Your search returned 55 results.

41.
Network security : private communication in a public world / Charlie Kaufman, Radia Perlman, Mike Speciner.

by Kaufman, Charlie | Perlman, Radia | Speciner, Mike.

Edition: 2nd ed.Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: Upper Saddle River, N.J. : Prentice Hall PTR, 2002Availability: Items available for loan: Main LibraryCall number: QA76.9 .A25 K39 2002 (1), Female LibraryCall number: QA76.9 .A25 K39 2002 (1).

42.
Network security essentials : applications and standards / William Stallings.

by Stallings, William.

Edition: 3rd ed.Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: Upper Saddle River, NJ : Pearson Education, c2007Online access: Table of contents only Availability: Items available for loan: Female LibraryCall number: TK5105.59 .S725 2007 (1), Main LibraryCall number: TK5105.59 .S725 2007 (1).

43.
Network security essentials : applications and standards / William Stallings.

by Stallings, William [author.].

Edition: Sixth edition.Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: Boston : Pearson, [2017]Copyright date: ©2017Availability: Items available for loan: Main LibraryCall number: TK5105.59 .S725 2017 (1), Female LibraryCall number: TK5105.59 .S725 2017 (1).

44.
Practical malware analysis : the hands-on guide to dissecting malicious software / by Michael Sikorski and Andrew Honig.

by Sikorski, Michael | Honig, Andrew.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: San Francisco : No Starch Press, 2012Availability: Items available for loan: Main LibraryCall number: QA76.76.C68 .S534 2012 (1), Female LibraryCall number: QA76.76.C68 .S534 2012 (1).

45.
Principles of information security / Michael E. Whitman, Herbert J. Mattford.

by Whitman, Michael E, 1964- | Mattord, Herbert J.

Edition: Fifth edition.Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: Boston, MA : Cengage Learning, [2016]Copyright date: ©2012Availability: Items available for loan: Main LibraryCall number: TK5105.59 .W54 2016 (1), Female LibraryCall number: TK5105.59 .W54 2016 (1).

46.
SACMAT '09: proceedings of the 14th ACM Symposium on Access Control Models and Technologies : Stresa, Italy, June 3-5, 2009 / sponsed by ACM SIGSAC and supported by University of Insubria, Arizona State University, & University of Pittsburgh.

by ACM Symposium on Access Control Models and Technologies (14th : 2009 : Stresa, Italy) | Association for Computing Machinery. Special Interest Group on Security, Audit, and Control | ACM Digital Library.

Material type: Text Text; Format: print available online remote; Literary form: Not fiction Publisher: New York, N.Y. : ACM Press, c2009Other title: Fourteenth ACM Symposium on Access Control Models and Technologies.Online access: Connect to this title online. Availability: Items available for loan: Main LibraryCall number: QA76.9 .A25 A345 2009 (1).

47.
SACMAT '10 : Proceedings of the 15th ACM Symposium on Access Control Models and Technologies, June 9-11, 2010, Pittsburgh, Pennsylvania, USA / sponsored by ACM SIGSAC ; supported by MODAP ... [et al.].

by ACM Symposium on Access Control Models and Technologies (15th : 2010 : Pittsburgh, Pa.) | Association for Computing Machinery. Special Interest Group on Security, Audit, and Control.

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: New York, N.Y. : ACM Press, c2010Other title: Proceedings of the 15th ACM Symposium on Access Control Models and Technologies.Availability: Items available for loan: Main LibraryCall number: QA76.9 .A25 A343 2010 (1).

48.
Secure computer and network systems : modeling, analysis and design / Nong Ye.

by Ye, Nong.

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: Chichester, England ; Hoboken, NJ : J. Wiley & Sons, c2008Online access: Table of contents only | Publisher description | Contributor biographical information Availability: Items available for loan: Main LibraryCall number: TK5105.59 .Y44 2008 (1), Female LibraryCall number: TK5105.59 .Y44 2008 (1).

49.
Security in computing / Charles P. Pfleeger, Shari Lawrence Pfleeger.

by Pfleeger, Charles P, 1948- | Pfleeger, Shari Lawrence.

Edition: 4th ed.Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: Upper Saddle River, NJ : Prentice Hall, c2007Online access: Table of contents Availability: Items available for loan: Main LibraryCall number: QA76.9 .A25 P45 2007 (1), Female LibraryCall number: QA76.9 .A25 P45 2007 (1).

50.
Security software development : assessing and managing security risks / Douglas A. Ashbaugh.

by Ashbaugh, Douglas A.

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: Boca Raton : CRC Press, c2009Online access: Table of contents only Availability: Items available for loan: Main LibraryCall number: QA76.9 .A25 A8246 2009 (1), Female LibraryCall number: QA76.9 .A25 A8246 2009 (1).

51.
Security vs. access : balancing safety and productivity in the digital school / LeAnne K. Robinson, Abbie H. Brown, Tim D. Green.

by Robinson, LeAnne | Brown, Abbie | Green, Tim D | International Society for Technology in Education.

Edition: 1st ed.Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: Eugene, Or. : International Society for Technology in Education, ©2010Availability: Items available for loan: Female LibraryCall number: LB1028.5 .R545 2010 (1), Main LibraryCall number: LB1028.5 .R545 2010 (1).

52.
Security+ guide to network security fundamentals / Mark Ciampa.

by Ciampa, Mark D.

Edition: 3rd ed.Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: Boston, MA. : Course Technology/ Cengage Learning, c2009Other title: Security plus guide to network security fundamentals | Network security fundamentals.Availability: Items available for loan: Main LibraryCall number: TK5105.59 .C52 2009 (1), Female LibraryCall number: TK5105.59 .C52 2009 (1).

53.
Testing code security / Maura A. van der Linden.

by Van der Linden, Maura A.

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: Boca Raton, FL : Auerbach Pub, c2007Availability: Items available for loan: Main LibraryCall number: QA76.9 .A25 V359 2007 (1), Female LibraryCall number: QA76.9 .A25 V359 2007 (1).

54.
Thinking security : stopping next year's hackers / Steven M. Bellovin.

by Bellovin, Steven M [author.].

Material type: Text Text; Format: print available online remote; Literary form: Not fiction Publisher: New York : Addison-Wesley, [2016]Availability: Items available for loan: Main LibraryCall number: TK5105.59 .B45 2016 (1), Female LibraryCall number: TK5105.59 .B45 2016 (1).

55.
Understanding developments in cyberspace law : leading lawyers on analyzing recent trends, case law, and legal strategies affecting the internet landscape.

by Aspatore, Inc.

Edition: 2013 ed.Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: [Boston, Mass.] : Aspatore Books, ©2013Availability: Items available for loan: Main LibraryCall number: KF390.5 .U49 2013 (1), Female LibraryCall number: KF390.5 .U49 2013 (1).