Your search returned 110 results.

Sort
Results
1.
Cloud management and security / Imad M. Abbadi.** by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Chichester, West Sussex ; Hoboken, NJ : John Wiley & Sons Inc., 2014
Availability: Items available for loan: MAIN (2)Call number: QA76.585 .A23 2014, ...

2.
Management of information security / Michael Whitman, Herbert Mattord by
Edition: 3rd ed
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Australia ; United States : Course Technology Cengage Learning, c2010
Availability: Items available for loan: MAIN (3)Call number: TK5105.59 .W5356 2010, ...

3.
Security battleground [electronic resource] : an executive field manual / Michael Fey ... [et al.]. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Hillsboro, Or. : Intel Press, c2012
Availability: Items available for loan: MAIN (1)Call number: HF5548.37 .S63 2012.

4.
Guide to network security / Michael Whitman ... [and 3 others]. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Boston, MA : Course Technology/Cengage Learning, [2013]
Availability: Items available for loan: MAIN (1)Call number: QA76.9.A25 W458 2013.

5.
Certified ethical hacker (CEH) cert guide / Michael Gregg by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Indianapolis, Ind. : Pearson, c2014
Availability: Items available for loan: MAIN (1)Call number: QA76.9.A25 G744 2014.

6.
Penetration testing / EC-Council/Press. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Clifton Park, NY : Course Technology, Cengage Learning, c2011
Availability: Items available for loan: MAIN (1)Call number: QA76.9.A25 P4355 2011.

7.
Computers, ethics & social values / edited by Deborah G.Johnson, Helen Nissenbaum. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Englewood Cliffs, N.J. : Prentice Hall, c1995
Other title:
  • Computers, ethics, and social values.
Availability: Items available for loan: MAIN (1)Call number: QA76.9.A25 C6665 1995.

8.
Principles of incident response and disaster recovery / Michael E. Whitman, Herbert J. Mattord. by
Material type: Text Text; Format: print ; Literary form: Not fiction ; Audience: Adult;
Publication details: Boston, Mass. : Thomson Course Technology, 2007
Availability: Items available for loan: MAIN (2)Call number: HF5548.37 .W45 2007, ...

9.
Penetration testing : a hands-on introduction to hacking / by Georgia Weidman. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: San Francisco : No Starch Press, [2014]
Availability: Items available for loan: MAIN (1)Call number: QA76.9.A25 W4258 2014.

10.
Principles of information systems security : text and cases / Gurpreet Dhillon. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Hoboken, NJ : John Wiley & Sons, c2007
Availability: Items available for loan: MAIN (1)Call number: QA76.9.A25 D525 2007.

11.
Computer security / Dieter Gollmann. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Chichester, England ; Hoboken, NJ : Wiley, c2006
Availability: Items available for loan: MAIN (1)Call number: QA76.9.A25 G65 2006.

12.
Security in computing / Charles P. Pfleeger, Shari Lawrence Pfleeger. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Upper Saddle River, N.J. : Prentice Hall PTR ; 2003
Availability: Items available for loan: MAIN (1)Call number: QA76.9.A25 P45 2003.

13.
Security in computing 5th edition / Charles P. Pfleeger, Shari Lawrence Pfleeger, Jonathan Margulies. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Upper Saddle River, NJ : Prentice Hall, [2015]
Availability: Items available for loan: MAIN (1)Call number: QA76.9.A25 P45 2015.

14.
Cyber-development, cyber-democracy and cyber-defense : challenges, opportunities and implications for theory, policy and practice / Elias G. Carayannis, David F.J. Campbell, Marios Panagiotis Efthymiopoulos, editors. by
Material type: Text Text; Format: print ; Literary form: Not fiction ; Audience: Adult;
Publication details: New York : Springer, 2014
Availability: Items available for loan: MAIN (2)Call number: HM851 .C93 2014, ...

15.
Hands-on ethical hacking and network defense / by Michael T. Simpson, Kent Backman and James E. Corley. by
Edition: 2nd ed.
Material type: Text Text; Format: print ; Literary form: Not fiction ; Audience: Adult;
Publication details: Boston, MA : Course Technology, Cengage Learning, 2011
Availability: Items available for loan: MAIN (1)Call number: QA76.9.A25 S55 2011.

16.
Digital fortress / Dan Brown. by
Material type: Text Text; Format: print ; Literary form: Not fiction ; Audience: Adult;
Publication details: London : Corgi books, 2009
Availability: Items available for loan: MAIN (1)Call number: PS3552.R685434 D54 2009.

17.
CIW : security professional : study guide / James Stanger, Patrick Lane, Tim Crothers. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: San Francisco, CA : Sybex, 2002
Availability: Items available for loan: MAIN (2)Call number: QA76.3 .S72 2002, ...

18.
Best truth : intelligence in the Information Age / Bruce D. Berkowitz and Allan E. Goodman. by
Material type: Text Text; Format: print ; Literary form: Not fiction ; Audience: Adult;
Publication details: New Haven : Yale University Press, 2000
Availability: Items available for loan: MAIN (2)Call number: QA76.9.A25 B48 2000, ...

19.
Chained exploits : advanced hacking attacks from start to finish / Andrew Whitaker, Keatron Evans, Jack B. Voth. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Upper Saddle River, NJ : Addison-Wesley, c2009
Availability: Items available for loan: MAIN (1)Call number: QA76.9 .A25 W44 2009.

20.
Computer forensics : investigation procedures and response / EC-Council Press. by
Material type: Text Text; Format: print ; Literary form: Not fiction ; Audience: Adult;
Publication details: Clifton Park, N. Y. : Course Technology Cengage Learning, 2010
Other title:
  • Investigation procedures and response
Availability: Items available for loan: MAIN (4)Call number: HV8079.C65 C66 2010 V.1, ...

Pages