Your search returned 81 results.

21.
Digital privacy : theory, technologies, and practices / edited by Alessandro Acquisti ... [et al.].

by Acquisti, Alessandro.

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: New York : Auerbach Publications, c2008Online access: Table of contents only | Table of contents Availability: Items available for loan: Main LibraryCall number: QA76.9 .A25 D528 2008 (1), Female LibraryCall number: QA76.9 .A25 D528 2008 (1).

22.
Disarmament forum. 2011/4, Confronting cyberconflict / United Nations Institute for Disarmament Research ; editor in chief Kerstin Vignard ; editos (English) Ross McRae, Jason Powers ; French translator Valérie Compagnion.

by Vignard, Kerstin | McRae, Ross | Compagnion, Valérie | United Nations Institute for Disarmament Research.

Material type: Text Text; Format: print ; Literary form: Not fiction Language: English Publisher: Geneva : United Nations Institute for Disarmament Research, 2011Other title: Forum du désarmement. | Confronting cyberconflict | Faire face aux cyberconflits.Availability: Items available for loan: Main LibraryCall number: HV6773 .D57 2011 (1).

23.
E-commerce agents : marketplace solutions, security issues, and supply and demand / Jiming Liu, Yiming Ye (Eds.).

by Liu, Jiming, 1962- | Ye, Yiming, 1963-.

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: Berlin ; New York : Springer, c2001Availability: Items available for loan: Main LibraryCall number: HF5548.32 .E182 2001 (1), Female LibraryCall number: HF5548.32 .E182 2001 (1).

24.
Elsevier's dictionary of information security in English, German, French and Russian / compiled by G. Manoilov and B. Radichkova.

by Manoilov, G | Radichkova, B.

Edition: 1st ed.Material type: Text Text; Format: print ; Literary form: Not fiction Language: English, French, German, Russian Publisher: Amsterdam ; Boston : Elsevier, 2007Other title: Dictionary of information security in English, German, French and Russian.Online access: Publisher description Availability: Items available for loan: Main LibraryCall number: REF QA76.9 .A25. M36 2007 (1), Female LibraryCall number: REF QA76.9 .A25. M36 2007 (1).

25.
Enterprise security : IT security solutions : concepts, practical experiences, technologies / edited by Walter Fumy and Jooerg Sauerbrey.

by Fumy, Walter | Sauerbrey, Joerg.

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: Erlangen : Publicis Corporate Publishing, c2006Online access: Contributor biographical information | Publisher description | Table of contents only Availability: Items available for loan: Main LibraryCall number: QA76.9 .A25 E5465 2006 (1), Female LibraryCall number: QA76.9 .A25 E5465 2006 (1).

26.
Enterprise Web services security / Rickland Hollar, Richard Murphy.

by Hollar, Rickland, 1954- | Murphy, Richard, 1954-.

Edition: 1st ed.Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: Hingham, Mass. : Charles River Media, c2006Online access: Table of contents Availability: Items available for loan: Main LibraryCall number: TK5105.59 .H66 2006 (1), Female LibraryCall number: TK5105.59 .H66 2006 (1).

27.
Fundamentals of network security / Eric Maiwald.

by Maiwald, Eric.

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: New York : McGraw-Hill Technology Education, c2004Online access: Publisher description | Contributor biographical information | Table of contents Availability: Items available for loan: Female LibraryCall number: TK5105.59 .M362 2004 (2), Main LibraryCall number: TK5105.59 .M362 2004 (2).

28.
Fundamentals of network security / John E. Canavan.

by Canavan, John E.

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: Boston : Artech House, c2001Availability: Items available for loan: Main LibraryCall number: QA76.9 .A25 C364 2001 (1), Female LibraryCall number: QA76.9 .A25 C364 2001 (1).

29.
Global nuclear security : building greater accountability and cooperation / Pavel Podvig.

by Podvig, P. L. (Pavel Leonardovich) | United Nations Institute for Disarmament Research.

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: Geneva ; New York : UNIDIR, 2011Online access: Click here to access online Availability: Items available for loan: Main LibraryCall number: JX1974.7 .P54 2011 (1).

30.
Guide to network defense and countermeasures / by Randy Weaver.

by Weaver, Randy.

Edition: 2nd ed.Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: Australia; Boston, Mass. : Course Technology, 2007Online access: Publisher description | Table of contents only | Contributor biographical information Availability: Items available for loan: Main LibraryCall number: TK5105.59 .W415 2007 (1). Checked out (1).

31.
Guide to strategic infrastructure security : becoming a security network professional / by Randy Weaver and Dawn Weaver.

by Weaver, Randy | Weaver, Dawn.

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: Australia : Boston, MA : Course Technology, Cengage Learning, c2009Availability: Items available for loan: Female LibraryCall number: TK5105.59 .W43 2009 (1), Main LibraryCall number: TK5105.59 .W43 2009 (1).

32.
Hacker / Sue Leather and Julian Thomlinson.

by Leather, Sue | Thomlinson, Julian.

Material type: Text Text; Format: print ; Literary form: Fiction Publisher: Boston : Heinle/Cengage Learning, 2011Availability: Items available for loan: Main LibraryCall number: PE1126 .L43 H33 2011 (1). Checked out (1).

33.
Hacker's challenge 3 : 20 brand-new forensic scenarios & solutions / David Pollino ... [et al.].

by Pollino, David.

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: New York : McGraw-Hill, c2006Other title: Hacker's challenge three.Online access: Contributor biographical information | Publisher description | Table of contents only Availability: Items available for loan: Main LibraryCall number: QA76.9 .A25 H322 2006 (1), Female LibraryCall number: QA76.9 .A25 H322 2006 (1).

34.
Hacking exposed : Web applications / Joel Scambray, Mike Shema, Caleb Sima ; foreword by Jeremiah Grossman.

by Scambray, Joel | Shema, Mike | Sima, Caleb.

Edition: 2nd ed.Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: New York : McGraw-Hill, c2006Availability: Items available for loan: Female LibraryCall number: TK5105.59 .S32 2006 (1). Checked out (1).

35.
Hacking exposed Cisco networks : Cisco security secrets & solutions / Andrew A. Vladimirov ... [et al.].

by Vladimirov, Andrew A.

Material type: Text Text; Format: print ; Literary form: Not fiction ; Audience: Adult; Publisher: New York : McGraw-Hill/Osborne, c2006Other title: Hacking Cisco networks exposed.Online access: Contributor biographical information | Publisher description Availability: Items available for loan: Female LibraryCall number: TK5105.59 .H32 2006 (1), Main LibraryCall number: TK5105.59 .H32 2006 (1).

36.
Hacking exposed VoIP : voice over IP security secrets & solutions / David Endler, Mark Collier.

by Endler, David | Collier, Mark D.

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: New York : McGraw-Hill, c2007Online access: Table of contents | Contributor biographical information Availability: Items available for loan: Main LibraryCall number: TK5105.8865 .E53 2007 (1), Female LibraryCall number: TK5105.8865 .E53 2007 (1).

37.
Hacking exposed wireless : wireless security secrets & solutions / Johnny Cache, Vincent Liu.

by Cache, Johnny | Liu, Vincent.

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: New York, NY : McGraw-Hill, c2007Online access: Contributor biographical information | Publisher description | Table of contents only Availability: Items available for loan: Female LibraryCall number: TK5103.2 .C23 2007 (1), Main LibraryCall number: TK5103.2 .C23 2007 (1).

38.
Hacking for dummies / by Kevin Beaver ; foreword by Stuart McClure.

by Beaver, Kevin.

Edition: 3rd ed.Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: Hoboken, NJ : Wiley Pub., c2010Availability: Items available for loan: Main LibraryCall number: QA76.9 .A25 B42 2010 (1), Female LibraryCall number: QA76.9 .A25 B42 2010 (1).

39.
Hacking Web services / Shreeraj Shah.

by Shah, Shreeraj.

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: Boston, Mass. : Charles River Media, c2007Online access: Table of contents Availability: Items available for loan: Main LibraryCall number: TK5105.59 .S5154 2007 (1), Female LibraryCall number: TK5105.59 .S5154 2007 (1).

40.
Handbook of information security / Hossein Bidgoli, editor-in-chief.

by Bidgoli, Hossein.

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: Hoboken, N.J. : John Wiley, c2006Online access: Table of contents | Publisher description Availability: Items available for loan: Main LibraryCall number: REF TK5105.59 .H35 2006 (3), Female LibraryCall number: REF TK5105.59 .H35 2006 (3).