Your search returned 55 results.

21.
Fundamentals of network security / John E. Canavan.

by Canavan, John E.

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: Boston : Artech House, c2001Availability: Items available for loan: Main LibraryCall number: QA76.9 .A25 C364 2001 (1), Female LibraryCall number: QA76.9 .A25 C364 2001 (1).

22.
Gray hat hacking : the ethical hacker's handbook / Shon Harris ... [et al.].

by Harris, Shon.

Edition: 2nd ed.Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: New York : McGraw-Hill, c2008Online access: Contributor biographical information | Publisher description | Table of contents only Availability: Items available for loan: Female LibraryCall number: QA76.9 .A25 G743 2008 (1), Main LibraryCall number: QA76.9 .A25 G743 2008 (1).

23.
Guide to network defense and countermeasures / by Randy Weaver.

by Weaver, Randy.

Edition: 2nd ed.Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: Australia; Boston, Mass. : Course Technology, 2007Online access: Publisher description | Table of contents only | Contributor biographical information Availability: Items available for loan: Main LibraryCall number: TK5105.59 .W415 2007 (1). Checked out (1).

24.
Guide to operating systems security / Michael Palmer.

by Palmer, Michael J, 1948-.

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: Australia ; United Kingdom : Thomson/Course Technology, c2004Availability: Items available for loan: Main LibraryCall number: QA76.76 .O64 S78 2004 (1), Female LibraryCall number: QA76.76 .O64 S78 2004 (1).

25.
Guide to strategic infrastructure security : becoming a security network professional / by Randy Weaver and Dawn Weaver.

by Weaver, Randy | Weaver, Dawn.

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: Australia : Boston, MA : Course Technology, Cengage Learning, c2009Availability: Items available for loan: Female LibraryCall number: TK5105.59 .W43 2009 (1), Main LibraryCall number: TK5105.59 .W43 2009 (1).

26.
Hacking exposed : Web applications / Joel Scambray, Mike Shema, Caleb Sima ; foreword by Jeremiah Grossman.

by Scambray, Joel | Shema, Mike | Sima, Caleb.

Edition: 2nd ed.Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: New York : McGraw-Hill, c2006Availability: Items available for loan: Female LibraryCall number: TK5105.59 .S32 2006 (1). Checked out (1).

27.
Hacking exposed Linux : Linux security secrets & solutions / ISECOM.

by Hatch, Brian. Hacking Linux exposed | ISECOM (Organization).

Edition: 3rd ed.Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: New York, NY : McGraw-Hill, c2008Online access: Table of contents only Availability: Items available for loan: Main LibraryCall number: QA76.76 .O63 H375 2008 (1). In transit (1).

28.
Hacking exposed Windows : Windows security secrets & solutions / Joel Scambray, Stuart McClure.

by Scambray, Joel | McClure, Stuart.

Edition: 3rd ed.Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: New York, NY : McGraw-Hill, c2008Online access: Contributor biographical information | Publisher description | Table of contents only Availability: Items available for loan: Female LibraryCall number: QA76.9 .A25 S3 2008 (1), Main LibraryCall number: QA76.9 .A25 S3 2008 (1).

29.
Hacking for dummies / by Kevin Beaver ; foreword by Stuart McClure.

by Beaver, Kevin.

Edition: 3rd ed.Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: Hoboken, NJ : Wiley Pub., c2010Availability: Items available for loan: Main LibraryCall number: QA76.9 .A25 B42 2010 (1), Female LibraryCall number: QA76.9 .A25 B42 2010 (1).

30.
Information security : design, implementation, measurement, and compliance / Timothy P. Layton.

by Layton, Timothy P.

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: Boca Raton : Auerbach Publications, c2007Online access: Publisher description Availability: Items available for loan: Main LibraryCall number: HF5548.37 .L393 2007 (1), Female LibraryCall number: HF5548.37 .L393 2007 (1).

31.
Information security : principles and practices / Mark S. Merkow, Jim Breithaupt.

by Merkow, Mark S | Breithaupt, Jim, 1955-.

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: Upper Saddle River, N.J. : Pearson Prentice Hall, c2006Online access: Table of contents Availability: Items available for loan: Main LibraryCall number: QA76.9 .A25 M485 2006 (1), Female LibraryCall number: QA76.9 .A25 M485 2006 (1).

32.
Information security management handbook / edited by Harold F. Tipton, Micki Krause. Vol. 2.

by Tipton, Harold F | Krause, Micki.

Edition: 6th ed.Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: Boca Raton, Fla. : London : Auerbach ; Taylor & Francis [distributor], 2008Availability: Items available for loan: Main LibraryCall number: QA76.9 .A25 I54 2008 (2), Female LibraryCall number: QA76.9 .A25 I54 2008 (2).

33.
Information security management handbook / Harold F. Tipton, Micki Krause, [editors].

by Tipton, Harold F | Krause, Micki.

Edition: 6th ed.Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: Boca Raton : Auerbach Publications, c2007Online access: Table of contents only | Publisher description Availability: Items available for loan: Main LibraryCall number: QA76.9.A25 I54165 2007 PT.1 (4).

34.
Inside network security assessment : guarding your IT infrastructure / Michael Gregg, David Kim.

by Gregg, Michael (Michael C.) | Kim, David.

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: Indianapolis, Ind. : Sams, 2006Availability: Items available for loan: Main LibraryCall number: QA76.9 .A25 G7495 2006 (1), Female LibraryCall number: QA76.9 .A25 G7495 2006 (1).

35.
Introduction to certificateless cryptography / Hu Xiong, Zhen Qin, Athanasios V. Vasilakos.

by Xiong, Hu [author.] | Qin, Zhen, 1982- [author.] | Vasilakos, Athanasios [author.].

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: Boca Raton : CRC Press, Taylor & Francis Group, [2017]Availability: No items available :

36.
The management of network security : technology, design, and management control / Houston H. Carr, Charles A. Snyder, and Bliss N. Bailey.

by Carr, Houston H, 1937- | Snyder, Charles A | Bailey, Bliss N.

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: Upper Saddle River, N.J. : Prentice Hall, 2010Availability: Items available for loan: Main LibraryCall number: TK5105.59 .C3655 2010 (1), Female LibraryCall number: TK5105.59 .C3655 2010 (1).

37.
The mathematics of secrets : cryptography from Caesar ciphers to digital encryption / Joshua Holden.

by Holden, Joshua, 1970- [author.].

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: Princeton : Princeton University Press, [2017]Availability: Items available for loan: Main LibraryCall number: Z103 .H664 2017 (1), Female LibraryCall number: Z103 .H664 2017 (1).

38.
MM&Sec '10 : proceedings of the 2010 ACM SIGMM Multimedia and Security Workshop ; September 9-10, 2010, Roma, Italy / sponsored by ACM SIGMM.

by Multimedia and Security Workshop (12th : 2010 : Roma, Italy) | ACM Special Interest Group on Multimedia.

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: New York : Association for Computing Machinery, 2010Other title: Mm&Sec 2010 | Proceedings of the 2010 ACM SIGMM Multimedia and Security Workshop | Multimedia and Security Workshop.Availability: Items available for loan: Main LibraryCall number: QA76.575 .A26 2010 (1).

39.
Network defense and countermeasures : principles and practices / Chuck Easttom.

by Easttom, Chuck.

Edition: 2nd ed.Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Indianapolis, IN : Pearson, ©2014Availability: Items available for loan: Main LibraryCall number: TK5105.59 .E33 2014 (1), Female LibraryCall number: TK5105.59 .E33 2014 (1).

40.
Network security : a beginner's guide / Eric Maiwald.

by Maiwald, Eric.

Edition: 2nd ed.Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: New York : McGraw-Hill/Osborne, c2003Online access: Publisher description | Contributor biographical information | Table of contents Availability: Items available for loan: Main LibraryCall number: TK5105.59 .M363 2003 (1), Female LibraryCall number: TK5105.59 .M363 2003 (1).