Row | Call Number | Heading |
21 |
005.8 T552F 2006 |
Firewalls and VPNs : principles and practices / Richard W. Tibbs, Edward B. Oakes |
22 |
658.478 H851F 2011 |
FISMA principles and best practices : beyond compliance / Patrick D. Howard |
23 |
CD 005.8 C541H 2001 |
Hack attacks revealed : A complete reference with custom security hacking toolkit [CD-ROM] / Jo |
24 |
005.8 C541H 2001 |
Hack attacks revealed : a complete reference with custom security hacking toolkit / John Chiril |
25 |
005.8 A286H 2002 |
Hack proofing your network / David R. Mirza Ahmad...[et al.] ; Ryan Russell, techical editor |
26 |
CD 005.8 F731H 2001 |
Hack proofing : your web applications [CD-ROM] / Jeff Forristal, Julie Traxler |
27 |
005.8 F731H 2001 |
Hack proofing : your web applications / Jeff Forristal, Julie Traxler |
28 |
005.8 H361H 2001 |
Hacking linux exposed : linux security secrets and solutions / Brian Hatch, James Lee, George K |
29 |
CD 005.8 P664H 1997 |
Halting the hacker : a practical guide to computer security [CD-ROM] / Donald L. Pipkin |
30 |
005.8 P664H 1997 |
Halting the hacker : a practical guide to computer security / Donald L. Pipkin |
31 |
005.8 Q1I 2008 |
Information assurance : dependability and security in networked systems / Yi Qian...[et al.] |
32 |
005.8 L657I 2006 |
Information security : a strategic approach / Vincent LeVeque |
33 |
658.472 I43 1993 |
Information security / J. E. Ettinger, editor |
34 |
658.4038011 G977I 2000 C1 |
Information systems : success in the 21st century |
35 |
658.4038011 G977I 2000 |
Information systems : success in the 21st century / Uma G. Gupta |
36 |
CD 005.8 H274I 1996 |
Internet Firewalls and Network Security [CD-ROM] / Chris, Hare |
37 |
005.8 H274I 1996 |
Internet firewalls and network security / Chris Hare, Karanjit Siyan |
38 |
658.478 B531I 1996 |
Internet security for businesses / Terry Bernstein...[et al.] |
39 |
CD 008.8 K99I 1997 |
Internet security : risk analysis, strategies and firewalls [CD-ROM] / Othmar, Kyas |
40 |
005.8 K99I 1997 |
Internet security : risk analysis, strategies and firewalls / Othmar Kyas |