|
|
1. |
|
Computer crime /
Publication:
Lexington, Mass. : Lexington Books, 1978
. xiii, 207 p. ;
Date:1978
Availability:
Copies available:
Turkeyen Campus
Social Sciences
[HV6773 B46]
(1),
Actions:
Add to cart (remove)
|
|
|
2. |
|
computer insecurity /
Publication:
London : Chapman and Hall, 1983
. xiv, 351 p.
Date:1983
Availability:
Copies available:
Turkeyen Campus
Social Sciences
[HF5548.2 N67]
(1),
Actions:
Add to cart (remove)
|
|
|
3. |
|
The rise of the computer state /
Publication:
New York : Random House., 1983
. [viv], 273 p.
Date:1983
Availability:
Copies available:
Turkeyen Campus
Social Sciences
[JC596.2.U5 B87]
(1),
Actions:
Add to cart (remove)
|
|
|
4. |
|
BackTrack 5 Cookbook :
by Pritchett, Willie.
Publication:
Birmingham : Packt Pub., 2012
. 1 online resource (496 p.)
Date:2012
Availability:
No items available:
Actions:
Add to cart (remove)
|
|
|
5. |
|
Relation based access control /
by Zhang, Rui,
Publication:
. 1 online resource (v, 114 pages) :
, Part of the author's thesis (Ph .D.), Dept. of Information Engineering and Computer Science, University of Trento.
Availability:
No items available:
Actions:
Add to cart (remove)
|
|
|
6. |
|
Access contested
Publication:
Cambridge, MA : MIT Press, 2012
. 1 online resource (xv, 414 p.) :
Date:2012
Availability:
No items available:
Actions:
Add to cart (remove)
|
|
|
7. |
|
Linux firewalls
by Rash, Michael.
Publication:
San Francisco : No Starch Press, 2007
. 1 online resource (xix, 308 p.) :
, Includes index.
Date:2007
Availability:
No items available:
Actions:
Add to cart (remove)
|
|
|
8. |
|
Wicked cool Ruby scripts
by Pugh, Steve.
Publication:
San Francisco : No Starch Press, 2009
. 1 online resource (xxiv, 189 p.) :
, Includes index.
Date:2009
Availability:
No items available:
Actions:
Add to cart (remove)
|
No cover image available
No cover image available
|
|
9. |
|
OpenAM
by Thangasamy, Indira.
Publication:
Birmingham, UK : Packt Pub., 2011
. 1 online resource (vii, 270 p.) :
, "Community experience distilled"--Cover. | Includes index.
Date:2011
Availability:
No items available:
Actions:
Add to cart (remove)
|
|
|
10. |
|
Role mining in business
by Colantonio, Alessandro.
Publication:
Singapore : World Scientific, 2012
. 1 online resource (xx, 274 p.) :
Date:2012
Availability:
No items available:
Actions:
Add to cart (remove)
|
|
|
11. |
|
Metasploit penetration testing cookbook
by Singh, Abhinav.
Publication:
Birmingham : Packt Pub., 2012
. 1 online resource (iii, 250 pages)
, "Quick answers to common problems." | Includes index.
Date:2012
Availability:
No items available:
Actions:
Add to cart (remove)
|
|
|
12. |
|
Scrappy information security
by Seese, Michael,
Publication:
Cupertino, CA : Scrappy About, 2009
. 1 online resource (194 p.)
Date:2009
Availability:
No items available:
Actions:
Add to cart (remove)
|
|
|
13. |
|
Managing Information Security Breaches
by Krausz, Michael.
Publication:
Ely : IT Governance Pub., 2010
. 1 online resource (184 p.)
Date:2010
Availability:
No items available:
Actions:
Add to cart (remove)
|
|
|
14. |
|
Formal models and techniques for analyzing security protocols
Publication:
Amsterdam ; da Washington, DC : IOS Press, 2011
. 1 online resource (vii, 303 p.) :
Date:2011
Availability:
No items available:
Actions:
Add to cart (remove)
|
|
|
15. |
|
Intrusion prevention and active response
Publication:
Rockland, Mass. : Syngress Pub., 2005
. 1 online resource (xx, 402 p.) :
, Includes index.
Date:2005
Availability:
No items available:
Actions:
Add to cart (remove)
|
|
|
16. |
|
Snort
by Beale, Jay.
Publication:
Burlington, MA : Syngress, 2007
. 1 online resource (xxxiv, 730 p.) :
, Includes index.
Date:2007
Availability:
No items available:
Actions:
Add to cart (remove)
|
|
|
17. |
|
Infosecurity 2008 threat analysis
Publication:
Burlington, MA : Syngress Pub., 2008
. 1 online resource (xxiv, 442 p.) :
, Includes index.
Date:2008
Availability:
No items available:
Actions:
Add to cart (remove)
|
|
|
18. |
|
Implementing NAP and NAC security technologies
by Hoffman, Daniel
Publication:
Indianapolis, IN : Wiley Pub., 2008
. 1 online resource (xxi, 266 p.) :
Date:2008
Availability:
No items available:
Actions:
Add to cart (remove)
|
|
|
19. |
|
IT ethics handbook
by Northcutt, Stephen.
Publication:
Rockland, MA. : Syngress Pub., 2004
. 1 online resource (xxxvi, 604 p.)
Date:2004
Availability:
No items available:
Actions:
Add to cart (remove)
|
|
|
20. |
|
Role-based access control
by Ferraiolo, David.
Publication:
Boston : Artech House, 2007
. 1 online resource (xix, 381 p.) :
Date:2007
Availability:
No items available:
Actions:
Add to cart (remove)
|
|