Your search returned 65 results.

Sort
Results
1.
Database security / Alfred Basta, Melissa Zgola ; contributions made by Dana Bullaboy. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Boston, Mass. : Course Technology/Cengage Learning, [2012]
Availability: Items available for loan: MAIN (1)Call number: QA76.9 .D314 . B377 2012.

2.
Guide to network security / Michael Whitman ... [and 3 others]. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Boston, MA : Course Technology/Cengage Learning, [2013]
Availability: Items available for loan: MAIN (1)Call number: QA76.9.A25 W458 2013.

3.
Penetration testing / EC-Council/Press. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Clifton Park, NY : Course Technology, Cengage Learning, c2011
Availability: Items available for loan: MAIN (1)Call number: QA76.9.A25 P4355 2011.

4.
Principles of information systems security : text and cases / Gurpreet Dhillon. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Hoboken, NJ : John Wiley & Sons, c2007
Availability: Items available for loan: MAIN (1)Call number: QA76.9.A25 D525 2007.

5.
Securing the GCC in cyberspace / Richard A. Clarke, Robert K. Knake. by Series: Emirates lecture series ; 83
Edition: 1st ed.
Material type: Text Text; Format: print ; Literary form: Not fiction ; Audience: Adult;
Publication details: Abu Dhabi : The Emirates Center for Strategic Studies and Research, 2010
Availability: Items available for loan: MAIN (1)Call number: TK5105.59 .C574 2010.

6.
Chained exploits : advanced hacking attacks from start to finish / Andrew Whitaker, Keatron Evans, Jack B. Voth. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Upper Saddle River, NJ : Addison-Wesley, c2009
Availability: Items available for loan: MAIN (1)Call number: QA76.9 .A25 W44 2009.

7.
Critical infrastructure protection in homeland security : defending a networked nation / Ted G. Lewis. by
Edition: 2nd ed.
Material type: Text Text; Format: print ; Literary form: Not fiction ; Audience: Adult;
Publication details: Hoboken, New Jersey : John Wiley & Sons, 2015
Availability: Items available for loan: MAIN (1)Call number: QA76.9.A25 L49 2015.

8.
Security intelligence : a practitioner's guide to solving enterprise security challenges / Qing Li, Gregory Clark. by
Material type: Text Text; Format: print ; Literary form: Not fiction ; Audience: Adult;
Publication details: Indianapolis, IN : John Wiley & Sons, Inc., 2015
Availability: Items available for loan: MAIN (1)Call number: TK5105.59 .L52 2015.

9.
Cryptography and network security : principles and practice / William Stallings. by
Edition: 4th ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Upper Saddle River, N.J. : Pearson/Prentice Hall, c2006
Availability: Items available for loan: MAIN (4)Call number: TK5105.59 .S713 2006, ...

10.
Corporate Computer and Network Security / Raymond R. Panko by
Edition: 2nd ed.
Material type: Text Text; Literary form: Fiction
Publication details: New jersey: Pearson Education,Inc, 2010
Availability: Items available for loan: MAIN (1)Call number: QA76.9.A25 P36 2010.

11.
Network security for dummies / by Chey Cobb. by
Edition: 1st ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New York : Wiley Publishing, c2003
Availability: Items available for loan: MAIN (1)Call number: TK5105.59.C633 2003.

12.
Network Security Fundamentals : project manual / Rachelle Reese. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Hoboken, N.J. John Wiley & Sons, Inc., c2007
Availability: Items available for loan: MAIN (1)Call number: TK5105.59 .R39 2007.

13.
Network security essentials : applications and standards / William Stallings. by
Edition: 4th ed.
Material type: Text Text; Literary form: Fiction
Publication details: Boston: Pearson Education,Inc, 2011
Availability: Items available for loan: MAIN (4)Call number: TK5105.59 .S725 2011, ...

14.
Network and system security / editor, John R. Vacca. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Burlington, MA : Syngress/Elsevier, c2010
Availability: Items available for loan: MAIN (1)Call number: TK5105.59 .N48 2010.

15.
CCNA Cisco certified network associate security study guide (Exam 640-553) / Richard Deal. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: San Francisco : McGraw-Hill Professional, 2009
Availability: Items available for loan: MAIN (1)Call number: TK5105.59 .D428 2009.

16.
Hacking exposed 6 : network security secrets & solutions / Stuart McClure, Joel Scambray, George Kurtz. by
Edition: 10th anniversary ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New York : McGraw-Hill, c2009
Other title:
  • Hacking 6 exposed.
  • Hacking exposed six.
Availability: Not available: MAIN: Checked out (1).

17.
Computer forensics : incident response essentials / Warren G. Kruse II, Jay G. Heiser. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Boston, MA : Addison-Wesley, 2001
Availability: Items available for loan: MAIN (2)Call number: QA76.9 .A25 K78 2001, ...

18.
Fundamentals of network security / Eric Maiwald. by Series: Information security series
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New York : McGraw-Hill Technology Education, c2004
Availability: Items available for loan: MAIN (3)Call number: TK5105.59 .M362 2004, ...

19.
Hacker techniques, tools, and incident handling / Sean-Philip Oriyano and Michael Gregg. by Series: Jones & Bartlett Learning information systems security & assurance series
Material type: Text Text; Format: electronic available online remote; Literary form: Not fiction
Publication details: Sudbury, MA : Jones & Bartlett Learning, c2011
Availability: Items available for loan: MAIN (1)Call number: TK5105.59 .O786 2011.

20.
Auditing IT infrastructures for compliance [electronic resource] / Martin M. Weiss and Michael G. Solomon. by Series: Jones & Bartlett Learning information systems security & assurance series
Material type: Text Text; Format: electronic available online remote; Literary form: Not fiction
Publication details: Sudbury, MA : Jones & Bartlett Learning c2011
Availability: Items available for loan: MAIN (1)Call number: QA76.9 .A25 W428 2011.

Pages