilte:
Unix security for the organization
Author(s):
R. Bringle
Bryant
Publication Data: Indianapolis:
Sams publishing
Publication Year: 1994
Copie(s) info.:
● Total number of Copie(s):1
|
.
|
Publication type:
Book
Tilte:
Java security
Author(s):
Gary
Mcgraw
Edward
Felten
Publication Data: New York:
John Wiley & Sons
Publication Year: 1996
Copie(s) info.:
● Total number of Copie(s):1
|
.
|
Publication type:
Book
Tilte:
Fundamentals of computer security technology
Author(s):
Edward G.
Amoroso
Publication Data: New Jersey:
Prentice Hall
Publication Year: 1994
ISBN: 0-13-108929-3
Copie(s) info.:
● Total number of Copie(s):2
|
.
|
Publication type:
Book
Tilte:
Security in computing
Author(s):
Charles P.
Pfleeger
(Author),
Publication Data: Upper Saddle River, New Jersey:
Prentice Hall
Publication Year: 1997
Edition: 2nd ed.
Call Number: 005.8 PFL
ISBN: 0-13-185794-0
Copie(s) info.:
● Total number of Copie(s):2
|
.
|
Publication type:
Book
Tilte:
Cryptography and network security : principles and practice
Author(s):
William
Stallings
(Author),
Publication Data: Upper Saddle River, New Jersey:
Prentice Hall
Publication Year: 1998
Edition: 2nd ed.
ISBN: 0-13-869017-0
Copie(s) info.:
● Total number of Copie(s):2
|
.
|
Publication type:
Book
Tilte:
Introduction to data security and controls
Author(s):
Edward R.
Buck
Publication Data: Wellesley, Massachusetts:
Q.E.D. Information Science, INC.
Publication Year: 1982
ISBN: 0-89435-062-5
Copie(s) info.:
● Total number of Copie(s):1
|
.
|
Publication type:
Book
Tilte:
Information and communications security: conference proceedings held in Beijing, China, 11 - 14, November, 1997
Author(s):
Yongfei
Han
Tatsuaki
Okamoto
Sihan
Qing
Publication Data: Berlin:
Springer - Verlag
Publication Year: 1997
ISBN: 3-540-63696-x
Copie(s) info.:
● Total number of Copie(s):1
|
.
|
Publication type:
Book
Tilte:
Security protocols: workshop proceedings held in Cambridge, United Kingdom, 10 - 12 April, 1996
Author(s):
Mark
Lomas
Publication Data: Berlin:
Springer - Verlag
Publication Year: 1997
ISBN: 3-540-62494-5
Copie(s) info.:
● Total number of Copie(s):1
|
.
|
Publication type:
Book
Tilte:
Information security and privacy: conference proceedings held in Brisbane, Australia, 13 - 15 July, 1998
Author(s):
Colin
Boyd
Ed
Dawson
Publication Data: Berlin:
Springer - Verlag
Publication Year: 1998
ISBN: 3-540-64732-5
Copie(s) info.:
● Total number of Copie(s):1
|
.
|
Publication type:
Book
Tilte:
Digital signature schemes: general framework and fail-stop signatures
Author(s):
Birgit
Pfitzmann
Publication Data: Berlin:
Springer - Verlag
Publication Year: 1996
ISBN: 3-540-61517-2
Copie(s) info.:
● Total number of Copie(s):1
|
.
|
Publication type:
Book
Tilte:
Hacking exposed: network security, secrets and solutions
Author(s):
Joel
Scambray
Stuart
Mcclure
George
Kurtz
Publication Data: Berkeley:
Osborne/ McGraw - Hill
Publication Year: 2001
Edition: 2nd ed.
ISBN: 0-07-212748-1
Copie(s) info.:
● Total number of Copie(s):1
|
.
|
Publication type:
Book
Tilte:
Java security handbook
Author(s):
Jamie
Jaworski
Paul
Perrone
Publication Data: Indianapolis, Indiana:
SAMS
Publication Year: 2000
Call Number: 005.8 JAW
ISBN: 0-0672-31602-1
Copie(s) info.:
● Total number of Copie(s):3
|
.
|
Publication type:
Book
Tilte:
Hacker attack
Author(s):
Richard
Mansfield
Publication Data: San Francisco:
SYBEX
Publication Year: 2000
ISBN: 0-7821-2830-0
Copie(s) info.:
● Total number of Copie(s):3
|
.
|
Publication type:
Book
Tilte:
Protecting your web site with firewalls
Author(s):
Marcus
Goncalves
Publication Data: Upper Saddle River, New Jersey:
Prentice - Hall
Publication Year: 1997
ISBN: 0-13-628207-5
Copie(s) info.:
● Total number of Copie(s):1
|
.
|
Publication type:
Book
Tilte:
Designing secure web-based applications for Microsoft Windows 2000
Author(s):
Michael
Howard
Publication Data: Redmond, Washington:
Microsoft Press
Publication Year: 2000
ISBN: 0-7356-0995-0
Copie(s) info.:
● Total number of Copie(s):1
|
.
|
Publication type:
Book
Tilte:
Firewalls : a complete guide
Author(s):
Marcus
Goncalves
(Author),
Publication Data: New York:
McGraw - Hill
Publication Year: 2000
Call Number: 005.8 GON
ISBN: 0-07-135639-8
Copie(s) info.:
● Total number of Copie(s):1
|
.
|
Publication type:
Book
Tilte:
Practical firewalls
Author(s):
Terry William
Ogletree
Publication Data: Indianapolis, Indiana:
Que
Publication Year: 2000
ISBN: 0-7892416-2
Copie(s) info.:
● Total number of Copie(s):2
|
.
|
Publication type:
Book
Tilte:
Developing secure applications with Visual Basic
Author(s):
Davis
Chapman
Publication Data: Indianapolis, Indiana:
SAMS
Publication Year: 2000
ISBN: 0-672-31836-9
Copie(s) info.:
● Total number of Copie(s):3
|
.
|
Publication type:
Book
Tilte:
Information hiding: first international workshop, Cambridge, U.K., May 30 - June 1, 1996: Proceedings
Author(s):
Ross
Anderson
Publication Data: Berlin:
Springer
Publication Year: 1996
ISBN: 3-540-61996-8
Copie(s) info.:
● Total number of Copie(s):1
|
.
|
Publication type:
Book
Tilte:
Advances in cryptology, 1981-1997: electronic proceedings and index of the crypto and Eurocrypt conferences 1981-1997
Author(s):
Kevin S.
McCurley
Claus Dieter
Ziegler
Publication Data: Berlin:
Springer
Publication Year: 1998
ISBN: 3-540-65069-5
Copie(s) info.:
● Total number of Copie(s):1
|
.
|
Publication type:
Book
Tilte:
IT manager's guide to virtual private networks
Author(s):
David Leon
Clark
Publication Data: New York:
McGraw - Hill
Publication Year: 1999
Call Number: 005.8 CLA
ISBN: 0-07-135202-3
Copie(s) info.:
● Total number of Copie(s):1
|
.
|
Publication type:
Book
Tilte:
Cisco network security
Author(s):
James
Pike
Publication Data: Upper Saddle River, New Jersey:
Prentice - Hall
Publication Year: 2001
ISBN: 0-13-091518-1
Copie(s) info.:
● Total number of Copie(s):1
|
.
|
Publication type:
Book
Tilte:
Security complete
Publication Data: San Francisco:
SYBEX
Publication Year: 2001
ISBN: 0-7821-2968-4
Copie(s) info.:
● Total number of Copie(s):1
|
.
|
Publication type:
Book
Tilte:
Modern cryptography, probabilistic proofs and pseudorandomness
Author(s):
Oded
Goldreich
Publication Data: Berlin:
Springer
Publication Year: 1999
ISBN: 3-540-64766-x
Copie(s) info.:
● Total number of Copie(s):1
|
.
|
Publication type:
Book
Tilte:
Information security: first international workshop, ISW'97, Tatsunokuchi, Ishikawa, Japan, September 17-19, 1997: Proceedings
Author(s):
Eiji
Okamoto
George
Davida
Masahiro
Mambo
Publication Data: Berlin:
Springer
Publication Year: 1998
ISBN: 3-540-64382-6
Copie(s) info.:
● Total number of Copie(s):1
|
.
|
Publication type:
Book
Tilte:
Information security and privacy: 4th Australasian Conference, ACISP'99, Wollongong, NSW, Australia, April 7-9, 1999: Proceedings
Author(s):
Josef
Pieprzyk
Rei
Safavi-Naini
Jennifer
Sebervy
Publication Data: Berlin:
Springer
Publication Year: 1999
ISBN: 3-540-65756-8
Copie(s) info.:
● Total number of Copie(s):1
|
.
|
Publication type:
Book
Tilte:
Information hiding:"second international workshop, IH'98: Portland, Oregon, USA, April 14-17, 1998: Proceedings
Author(s):
David
Aucsmith
Publication Data: Berlin:
Springer
Publication Year: 1998
Copie(s) info.:
● Total number of Copie(s):1
|
.
|
Publication type:
Book
Tilte:
Security protocols: 6th international workshop, Cambridge, UK, April 15-17, 1998: proceedings
Author(s):
Bruce ... [et al.]
Christianson
Publication Data: Berlin:
Springer
Publication Year: 1999
ISBN: 3-540-65663-4
Copie(s) info.:
● Total number of Copie(s):1
|
.
|
Publication type:
Book
Tilte:
Maximum Windows 2000 security
Author(s):
Anonymous
Publication Data: Indianapolis, Indiana:
Sams
Publication Year: 2002
Copie(s) info.:
● Total number of Copie(s):1
|
.
|
Publication type:
Book
Tilte:
Maximum security
Author(s):
Anonymous
Publication Data: Indianapolis, Indiana:
Sams
Publication Year: 2001
Edition: 3rd ed
ISBN: 0-672-31871-7
Copie(s) info.:
● Total number of Copie(s):1
|
.
|
Publication type:
Book
Tilte:
.NET framework security
Author(s):
Brian A....[et al.]
LaMacchia
Publication Data: Boston:
Addison - Wesley
Publication Year: 2002
ISBN: 0-672-32184-X
Copie(s) info.:
● Total number of Copie(s):1
|
.
|
Publication type:
Book
Tilte:
Information security architecture: an integrated approach to security in the organization
Author(s):
Jan Killmeyer
Tudor
Publication Data: Boca Raton:
Auerbach
Publication Year: 2000
ISBN: 0-8493-9988-2
Copie(s) info.:
● Total number of Copie(s):1
|
.
|
Publication type:
Book
Tilte:
Information security risk analysis
Author(s):
Thomas R.
Peltier
Publication Data: Boca Raton:
Auerbach
Publication Year: 2001
ISBN: 0-8493-0880-1
Copie(s) info.:
● Total number of Copie(s):1
|
.
|
Publication type:
Book
Tilte:
Security in computing
Author(s):
Charles P.
Pfleeger
(Author),
Shari Lawrence
Pfleeger
(Author),
Publication Data: Upper Saddle River, New Jersey:
Prentice Hall
Publication Year: 2003
Edition: 3rd ed.
Call Number: 005.8 PFL
ISBN: 0-13-035548-8
Copie(s) info.:
● Total number of Copie(s):13
|
.
|
Publication type:
Book
Tilte:
How secure is your wireless network? safeguarding your Wi-Fi Lan
Author(s):
Lee
Barken
(AUTHOR),
Publication Data: Upper Saddle River, New Jersey:
Prentice Hall
Publication Year: 2004
Call Number: 005.8 BAR
ISBN: 0-13-140206-4
Copie(s) info.:
● Total number of Copie(s):1
|
.
|
Publication type:
Book
Tilte:
PDA security: incorporating handhelds into the enterprise
Author(s):
David ... [et al.]
Melnick
(Author),
Publication Data: New York:
McGraw-Hill
Publication Year: 2003
Call Number: 005.8 PDA
ISBN: 0-07-142490-3
Copie(s) info.:
● Total number of Copie(s):1
|
.
|
Publication type:
Book
Tilte:
Wireless operational security
Author(s):
John W.
Rittinghouse
(Author),
James F.
Ransome
(Author),
Publication Data: Amsterdam:
Elsevier
Publication Year: 2004
Call Number: 005.8 RIT
ISBN: 1-55558-317-2
Copie(s) info.:
● Total number of Copie(s):1
|
.
|
Publication type:
Book
Tilte:
Public key infrastructure: building trusted applications and web services
Author(s):
John R.
Vacca
(Author),
Publication Data: Bocca Raton:
Auerbach Publications
Publication Year: 2004
Call Number: 005.8 VAC
ISBN: 0-8493-0822-4
Copie(s) info.:
● Total number of Copie(s):1
|
.
|
Publication type:
Book
Tilte:
Defend I.T. : security by example
Author(s):
Ajay
Gupta
(Author),
Scott
Laliberte
(Author),
Publication Data: Boston:
Addison-Wesley
Publication Year: 2004
Call Number: 005.8 GUP
ISBN: 0-321-19767-4
Copie(s) info.:
● Total number of Copie(s):1
|
.
|
Publication type:
Book
Tilte:
Designing network security
Author(s):
Merike
Kaeo
(Author),
Publication Data: Indianapolis, Indiana:
Cisco Press
Publication Year: 2004
Edition: 2nd ed.
Call Number: 005.8 KAE
ISBN: 1-58705-117-6
Copie(s) info.:
● Total number of Copie(s):1
|
.
|
Publication type:
Book
Tilte:
Software forensics: collecting evidence from the scene of a digital crime
Author(s):
Robert M.
Slade
(Author),
Publication Data: New York:
McGraw-Hill
Publication Year: 2004
Call Number: 005.8 SLA
ISBN: 0-07-142804-6
Copie(s) info.:
● Total number of Copie(s):1
|
.
|
Publication type:
Book
Tilte:
Bluetooth security
Author(s):
Christian
Gehrmann
(Author),
Joakim
Persson
(Author),
Ben
Smeets
(Author),
Publication Data: Boston:
Artech House
Publication Year: 2004
Call Number: 005.8 GEH
ISBN: 1-58053-504-6
Copie(s) info.:
● Total number of Copie(s):1
|
.
|
Publication type:
Book
Tilte:
Bulletproof wireless security: GSM, UMTS, 802.11 and ad hoc security
Author(s):
Praphul
Chandra
(Author),
Publication Data: Amsterdam:
Elsevier
Publication Year: 2005
Call Number: 005.8 CHA
ISBN: 0-7506-7746-5
Copie(s) info.:
● Total number of Copie(s):1
|
.
|
Publication type:
Book
Tilte:
ISA server 2004 unleashed
Author(s):
Michael
Noel
(Author),
Publication Data: Indianapolis, Indiana:
SAMS
Publication Year: 2006
Call Number: 005.8 NOE
ISBN: 0-672-32718-X
Copie(s) info.:
● Total number of Copie(s):2
|
.
|
Publication type:
Book
Tilte:
Cisco network security troubleshooting handbook
Author(s):
Mynul
Hoda
(Author),
Publication Data: Indianapolis, Indiana:
Cisco Press
Publication Year: 2006
Call Number: 005.8 HOD
ISBN: 1-58705-189-3
Copie(s) info.:
● Total number of Copie(s):1
|
.
|
Publication type:
Book
Tilte:
Core security patterns: best practices and strategies for J2EE, Web services and identity management
Author(s):
Christopher
Steel
(Author),
Ramesh
Nagappan
(Author),
Ray
Lai
(Author),
Publication Data: Upper Saddle River, NJ:
Prentice Hall
Publication Year: 2005
Call Number: 005.8 STE
ISBN: 0-13-146307-1
Copie(s) info.:
● Total number of Copie(s):1
|
.
|
Publication type:
Book
Tilte:
A simple guide to security and privacy on your PC
Author(s):
Manon
Cassade
(Author),
Publication Data: Harlow:
Prentice Hall
Publication Year: 2000
Call Number: 005.8 CAS
ISBN: 0-13-025781-8
Copie(s) info.:
● Total number of Copie(s):1
|
.
|
Publication type:
Book
Tilte:
CWSP certified wireless security professional: official study guide (exam PWO-200)
Author(s):
Grant
Moerschel
(Author),
Richard
Dreger
(Author),
Tom
Carpenter
(Author),
Publication Data: New York:
McGraw - Hill
Publication Year: 2007
Edition: 2nd ed.
Call Number: 005.8 MOE
ISBN: 07-226320-2
Copie(s) info.:
● Total number of Copie(s):1
|
.
|
Publication type:
Book
Tilte:
Administering Windows Vista security: the big surprises
Author(s):
Mark
Minasi
(Author),
Byron
Hynes
Publication Data: Indianapolis, Indiana:
Wiley Publishing, Inc.
Publication Year: 2007
Call Number: 005.8 MIN
ISBN: 0-470-10832-0
Copie(s) info.:
● Total number of Copie(s):1
|
.
|
Publication type:
Book
Tilte:
Hacking the Xbox: an introduction to reverse engineering
Author(s):
Andrew
Huang
(Author),
Publication Data: San Francisco:
No Starch Press, Inc.
Publication Year: 2003
Edition: Unlimited ed.
Call Number: 005.8 HAU
ISBN: 1-59327-029-1
Copie(s) info.:
● Total number of Copie(s):4
|
.
|
Publication type:
Book
Tilte:
Data protection and information lifecycle management
Author(s):
Tom
Petrocelli
(Author),
Publication Data: Upper Saddle River, NJ:
Prentice Hall
Publication Year: 2006
Call Number: 005.8 PET
ISBN: 0-13-192757-4
Copie(s) info.:
● Total number of Copie(s):1
|
.
|
Publication type:
Book
Tilte:
Microsoft Windows XP networking and security: inside out: also covers Windows 2000
Author(s):
ED
Bott
(Author),
Carl
Siechert
(Author),
Publication Data: New Delhi:
Prentice Hall of India
Publication Year: 2006
Call Number: 005.8 BOT
ISBN: 81-203-2923-6
Copie(s) info.:
● Total number of Copie(s):1
|
.
|
Publication type:
Book
Tilte:
Network security: a practical approach
Author(s):
Jan L.
Harrington
(Author),
Publication Data: New Delhi:
Elsevier
Publication Year: 2006
Call Number: 005.8 HAR
ISBN: 81-312-0216-x
Copie(s) info.:
● Total number of Copie(s):1
|
.
|
Publication type:
Book
Tilte:
IT governance: a manager's guide to data security and BS 7799-ISO 17799
Author(s):
Alan
Calder
(Author),
Steve
Watkins
(Author),
Publication Data: London:
Kogan Page
Publication Year: 2005
Edition: 3rd ed.
Call Number: 005.8 CAL
ISBN: 0-7494-4650-1
Copie(s) info.:
● Total number of Copie(s):1
|
.
|
Publication type:
Book
Tilte:
Internet security: a jumpstart for systems administrators and IT managers
Author(s):
Tim
Speed
(Author),
Juanita
Ellis
(Author),
Publication Data: New Delhi:
Digital Press
Publication Year: 2003
Call Number: 005.8 SPE
ISBN: 81-312-0332-8
Copie(s) info.:
● Total number of Copie(s):1
|
.
|
Publication type:
Book
Tilte:
Wireless security: models, threats, and solutions
Author(s):
Randall K.
Nichols
(Author),
Panos C.
Lekkas
(Author),
Publication Data: New Delhi:
Tata McGraw-Hill
Publication Year: 2006
Call Number: 005.8 NIC
ISBN: 0-07-061884-4
Copie(s) info.:
● Total number of Copie(s):1
|
.
|
Publication type:
Book
Tilte:
Network security: current status and future directions
Author(s):
Christos
Douligeris
(ed.),
Dimitrios N.
Serpanos
(ed.),
Publication Data: Hoboken, N.J.:
John Wiley & Sons
Publication Year: 2007
Call Number: 005.8 NET
ISBN: 978-0-471-70355-6
Copie(s) info.:
● Total number of Copie(s):3
|
.
|
Publication type:
Book
Tilte:
Cryptography and network security: principles and practice
Author(s):
William
Stallings
(Author),
Publication Data: Upper Saddle River, New Jersey:
Pearson Prentice Hall
Publication Year: 2006
Edition: 4th ed.
Call Number: 005.8 STA
ISBN: 0-13-187316-4
Copie(s) info.:
● Total number of Copie(s):2
|
.
|
Publication type:
Book
Tilte:
Cisco ASA, PIX, and FWSM firewall handbook
Author(s):
David
Hucaby
(Author),
Publication Data: Indianapolis, Indiana:
Cisco Press
Publication Year: 2008
Edition: 2nd ed.
Call Number: 005.8 HUC
ISBN: 978-1-58705-457-0
Copie(s) info.:
● Total number of Copie(s):2
|
.
|
Publication type:
Book
Tilte:
The security development lifecycle : SDL, a process for developing demonstrably more secure software
Author(s):
Michael
Howard
(Author),
Steve
Lipner
(Author),
Publication Data: Redmond, Washington:
Microsoft Press
Publication Year: 2006
Call Number: 005.8 HOW
ISBN: 978-07356-2214-2
Copie(s) info.:
● Total number of Copie(s):1
|
.
|
Publication type:
Book
Tilte:
Software security : building security in
Author(s):
Gary
McGraw
(Author),
Publication Data: Upper Saddle River, NJ :
Addison-Wesley
Publication Year: 2006
Call Number: 005.8 MCG
ISBN: 0-321-35670-5
Copie(s) info.:
● Total number of Copie(s):1
|
.
|
Publication type:
Book
Tilte:
CEH : certified ethical hacker study guide
Author(s):
Kimberly
Graves
(Author),
Publication Data: Indianapolis, Ind.:
Wiley Publishing, Inc.
Publication Year: 2010
Call Number: 005.8 GRA
ISBN: 978-0-470-52520-3
Copie(s) info.:
● Total number of Copie(s):2
|
.
|
Publication type:
Book
Tilte:
Gray hat hacking : the ethical hacker’s handbook
Author(s):
Allen ... [et al.]
Harper
(Author),
Publication Data: New York:
McGraw-Hill
Publication Year: 2011
Edition: 3rd ed.
Call Number: 005.8 GRA
ISBN: 978-0-07-174255-9
Copie(s) info.:
● Total number of Copie(s):2
|
.
|
Publication type:
Book
Tilte:
Computer security: principles and practice
Author(s):
William
Stallings
(Author),
Lawrie
Brown
(Author),
Publication Data: Upper Saddle River, NJ.:
Pearson/Prentice Hall
Publication Year: 2008
Call Number: 005.8 STA
ISBN: 978-0-13-513711-6
Copie(s) info.:
● Total number of Copie(s):1
|
.
|
Publication type:
Book
Tilte:
Information security and cyber laws
Author(s):
Pankaj
Sharma
(Author),
Ashwin
Perti
(Author),
Publication Data: New Delhi:
S. K. Kataria & Sons
Publication Year: 2010
Call Number: 005.8 SHA
ISBN: 978-93-5014-071-0
Copie(s) info.:
● Total number of Copie(s):1
|
.
|
Publication type:
Book
Tilte:
Information security and cyber laws
Author(s):
Pankaj
Sharma
(Author),
Publication Data: New Delhi:
S. K. Kataria & Sons
Publication Year: 2011
Edition: 2nd ed.
Call Number: 005.8 SHA
Copie(s) info.:
● Total number of Copie(s):3
|
.
|
Publication type:
Book
Tilte:
Information security: principles and practice
Author(s):
Mark
Stamp
(Author),
Publication Data: Hoboken, New Jersey:
Wiley
Publication Year: 2011
Edition: 2nd ed.
Call Number: 005.8 STA
ISBN: 978-0-470-62639-9
Copie(s) info.:
● Total number of Copie(s):2
|
.
|
Publication type:
Book
Tilte:
Principles of information security
Author(s):
Michael E.
Whitman
(Author),
Herbert J.
Mattord
(Author),
Publication Data: Delhi:
Cengage Learning India
Publication Year: 2013
Edition: 4th ed.
Call Number: 005.8 WHI
ISBN: 978-81-315-1645-4 81-315-1645-8
Copie(s) info.:
● Total number of Copie(s):2
|
.
|
Publication type:
Book
Tilte:
Network security
Author(s):
Neha
Ghai
(Author),
Publication Data: New Delhi:
S. K. Kataria & Sons
Publication Year: 2012
Call Number: 005.8 GHA
ISBN: 978-93-5014-231-8
Copie(s) info.:
● Total number of Copie(s):1
|
.
|
Publication type:
Book
Tilte:
Network security : private communication in a public world
Author(s):
Charlie
Kaufman
(Author),
Radia
Perlman
(Author),
Mike
Speciner
(Author),
Publication Data: New Delhi:
PHI Learning Private Limited
Publication Year: 2013
Call Number: 005.8 KAU
ISBN: 978-81-203-2213-4
Copie(s) info.:
● Total number of Copie(s):1
|
.
|
Publication type:
Book
Tilte:
Information security and cyber laws
Author(s):
Sanjeev
Puri
(Author),
Publication Data: New Delhi:
Technical Publications
Publication Year: 2014
Call Number: 005.8 PUR
ISBN: 978-93-5099-279-1
Copie(s) info.:
● Total number of Copie(s):1
|
.
|
Publication type:
Book
Tilte:
Computer and information security handbook
Author(s):
John R.
Vacca
(ed.),
Publication Data: Amsterdam:
Elsevier
Publication Year: 2013
Edition: 2nd ed.
Call Number: 005.8 COM
ISBN: 978-0-12-394397-2
Copie(s) info.:
● Total number of Copie(s):1
|
.
|
Publication type:
Book
Tilte:
Introduction to computer security
Author(s):
Michael
Goodrich
(Author),
Roberto
Tamassia
(Author),
Publication Data: Harlow:
Pearson Education Limited
Publication Year: 2014
Call Number: 005.8 GOO
ISBN: 978-1-29202-540-7
Copie(s) info.:
● Total number of Copie(s):1
|
.
|
Publication type:
Book
Tilte:
Network security essentials : applications and standards
Author(s):
William
Stallings
(Author),
Publication Data: Harlow:
Pearson Education Limited
Publication Year: 2014
Edition: 5th ed.
Call Number: 005.8 STA
ISBN: 978-0-273-79336-6
Copie(s) info.:
● Total number of Copie(s):1
|
.
|
Publication type:
Book
Tilte:
Security + guide to network security fundamentals
Author(s):
Mark
Ciampa
(Author),
Publication Data: Australia:
Course Technology
Publication Year: 2012
Edition: 4th ed.
Call Number: 005.8 CIA
ISBN: 978-1-111-64012-5
Copie(s) info.:
● Total number of Copie(s):2
|
.
|
Publication type:
Book
Tilte:
Handbook of research on emerging developments in data privacy
Author(s):
Manish
Gupta
(ed.),
Publication Data: USA:
IGI Global
Publication Year: 2015
Call Number: 005.8 HAN
ISBN: 978-1-4666-7381-6
Copie(s) info.:
● Total number of Copie(s):2
|
.
|
Publication type:
Book
Tilte:
Virtualization security : protecting virtualized environments
Author(s):
Dave
Shackleford
(Author),
Publication Data: New Delhi:
John Wiley & Sons, Inc
Publication Year: 2013
Call Number: 005.8 SHA
ISBN: 978-81-265-4017-4
Copie(s) info.:
● Total number of Copie(s):1
|
.
|
Publication type:
Book
Tilte:
Securing the virtual environment : how to defend the enterprise against attack
Author(s):
Davi
Ottenheimer
(Author),
Matthew
Wallace
(Author),
Publication Data: New Delhi:
Wiley India Pvt. Ltd
Publication Year: 2012
Call Number: 005.8 OTT
ISBN: 978-81-265-3605-4
Copie(s) info.:
● Total number of Copie(s):1
|
.
|
Publication type:
Book
Tilte:
Network security
Author(s):
Neha
Ghai
(Author),
Publication Data: New Delhi:
S. K. Kataria & Sons
Publication Year: 2013
Edition: 2nd ed.
Call Number: 005.8 GHA
Copie(s) info.:
● Total number of Copie(s):1
|
.
|
Publication type:
Book
Tilte:
Information security management handbook
Author(s):
Harold F.
Tipton
(ed.),
Micki Krause
Nozaki
(ed.),
Publication Data: London:
CRC Press/ Taylor & Francis
Publication Year: 2012
Edition: 6th ed.
Call Number: 005.8 INF
ISBN: 978-1-4398-9313-5
Copie(s) info.:
● Total number of Copie(s):1
|
.
|
Publication type:
Book
Tilte:
Computer security: principles and practice
Author(s):
William
Stallings
(Author),
Lawrie
Brown
(Author),
Publication Data: Boston:
Pearson Education Limited
Publication Year: 2015
Edition: 3rd ed. , Global edition
Call Number: 005.8 STA
ISBN: 978-1-292-06617-2
Copie(s) info.:
● Total number of Copie(s):3
|
.
|
Publication type:
Book
Tilte:
Cryptography and network security: principles and practice
Author(s):
William
Stallings
(Author),
Publication Data: Boston:
Pearson Education Limited
Publication Year: 2014
Edition: 6th ed. , international edition
Call Number: 005.8 STA
ISBN: 978-0-273-79335-9
Copie(s) info.:
● Total number of Copie(s):3
|
.
|
Publication type:
Book
Tilte:
Core software security : security at the source
Author(s):
James
Ransome
(Author),
Anmol
Misra
(Author),
Publication Data: London:
CRC Press, Taylor & Francis Group
Publication Year: 2014
Call Number: 005.8 RAN
ISBN: 978-1-4665-6095-6
Copie(s) info.:
● Total number of Copie(s):2
|
.
|
Publication type:
Book
Tilte:
Secure and resilient software development
Author(s):
Mark S.
Merkow
(Author),
Lakshmikanth
Raghavan
(Author),
Publication Data: London:
CRC Press/Taylor & Francis Group
Publication Year: 2010
Call Number: 005.8 MER
ISBN: 978-1-4398-2696-6
Copie(s) info.:
● Total number of Copie(s):2
|
.
|
Publication type:
Book
Tilte:
Secure software design
Author(s):
Theodor
Richardson
(Author),
Charles
Thies
(Author),
Publication Data: Burlington:
Johnes & Bartlett Learning
Publication Year: 2013
Call Number: 005.8 RIC
ISBN: 978-1-4496-2632-7
Copie(s) info.:
● Total number of Copie(s):5
|
.
|
Publication type:
Book
Tilte:
Principles of information security
Author(s):
Michael E.
Whitman
(Author),
Herbert J.
Mattord
(Author),
Publication Data: Boston:
Cengage Learning
Publication Year: 2016
Edition: 5th ed.
Call Number: 005.8 WHI
ISBN: 978-1-285-44836-7
Copie(s) info.:
● Total number of Copie(s):1
|
.
|
Publication type:
Book
Tilte:
The web application : hacker's handbook
Author(s):
Dafydd
Stuttard
(Author),
Marcus
Pinto
(Author),
Publication Data: Indianapolis:
Wiley Publishing , Inc.
Publication Year: 2011
Edition: 2nd ed.
Call Number: 005.8 STU
ISBN: 978-1-118-02647-2
Copie(s) info.:
● Total number of Copie(s):1
|
.
|
Publication type:
Book
Tilte:
Computer security fundamentals
Author(s):
Chuck
Easttom
(Author),
Publication Data: Indianapolis:
Pearson Education
Publication Year: 2016
Edition: 3rd ed.
Call Number: 005.8 EAS
ISBN: 978-0-7897-5746-3
Copie(s) info.:
● Total number of Copie(s):5
|
.
|
Publication type:
Book
Tilte:
Security + guide to network security fundamentals
Author(s):
Mark
Ciampa
(Author),
Publication Data: Australia:
Cengage Learning
Publication Year: 2018
Edition: 6th ed.
Call Number: 005.8 CIA
ISBN: 978-1-337-28878-1 1-337-28878-0
Copie(s) info.:
● Total number of Copie(s):2
|
.
|
Publication type:
Book
Tilte:
Foundations of information security : a straightforward introduction
Author(s):
Jason
Andress
(Author),
Publication Data: San Francisco:
No Starch Press
Publication Year: 2019
Call Number: 005.8 AND
ISBN: 978-1-7185-0004-4
Copie(s) info.:
● Total number of Copie(s):4
|
.
|
Publication type:
Book
Tilte:
Security of web developers
Author(s):
John Paul
Mueller
(Author),
Publication Data: Beijing:
O'Reilly Media
Publication Year: 2016
Call Number: 005.8 MUE
ISBN: 978-1-491-92864-6
Copie(s) info.:
● Total number of Copie(s):2
|
.
|
Publication type:
Book
Tilte:
Security + guide to network security fundamentals
Author(s):
Mark
Ciampa
(Author),
Publication Data: Australia:
Course Technology
Publication Year: 2012
Edition: 4th ed. , International edition
Call Number: 005.8 CIA
ISBN: 978-1-111-64017-0
Copie(s) info.:
● Total number of Copie(s):1
|
.
|
Publication type:
Book
Tilte:
Machine learning with R : expert techniques for predictive modeling
Author(s):
Brett
Lantz
(Author),
Publication Data: Birmingham, UK.:
Packt Publishing, Mumbai
Publication Year: 2019
Edition: 3rd ed.
Call Number: 005.8 LAN
ISBN: 978-1-78829-586-4
Copie(s) info.:
● Total number of Copie(s):2
|
.
|
Publication type:
Book
Tilte:
Security in wireless communication networks
Author(s):
Yi
Qian
(Author),
Feng
Ye
(Author),
Hsiao-Hwa
Chen
(Author),
Publication Data: Chichester:
IEEE Press, Wiley
Publication Year: 2022
Call Number: 005.8 QIA
ISBN: 978-1-119-24436-3
Copie(s) info.:
● Total number of Copie(s):2
|
.
|
Publication type:
Book
Tilte:
Database security : problems and solutions
Author(s):
Christopher
Diaz
(Author),
Publication Data: Boston:
Mercure Learning and Information
Publication Year: 2022
Call Number: 005.8 DIA
ISBN: 978-1-68392-663-4
Copie(s) info.:
● Total number of Copie(s):3
|
.
|
Publication type:
Book
Tilte:
Cybersecurity risk management : mastering the fundamentals using the NIST cybersecurity framework
Author(s):
Cynthia
Brumfield
(Author),
Brian
Haugli
(Author),
Publication Data: Hoboken:
John Wiley & Sons
Publication Year: 2022
Call Number: 005.8 BRU
ISBN: 978-1-119-81628-7
Copie(s) info.:
● Total number of Copie(s):3
|
.
|
Publication type:
Book
Tilte:
Information security: principles and practice
Author(s):
Mark
Stamp
(Author),
Publication Data: Hoboken, New Jersey:
Wiley
Publication Year: 2022
Edition: 3rd ed.
Call Number: 005.8 STA
ISBN: 978-1-119-50590-7
Copie(s) info.:
● Total number of Copie(s):1
|
.
|
Publication type:
Book
Tilte:
Cryptography and network security: principles and practice
Author(s):
William
Stallings
(Author),
Publication Data: Boston:
Pearson Education Limited
Publication Year: 2023
Edition: 8th ed.
Call Number: 005.8 STA
ISBN: 978-1-292-43748-4
Copie(s) info.:
● Total number of Copie(s):2
|
.
|
Publication type:
Book
Tilte:
Fundamentals of information systems security
Author(s):
David
Kim
(Author),
Michael G.
Solomon
(Author),
Publication Data: Burlington:
Jones & Bartlett Learning
Publication Year: 2023
Edition: 4th ed.
Call Number: 005.8 KIM
ISBN: 978-1-284-22073-5
Copie(s) info.:
● Total number of Copie(s):2
|
Retrieved Title(s):108