Your search returned 28 results.

Not what you expected? Check for suggestions
Sort
Results
1. Books
Secrets and lies : digital security in a networked world / Bruce Schneier. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New York : John Wiley, 2000
Availability: Items available for loan: Judith Thomas Library (2)Call number: QA 76.9 .A25 S352 2000, ...
2. Books
IT auditing : using controls to protect information assets / Chris Davis, Mike Schiller ; with Kevin Wheeler. by
Edition: 2nd ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New York : McGraw-Hill, c2011
Availability: Items available for loan: Judith Thomas Library (3)Call number: QA 76.9 .A93 D38 2011, ...
3. Books
Introduction to cryptography and network security / Behrouz A. Forouzan. by Series: McGraw-Hill Forouzan networking series
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Boston : McGraw-Hill Higher Education, c2008
Availability: Items available for loan: Judith Thomas Library (1)Call number: TK 5105.59 .F672 2008.
4. Books
Wireless operational security / John W. Rittinghouse, James F. Ransome. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Amsterdam ; Boston : Elsevier Digital Press, c2004
Online resources:
Availability: Items available for loan: Judith Thomas Library (1)Call number: TK 5105.59 .R58 2004.
5. Books
Network security : private communication in a public world / Charlie Kaufman, Radia Perlman, Mike Speciner. by Series: Prentice Hall series in computer networking and distributed systems
Edition: 2nd ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Upper Saddle River, NJ : Prentice Hall PTR, c2002
Availability: Items available for loan: Judith Thomas Library (1)Call number: QA 76.9 .A25 K39 2002.
6. Books
Cryptography and network security : principles and practice / William Stallings. by
Edition: 3rd ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Upper Saddle River, N.J. : Prentice Hall, c2003
Availability: Items available for loan: Judith Thomas Library (1)Call number: TK 5105.59 .S713 2003.
7. Books
SSL and TLS : designing and building secure systems / Eric Rescorla. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Boston : Addison-Wesley, c2001
Other title:
  • Secure sockets layer and Transport layer security
Availability: Items available for loan: Judith Thomas Library (1)Call number: TK 5105.59 .R47 2001.
8. Books
SSH, the secure shell : the definitive guide / Daniel J. Barrett and Richard E. Silverman. by
Edition: 1st ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Cambridge [Mass.] : O'Reilly, 2001
Availability: Items available for loan: Judith Thomas Library (1)Call number: QA 76.76 .O63 B369 2001.
9. Books
Network defense and countermeasures : principles and practices / Chuck Easttom. by Series: Security series (Upper Saddle River, N.J.)
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Upper Saddle River, N.J. : Pearson Prentice Hall, 2006
Online resources:
Availability: Items available for loan: Judith Thomas Library (1)Call number: TK 5105.59 .E26 2005.
10. Books
Anti-hacker tool kit / Keith J. Jones, Mike Shema, Bradley C. Johnson. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New York : McGraw-Hill/Osborne, c2002
Availability: Items available for loan: Judith Thomas Library (1)Call number: TK 5105.59 .J65 2002.
11. Books
Cryptography and network security : principles and practice / William Stallings. by
Edition: 5th ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Boston : Prentice Hall, c2011
Availability: Items available for loan: Judith Thomas Library (1)Call number: TK 5105.59 .S713 2011.
12. Books
Firewalls and VPNs : principles and practices / Richard W. Tibbs, Edward B. Oakes. by Series: Security series (Upper Saddle River, N.J.)
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Upper Saddle River, N.J : Pearson/Prentice Hall, c2006
Online resources:
Availability: Items available for loan: Judith Thomas Library (1)Call number: QA 76.9 .A25 T525 2006.
13. Books
Security policies and procedures : principles and practices / Sari Stern Greene. by Series: Security series (Upper Saddle River, N.J.)
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Upper Saddle River, N.J. : Pearson Prentice Hall, c2006
Online resources:
Availability: Items available for loan: Judith Thomas Library (1)Call number: HV 8290 .G745 2006.
14. Books
Computer forensics : incident response essentials / Warren G. Kruse II, Jay G. Heiser. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Boston, MA : Addison-Wesley, 2002
Availability: Items available for loan: Judith Thomas Library (1)Call number: QA 76.9 .A25 K78 2002.
15. Books
Intrusion prevention and active response deploying network and host IPS / Michael Rash ... [et al.] ; by
Material type: Text Text; Format: electronic available online remote; Literary form: Not fiction
Publication details: Rockland, Mass. : Syngress Publishing, c2005
Online resources:
Availability: Items available for loan: Judith Thomas Library (1)Call number: QA 76.9 .A25 I368 2005.
16. Books
Hacking : the art of exploitation / Jon Erickson. by
Edition: 2nd ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: San Francisco, CA : No Starch Press, c2008
Online resources:
Availability: Items available for loan: Judith Thomas Library (1)Call number: QA 76.9 .A25 E75 2008.
17. Books
Maximum security : a hacker's guide to protecting your Internet site and network / Anonymous.
Edition: 2nd ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Indianapolis, Ind. : Sams, c1998
Availability: Items available for loan: Judith Thomas Library (1)Call number: QA 76.9 .A25 M39 1998.
18. Books
Security sage's guide to hardening the network infrastructure / Steven Andrés; Brian Kenyon by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Rockland, MA : Syngress, ©2004
Other title:
  • Guide to hardening the network infrastructure /
  • Hardening the network infrastructure /
Availability: Items available for loan: Judith Thomas Library (1)Call number: TK 5105.59 .A547 2004.
19. Books
Snort 2.0 intrusion detection / Jay Beale; James C Foster by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Rockland : Oxford : Syngress, Elsevier Science, ©2003
Availability: Items available for loan: Judith Thomas Library (1)Call number: TK 5105.59 .B43 2003.
20. Books
Network security with OpenSSL / John Viega, Matt Messier and Pravir Chandra. by
Edition: 1st ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Sebastopol, CA : O'Reilly, c2002
Other title:
  • Network security with Open secure socket layer
Online resources:
Availability: Items available for loan: Judith Thomas Library (1)Call number: TK 5105.59 .V54 2002.
Pages