1. Computer crime /   Publication: Lexington, Mass. : Lexington Books, 1978 . xiii, 207 p. ; Date:1978 Availability: Copies available: Turkeyen Campus Social Sciences [HV6773 B46] (1), Actions: Add to cart
2. computer insecurity /   Publication: London : Chapman and Hall, 1983 . xiv, 351 p. Date:1983 Availability: Copies available: Turkeyen Campus Social Sciences [HF5548.2 N67] (1), Actions: Add to cart
3. The rise of the computer state /   Publication: New York : Random House., 1983 . [viv], 273 p. Date:1983 Availability: Copies available: Turkeyen Campus Social Sciences [JC596.2.U5 B87] (1), Actions: Add to cart
4. BackTrack 5 Cookbook : by Pritchett, Willie. Publication: Birmingham : Packt Pub., 2012 . 1 online resource (496 p.) Date:2012 Availability: No items available: Actions: Add to cart
5. Relation based access control / by Zhang, Rui, Publication: . 1 online resource (v, 114 pages) : , Part of the author's thesis (Ph .D.), Dept. of Information Engineering and Computer Science, University of Trento. Availability: No items available: Actions: Add to cart
6. Access contested   Publication: Cambridge, MA : MIT Press, 2012 . 1 online resource (xv, 414 p.) : Date:2012 Availability: No items available: Actions: Add to cart
7. Linux firewalls by Rash, Michael. Publication: San Francisco : No Starch Press, 2007 . 1 online resource (xix, 308 p.) : , Includes index. Date:2007 Availability: No items available: Actions: Add to cart
8. Wicked cool Ruby scripts by Pugh, Steve. Publication: San Francisco : No Starch Press, 2009 . 1 online resource (xxiv, 189 p.) : , Includes index. Date:2009 Availability: No items available: Actions: Add to cart No cover image available No cover image available
9. OpenAM by Thangasamy, Indira. Publication: Birmingham, UK : Packt Pub., 2011 . 1 online resource (vii, 270 p.) : , "Community experience distilled"--Cover. | Includes index. Date:2011 Availability: No items available: Actions: Add to cart
10. Role mining in business by Colantonio, Alessandro. Publication: Singapore : World Scientific, 2012 . 1 online resource (xx, 274 p.) : Date:2012 Availability: No items available: Actions: Add to cart
11. Metasploit penetration testing cookbook by Singh, Abhinav. Publication: Birmingham : Packt Pub., 2012 . 1 online resource (iii, 250 pages) , "Quick answers to common problems." | Includes index. Date:2012 Availability: No items available: Actions: Add to cart
12. Scrappy information security by Seese, Michael, Publication: Cupertino, CA : Scrappy About, 2009 . 1 online resource (194 p.) Date:2009 Availability: No items available: Actions: Add to cart
13. Managing Information Security Breaches by Krausz, Michael. Publication: Ely : IT Governance Pub., 2010 . 1 online resource (184 p.) Date:2010 Availability: No items available: Actions: Add to cart
14. Formal models and techniques for analyzing security protocols   Publication: Amsterdam ; da Washington, DC : IOS Press, 2011 . 1 online resource (vii, 303 p.) : Date:2011 Availability: No items available: Actions: Add to cart
15. Intrusion prevention and active response   Publication: Rockland, Mass. : Syngress Pub., 2005 . 1 online resource (xx, 402 p.) : , Includes index. Date:2005 Availability: No items available: Actions: Add to cart
16. Snort by Beale, Jay. Publication: Burlington, MA : Syngress, 2007 . 1 online resource (xxxiv, 730 p.) : , Includes index. Date:2007 Availability: No items available: Actions: Add to cart
17. Infosecurity 2008 threat analysis   Publication: Burlington, MA : Syngress Pub., 2008 . 1 online resource (xxiv, 442 p.) : , Includes index. Date:2008 Availability: No items available: Actions: Add to cart
18. Implementing NAP and NAC security technologies by Hoffman, Daniel Publication: Indianapolis, IN : Wiley Pub., 2008 . 1 online resource (xxi, 266 p.) : Date:2008 Availability: No items available: Actions: Add to cart
19. IT ethics handbook by Northcutt, Stephen. Publication: Rockland, MA. : Syngress Pub., 2004 . 1 online resource (xxxvi, 604 p.) Date:2004 Availability: No items available: Actions: Add to cart
20. Role-based access control by Ferraiolo, David. Publication: Boston : Artech House, 2007 . 1 online resource (xix, 381 p.) : Date:2007 Availability: No items available: Actions: Add to cart