Your search returned 8 results.

Not what you expected? Check for suggestions
Sort
Results
1. Books
Information assurance for the enterprise : a roadmap to information security / Corey Schou, Dan Shoemaker. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Boston : McGraw-Hill Irwin, c2007
Availability: Items available for loan: Judith Thomas Library (3)Call number: QA 76.9 .A25 S3523 2007, ...
2. Books
Wireless operational security / John W. Rittinghouse, James F. Ransome. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Amsterdam ; Boston : Elsevier Digital Press, c2004
Online access:
Availability: Items available for loan: Judith Thomas Library (1)Call number: TK 5105.59 .R58 2004.
3. Books
Building secure software how to avoid security problems the right way / John Viega, Gary McGraw. by Series: Addison-Wesley professional computing series
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Boston : Addison-Wesley, c2002
Availability: Items available for loan: Judith Thomas Library (1)Call number: QA 76.76 .D47 V857 2001.
4. Books
Honeypots : tracking hackers / Lance Spitzner. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Boston : Addison-Wesley, c2003
Availability: Items available for loan: Judith Thomas Library (1)Call number: QA 76.9 .A25 S67 2003.
5. Books
Cryptography and network security : principles and practice / William Stallings. by
Edition: 5th ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Boston : Prentice Hall, c2011
Availability: Items available for loan: Judith Thomas Library (1)Call number: TK 5105.59 .S713 2011.
6. Books
Network security : a hacker's perspective / Ankit Fadia. by
Edition: 2nd ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Boston, MA : Thompson Course Technology, c2006
Availability: Items available for loan: Judith Thomas Library (1)Call number: QA 76.9 .A25 F32 2006.
7. Books
Exploiting software : how to break code / Greg Hoglund, Gary McGraw. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Boston : Addison-Wesley, c2004
Online access:
Availability: Items available for loan: Judith Thomas Library (1)Call number: QA 76.9 .A25 H635 2004.
8. Books
Computer forensics : incident response essentials / Warren G. Kruse II, Jay G. Heiser. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Boston, MA : Addison-Wesley, 2002
Availability: Items available for loan: Judith Thomas Library (1)Call number: QA 76.9 .A25 K78 2002.
Pages