Row | Call Number | Heading |
1 |
005.8 L334A 2000 |
Administrating web server, security and maintenance / Eric Larson, Brian Stephens |
2 |
005.8 M133A 2005 |
Assessing and managing security risk in IT systems : a structured methodelogy / John McCumber |
3 |
005.8 M647B 2005 |
Black hat physical device security : exploiting hardware and software / Drew Miller |
4 |
CD 004.6076 O25C 2004 |
CCNP intro exam certification guide [CD-ROM] / Wendell Odom ; Cisco Systems |
5 |
005.8 R962C 1992 |
Computer security basice / Deborah Russell |
6 |
658.478 F698C 1994 |
Computer security management / Karen A. Forcht. |
7 |
005.8 S782C 2015 |
Computer security : principles and practice / William Stallings, Lawrie Brown |
8 |
174.90904 C738 1995 |
Computers, ethics and social values / Deborah G. Jonson, Helen Nissenbaurn, ed |
9 |
005.8 B792C 2015 |
Corporate computer security/ Randy J. Boyle, Raymond R. Panko |
10 |
005.8 S782C 2006 |
Cryptography and network security : principles and practices / William Stallings |
11 |
005.82 M517C 2001 |
Cryptography decrypted / H.X. Mel, Doris M. Baker |
12 |
363.325900467 A524C 2013 |
Cyber attacks : protecting national infrastructure / Edward Amoroso |
13 |
005.74 S617D 2007 |
Data warehousing and data mining techniques for cyber security / Anoop Singhal |
14 |
005.8 C346D 1995 |
Database security / Silvana Castano |
15 |
Journal 658 |
Dr.Dobb's journal |
16 |
005.7565 K74E 2004 |
Effective Oracle database 10g secuity by design / David knox |
17 |
658.800285467 G815E 2000 |
Electronic commerce : security, risk management and control / Marilyn Greenstein, Todd M. Fenic |
18 |
005.8 J17E 2011 |
Engineering information security : the application of systems engineering concepts to achieve in |
19 |
CD 005.8 J17E 2011 |
Engineering information security : the application of systems engineering concepts to achieve in |
20 |
005.8 P679E 2004 |
Enterprise java security : building secure J2EE applications / Marco Pistioia...[et al.] |
21 |
005.8 T552F 2006 |
Firewalls and VPNs : principles and practices / Richard W. Tibbs, Edward B. Oakes |
22 |
658.478 H851F 2011 |
FISMA principles and best practices : beyond compliance / Patrick D. Howard |
23 |
CD 005.8 C541H 2001 |
Hack attacks revealed : A complete reference with custom security hacking toolkit [CD-ROM] / Jo |
24 |
005.8 C541H 2001 |
Hack attacks revealed : a complete reference with custom security hacking toolkit / John Chiril |
25 |
005.8 A286H 2002 |
Hack proofing your network / David R. Mirza Ahmad...[et al.] ; Ryan Russell, techical editor |
26 |
CD 005.8 F731H 2001 |
Hack proofing : your web applications [CD-ROM] / Jeff Forristal, Julie Traxler |
27 |
005.8 F731H 2001 |
Hack proofing : your web applications / Jeff Forristal, Julie Traxler |
28 |
005.8 H361H 2001 |
Hacking linux exposed : linux security secrets and solutions / Brian Hatch, James Lee, George K |
29 |
CD 005.8 P664H 1997 |
Halting the hacker : a practical guide to computer security [CD-ROM] / Donald L. Pipkin |
30 |
005.8 P664H 1997 |
Halting the hacker : a practical guide to computer security / Donald L. Pipkin |
31 |
005.8 Q1I 2008 |
Information assurance : dependability and security in networked systems / Yi Qian...[et al.] |
32 |
005.8 L657I 2006 |
Information security : a strategic approach / Vincent LeVeque |
33 |
658.472 I43 1993 |
Information security / J. E. Ettinger, editor |
34 |
658.4038011 G977I 2000 C1 |
Information systems : success in the 21st century |
35 |
658.4038011 G977I 2000 |
Information systems : success in the 21st century / Uma G. Gupta |
36 |
CD 005.8 H274I 1996 |
Internet Firewalls and Network Security [CD-ROM] / Chris, Hare |
37 |
005.8 H274I 1996 |
Internet firewalls and network security / Chris Hare, Karanjit Siyan |
38 |
658.478 B531I 1996 |
Internet security for businesses / Terry Bernstein...[et al.] |
39 |
CD 008.8 K99I 1997 |
Internet security : risk analysis, strategies and firewalls [CD-ROM] / Othmar, Kyas |
40 |
005.8 K99I 1997 |
Internet security : risk analysis, strategies and firewalls / Othmar Kyas |
41 |
005.8 B622I 2005 |
Introduction to computer security / Matt Bishop |
42 |
005.8 M534I 2003 |
Investigative data mining for security and criminal detection / Jesus Mena |
43 |
005.133 O11J 2001 |
Java security / Scott Oaks |
44 |
005.4469 M282L 2000 |
Linux system security : an administrator's guide to open source security tools / Scott Mann, El |
45 |
658.478 G663M 2006 |
Managing cybersecurity resources : a cost-benefit analysis / Lawrence A. Gordon, Martin P. Loeb |
46 |
005.8 N873N 2003 |
Network intrusion detection / Stephen Northcutt, Judy Novak |
47 |
005.8 F145N 2006 |
Network security : a hacker's perspective / Ankit Fadia |
48 |
005.8 S782N 2000 |
Network security essentials : applications and standard / William Stallings |
49 |
005.8 N476 2007 |
Networks, security and soft computing : trends and future directions / Dhruba K. Bhattacharyya, |
50 |
005.8 M116O 2007 |
Own your space: keep yourself and your stuff safe online / Linda McCarthy |
51 |
005.4469 L222P 1997 |
PCWEEK Microsoft Windows NT security : system administrator's guide / Nevin Lambert, Manish Pat |
52 |
CD 005.8 C752P 2004 |
Principles of computer security : security+ and beyond [CD-ROM] / Wm Arthur Conklin |
53 |
005.8 C752P 2005 |
Principles of computer security : security+ and beyond / Wm Arthur Conklin |
54 |
005.8 W615P 2005 |
Principles of information security / Michael E. Whitman, Herbert J. Mattord |
55 |
005.8 C678P 1995 |
Protection and security on the information superhighway / Frederick B. Cohen |
56 |
005.8 C524S 2007 |
Secure programming with static analysis / Brian Chess, Jacob West |
57 |
CD 005.8 C524S 2007 |
Secure programming with static analysis [CD-ROM] / Brian Chess, Jacob West |
58 |
658.47 G427S 2001 |
Security and privacy for E-business / Anup K. Ghosh |
59 |
658.478 C565I 2007 |
Security awareness : applying practical security in your world / Mark Ciampa |
60 |
005.8 A549S 2001 |
Security engineering : a guide to building dependable distributed systems / Ross Anderson |
61 |
005.8 P531S 1989 |
Security in computing / Charles P. Pfleeger |
62 |
005.8 P531S 1997 |
Security in computing / Charles P. Pfleeger |
63 |
005.8 S392S 2006 |
Security patterns : integrating security and systems engineering / Markus Schumacher |
64 |
005.8 B976S 2007 |
Security power tools / Bryan Burns...[et al.] |
65 |
005.8 L776d 2005 |
The database hacker's handbook : defending database servers / david Litchfield...[et Al.] |
66 |
005.8 J54H 2000 |
The hundredth window : protecting your privacy and security in the age of the internet / Charle |
67 |
658.478 P964S 2002 |
The secured enterprise : protecting your information assets / Paul E. Proctor, F. Christian |
68 |
005.8 S937W 2008 |
The web application hacker' s handbook: discovering and exploiting security flaws / Dafydd Stut |
69 |
CD 005.8 S131T 2007 |
Trustworthy computing : analytical and quantitative engineering evaluation [CD-ROM] / M. Sahino |
70 |
005.8 S131T 2007 |
Trustworthy computing : analytical and quantitative engineering evaluation / M. Sahinoglu |