Your search returned 77 results.

Sort
Results
Intrusion detection

Material type: Text Text Publication details: Amsterdam IOS Press 2002Availability: Items available for loan: 1 Call number: 005.8 W83I.

Secure internet practices

by Mcbride, Patrick.

Material type: Text Text Publication details: Boca Raton Auerbach Publishers 2002Availability: Items available for loan: 1 Call number: 005.8 M50S.

Software security building security in

by McGraw, Gary.

Material type: Text Text Publication details: Upper Saddle River Addison-Wesley 2006Availability: Items available for loan: 1 Call number: 005.8 M50S.

Managing information security risks the OCTAVE approach

by Alberts, Christopher | Dorofee, Audrey jt.au.

Material type: Text Text Publication details: Boston Addison-Wesley 2003Availability: Items available for loan: 1 Call number: 658.478 A29M.

Know your enemy

Material type: Text Text Publication details: Boston Addison-Wesley 2004Availability: Items available for loan: 1 Call number: 005.8 K86.

Security +TM certification Exam guide

by White, Greg.

Material type: Text Text Publication details: New York McGraw-Hill 2003Availability: Items available for loan: 1 Call number: 005.8 W40S.

Computer security

by Carroll, John M.

Material type: Text Text Publication details: Amsterdam Butterworth-Henemann 1996Availability: Items available for loan: 1 Call number: 658.478 C22C.

How to break software security effective techniques for security testing

by Whittaker, James A | Thompson, Herbert H. jt.au.

Material type: Text Text Publication details: Boston Pearson Education 2003Availability: Items available for loan: 1 Call number: 005.8 W43H.

Intrusion detection and prevention

by Endorf, Carl | Schultz, Eugene jt.au.

Material type: Text Text Publication details: New York McGraw-Hill 2004Availability: Items available for loan: 1 Call number: 005.8 E72I.

Internet security guidebook

by Ellis, Juanita.

Material type: Text Text Publication details: San Diego Academic Press 2001Availability: Items available for loan: 1 Call number: 005.8 E57I.

Security,ID systems and locks the book on electronic access control

by Konick, Joel | Little, Karen jt.au.

Material type: Text Text Publication details: Amsterdam Butterworth-Heinemann 1997Availability: Items available for loan: 1 Call number: 005.8 K93S.

Firewalls and internet security

by Cheswick, William R | Bellovin, Steven M. jt.au.

Material type: Text Text Publication details: New Delhi Pearson Education 2006Availability: Items available for loan: 2 Call number: 005.8 C33F, ...

Incident response and computer forensics

by Prosise, Chris | Mandia, Kevin jt.au.

Material type: Text Text Publication details: New York McGraw-Hill 2003Availability: Items available for loan: 1 Call number: 005.8 P87I.

Information assurance managing organizational IT security risks

by Boyce, Joseph G | Jennings, Dan W. jt.au.

Material type: Text Text Publication details: Amsterdam Butterworth Heinemann 2002Availability: Items available for loan: 1 Call number: 005.8 B74I.

Investigative data mining for security and criminal detection

by Mena, Jesus.

Material type: Text Text Publication details: Amsterdam Butterworth Heinemann 2003Availability: Items available for loan: 1 Call number: 005.8 M54I.

Fundamentals of network security

by Canavan, John E.

Material type: Text Text Publication details: Boston Artech House 2001Availability: Items available for loan: 1 Call number: 005.8 C16F.

Cryptography,information theory, and error-correction a handbook for the 21st century

by Bruen, Aiden A | Forcinito, Mario A. jt.au.

Material type: Text Text Publication details: Hoboken John Wiley and Sons 2005Availability: Items available for loan: 1 Call number: 005.8 B92C.

Security for mobility

by Mitchell, Chris J. Ed.

Material type: Text Text Publication details: London The Institution of Electrical Engineers 2004Availability: Items available for loan: 1 Call number: 005.8 M67S.

Security in distributed, grid, mobile, and pervasive computing

by Xiao, Yang Ed.

Material type: Text Text Publication details: Boca Raton Auerbach Publications 2007Availability: Items available for loan: 2 Call number: 005.8 X7S, ...

Security in Computing

by Pfleeger, C. P. Pfleeger, S.L.

Material type: Text Text Publication details: Prentice Hall Delhi 2009Availability: Items available for loan: 2 Call number: 005.8 P47S, ...

Pages

Powered by Koha