Your search returned 8 results.

Not what you expected? Check for suggestions
Sort
Results
1. Books
Secrets and lies : digital security in a networked world / Bruce Schneier. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New York : John Wiley, 2000
Availability: Items available for loan: Judith Thomas Library (2)Call number: QA 76.9 .A25 S352 2000, ...
2. Books
Security engineering : a guide to building dependable distributed systems / Ross J. Anderson. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New York : Wiley, 2001
Availability: Items available for loan: Judith Thomas Library (2)Call number: QA 76.9 .A25 A54 2001, ...
3. Books
The art of intrusion : the real stories behind the exploits of hackers, intruders, & deceivers / Kevin D. Mitnick, William L. Simon. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Indianapolis, IN : Wiley, c2005
Availability: Items available for loan: Judith Thomas Library (1)Call number: QA 76.9 .A25 M587 2005.
4. Books
Applied cryptography : protocols, algorithms, and source code in C / Bruce Schneier. by
Edition: 2nd ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New York : John Wiley and sons, c1996
Availability: Items available for loan: Judith Thomas Library (1)Call number: QA 76.9 .A25 S35 1996.
5. Books
The art of deception : controlling the human element of security / Kevin D. Mitnick and William L. Simon ; foreword by Steve Wozniak. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Indianapolis, Ind. : Wiley, c2002
Availability: Items available for loan: Judith Thomas Library (1)Call number: QA 76.9 .A25 M585 2002.
6. Books
Security engineering : a guide to building dependable distributed systems / Ross J. Anderson. by
Edition: 2nd ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Indianapolis, IN : Wiley Pub., c2008
Availability: Items available for loan: Judith Thomas Library (2)Call number: QA 76.9 .A25 A54 2008, ...
7. Books
Hack attacks denied : a complete guide to network lockdown for UNIX, Windows, and Linux / John Chirillo. by
Edition: 2nd ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Indianapolis, Ind. : Wiley Pub., c2002
Availability: Items available for loan: Judith Thomas Library (2)Call number: QA 76.9 .A25 C47 2002, ...
8. Books
Network attacks & exploitation : a framework / Matthew Monte. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Indianapolis, IN : Wiley, c2015
Other title:
  • Network attacks and exploitation : a framework
Availability: Items available for loan: Judith Thomas Library (1)Call number: TK 5105.59 .M64 2015.
Pages