|
|
1. |
|
Computer forensics and cyber crime :
Publication:
Upper Saddle River, N.J. : Pearson, 2004
. xv, 248 p. :
Date:2004
Availability:
Copies available:
Tain Campus
[QA76 .9 A25 B75]
(1),
Actions:
Add to cart (remove)
|
|
|
2. |
|
The international handbook of computer security /
Publication:
Chicago : Glenlake Publishing Company Ltd., 2000
. xii, 260 p. :
Date:2000
Availability:
Copies available:
Tain Campus
[QA76.9 A25 S55 ]
(1),
Actions:
Add to cart (remove)
|
|
|
3. |
|
Applied cryptography :
Publication:
New York, N.Y. : John Wiley, 1996
. xxiii, 758 p. :
Date:1996
Availability:
Copies available:
Tain Campus
[QA76.9 A25 S36 1996]
(1),
Turkeyen Campus
Science & Technology
[QA76.9 A25 S36 1996 ]
(1),
Actions:
Add to cart (remove)
|
|
|
4. |
|
Fundamentals of network security /
Publication:
Boston : Artech House, 2001
. xx, [324] p. :
Date:2001
Availability:
Copies available:
Tain Campus
[QA76.9 A25 C36]
(1),
Actions:
Add to cart (remove)
|
|
|
5. |
|
Security management :
Publication:
Upper Saddle River, N.J. : Pearson Education, 2005
. xiii, 322 p. :
Date:2005
Availability:
Copies available:
Turkeyen Campus
Reserved Collection
[HV8290 O78 2005]
(1),
Turkeyen Campus
Social Sciences
[HV8290 O78 2005]
(1),
Actions:
Add to cart (remove)
|
|
|
6. |
|
Hacking exposed :
Publication:
New ?York : McGraw-Hill, 2005
. xxiii, 692 p. :
Date:2005
Availability:
Copies available:
Turkeyen Campus
Reserved Collection
[TK5105.59 M33 2005]
(1),
Turkeyen Campus
Science & Technology
[TK5105.59 M33 2005]
(2),
Actions:
Add to cart (remove)
|
|
|
7. |
|
Network security essentials :
Publication:
Upper Saddle River, N.J. : Pearson Education, 2007
. xvi, 413 p. :
Date:2007
Availability:
Copies available:
Turkeyen Campus
Reserved Collection
[TK5105.59 S725 2007]
(1),
Actions:
Add to cart (remove)
|
|
|
8. |
|
CCSA /
Publication:
Scottsdale, AZ: Coriolis Group Books, 2001
. xxxii, 296 p. :
, On cover: CCSA Checkpoint
Certified
Security
Administrator
Date:2001
Availability:
Copies available:
Turkeyen Campus
Science & Technology
[QA76.3 P54]
(1),
Actions:
Add to cart (remove)
|
|
|
9. |
|
Security architecture:
Publication:
New york N, Y : Osborne / McGraw-hill, 2001
. xxiv,481p.
Date:2001
Availability:
Copies available:
Turkeyen Campus
Science & Technology
[QA76.9 A25 K55]
(1),
Actions:
Add to cart (remove)
|
|
|
10. |
|
Principles of information security /
Publication:
Australia : Thomson Course Technology, 2005
. xxiii, 576 p. :
Date:2005
Availability:
Copies available:
Turkeyen Campus
Science & Technology
[TK5105.59 W55 2005]
(2),
Actions:
Add to cart (remove)
|
|
|
11. |
|
Essential Check Point FireWall-1 :
Publication:
Boston : Addison-Wesley, 2002
. xxiii, 519 p. :
24 cm.
Date:2002
Availability:
Copies available:
Turkeyen Campus
Science & Technology
[TK5105.59 W46]
(1),
Actions:
Add to cart (remove)
|
|
|
12. |
|
Security transformation :
Publication:
New York, N.Y. : McGraw-Hill, 2001
. xii, 211 p. :
Date:2001
Availability:
Copies available:
Turkeyen Campus
Social Sciences
[HD30.38 M32]
(1),
Actions:
Add to cart (remove)
|
|
|
13. |
|
Stealing the network :
Publication:
Rockland, M.A. : Syngress, 2004
. xxvi, 402 p. :
Date:2004
Availability:
Copies available:
Tain Campus
[PS648 C65 S83]
(1),
Actions:
Add to cart (remove)
|
|
|
14. |
|
Contemporary cryptology :
Publication:
Piscataway, NJ : IEEE Press, 1992
. xv, 640 p. :
, "The Institute of Electrical and Electronics Engineers, Inc., New York." | "IEEE order number: PC0271-7"--T.p. verso.
Date:1992
Availability:
Copies available:
Turkeyen Campus
Science & Technology
[QA76.9 A25 C66]
(1),
Actions:
Add to cart (remove)
|
|
|
15. |
|
Coding and cryptology
Publication:
Singapore ; | London : World Scientific, 2008
. 1 online resource.
, Title from PDF title page (viewed on Apr. 3, 2013).
Date:2008
Availability:
No items available:
Actions:
Add to cart (remove)
|
|
|
16. |
|
End user information security policy template
by Beachy, Rob.
Publication:
[S.l.] : BrainMass Inc., 2012
. 1 online resource.
, Title from PDF title page (viewed on Mar. 14, 2013).
Date:2012
Availability:
No items available:
Actions:
Add to cart (remove)
|
|
|
17. |
|
CISSP exam prep
Publication:
Washington, D.C. : SSI Logic, 2012
. 1 online resource.
, Title from title screen.
Date:2012
Availability:
No items available:
Actions:
Add to cart (remove)
|
|
|
18. |
|
Penetration testing
by Henry, Kevin M.
Publication:
Ely, Cambridgeshire, U.K. : IT Governance Pub., 2012
. 1 online resource.
, Title from title screen.
Date:2012
Availability:
No items available:
Actions:
Add to cart (remove)
|
|
|
19. |
|
Securing cloud services
by Newcombe, Lee.
Publication:
Ely, Cambridgeshire, U.K. : IT Governance Pub., 2012
. 1 online resource.
, Title from title screen.
Date:2012
Availability:
No items available:
Actions:
Add to cart (remove)
|
|
|
20. |
|
An introduction to hacking and crimeware
by Loewengart, Victoria.
Publication:
Ely, Cambridgeshire : IT Governance Pub., 2012
. 1 online resource (53 p.)
Date:2012
Availability:
No items available:
Actions:
Add to cart (remove)
|
|