1 2 3 4 5 6 7 8 9 10 Next >>
1. Computer forensics and cyber crime :   Publication: Upper Saddle River, N.J. : Pearson, 2004 . xv, 248 p. : Date:2004 Availability: Copies available: Tain Campus [QA76 .9 A25 B75] (1), Actions: Add to cart
2. The international handbook of computer security /   Publication: Chicago : Glenlake Publishing Company Ltd., 2000 . xii, 260 p. : Date:2000 Availability: Copies available: Tain Campus [QA76.9 A25 S55 ] (1), Actions: Add to cart
3. Applied cryptography :   Publication: New York, N.Y. : John Wiley, 1996 . xxiii, 758 p. : Date:1996 Availability: Copies available: Tain Campus [QA76.9 A25 S36 1996] (1), Turkeyen Campus Science & Technology [QA76.9 A25 S36 1996 ] (1), Actions: Add to cart
4. Fundamentals of network security /   Publication: Boston : Artech House, 2001 . xx, [324] p. : Date:2001 Availability: Copies available: Tain Campus [QA76.9 A25 C36] (1), Actions: Add to cart
5. Security management :   Publication: Upper Saddle River, N.J. : Pearson Education, 2005 . xiii, 322 p. : Date:2005 Availability: Copies available: Turkeyen Campus Reserved Collection [HV8290 O78 2005] (1), Turkeyen Campus Social Sciences [HV8290 O78 2005] (1), Actions: Add to cart
6. Hacking exposed :   Publication: New ?York : McGraw-Hill, 2005 . xxiii, 692 p. : Date:2005 Availability: Copies available: Turkeyen Campus Reserved Collection [TK5105.59 M33 2005] (1), Turkeyen Campus Science & Technology [TK5105.59 M33 2005] (2), Actions: Add to cart
7. Network security essentials :   Publication: Upper Saddle River, N.J. : Pearson Education, 2007 . xvi, 413 p. : Date:2007 Availability: Copies available: Turkeyen Campus Reserved Collection [TK5105.59 S725 2007] (1), Actions: Add to cart
8. CCSA /   Publication: Scottsdale, AZ: Coriolis Group Books, 2001 . xxxii, 296 p. : , On cover: CCSA Checkpoint Certified Security Administrator Date:2001 Availability: Copies available: Turkeyen Campus Science & Technology [QA76.3 P54] (1), Actions: Add to cart
9. Security architecture:   Publication: New york N, Y : Osborne / McGraw-hill, 2001 . xxiv,481p. Date:2001 Availability: Copies available: Turkeyen Campus Science & Technology [QA76.9 A25 K55] (1), Actions: Add to cart
10. Principles of information security /   Publication: Australia : Thomson Course Technology, 2005 . xxiii, 576 p. : Date:2005 Availability: Copies available: Turkeyen Campus Science & Technology [TK5105.59 W55 2005] (2), Actions: Add to cart
11. Essential Check Point FireWall-1 :   Publication: Boston : Addison-Wesley, 2002 . xxiii, 519 p. : 24 cm. Date:2002 Availability: Copies available: Turkeyen Campus Science & Technology [TK5105.59 W46] (1), Actions: Add to cart
12. Security transformation :   Publication: New York, N.Y. : McGraw-Hill, 2001 . xii, 211 p. : Date:2001 Availability: Copies available: Turkeyen Campus Social Sciences [HD30.38 M32] (1), Actions: Add to cart
13. Stealing the network :   Publication: Rockland, M.A. : Syngress, 2004 . xxvi, 402 p. : Date:2004 Availability: Copies available: Tain Campus [PS648 C65 S83] (1), Actions: Add to cart
14. Contemporary cryptology :   Publication: Piscataway, NJ : IEEE Press, 1992 . xv, 640 p. : , "The Institute of Electrical and Electronics Engineers, Inc., New York." | "IEEE order number: PC0271-7"--T.p. verso. Date:1992 Availability: Copies available: Turkeyen Campus Science & Technology [QA76.9 A25 C66] (1), Actions: Add to cart
15. Coding and cryptology   Publication: Singapore ; | London : World Scientific, 2008 . 1 online resource. , Title from PDF title page (viewed on Apr. 3, 2013). Date:2008 Availability: No items available: Actions: Add to cart
16. End user information security policy template by Beachy, Rob. Publication: [S.l.] : BrainMass Inc., 2012 . 1 online resource. , Title from PDF title page (viewed on Mar. 14, 2013). Date:2012 Availability: No items available: Actions: Add to cart
17. CISSP exam prep   Publication: Washington, D.C. : SSI Logic, 2012 . 1 online resource. , Title from title screen. Date:2012 Availability: No items available: Actions: Add to cart
18. Penetration testing by Henry, Kevin M. Publication: Ely, Cambridgeshire, U.K. : IT Governance Pub., 2012 . 1 online resource. , Title from title screen. Date:2012 Availability: No items available: Actions: Add to cart
19. Securing cloud services by Newcombe, Lee. Publication: Ely, Cambridgeshire, U.K. : IT Governance Pub., 2012 . 1 online resource. , Title from title screen. Date:2012 Availability: No items available: Actions: Add to cart
20. An introduction to hacking and crimeware by Loewengart, Victoria. Publication: Ely, Cambridgeshire : IT Governance Pub., 2012 . 1 online resource (53 p.) Date:2012 Availability: No items available: Actions: Add to cart
1 2 3 4 5 6 7 8 9 10 Next >>