Welcome
user_choices_background_image
Welcome
login container bottom
Search Library Catalog
Duplicate Items
Add to My List

Print
Sorts and Limits

Results 1 - 20 of 42
2 3 Next >>
1. Title: Intrusion detection in distributed systems : an abstraction-based approach / by Peng Ning, Sushil Jajodia, X. Sean Wang.
Advances in information security ;
Author: Ning, Peng.
Publication: Kluwer Academic Publishers, Boston : 2004.
2. Title: Advances in cryptology--EUROCRYPT '91 : Workshop on the Theory and Application of Cryptographic Techniques, Brighton, UK, April 8-11, 1991 : proceedings / D.W. Davies (ed.).
Lecture notes in computer science ;
Author: EUROCRYPT '91 (1991 : Brighton, England)
Publication: Springer-Verlag, Berlin ; New York : c1991.
3. Title: How secure is your wireless network? : safeguarding your Wi-Fi-LAN / Lee Barken.
Author: Barken, Lee.
Publication: Prentice Hall PTR, Upper Saddle River, NJ : c2004.
4. Title: Managers guide to computer security / Donn B. Parker.
Computer security management.
Author: Parker, Donn B.
Publication: Reston Pub. Co., Reston, Va. : c1981.
5. Title: Secrecy, authentication, and public key systems / by Ralph C. Merkle.
Computer science. Systems programming ;
Author: Merkle, Ralph C. (Ralph Charles)
Publication: UMI Research Press, Ann Arbor, Mich. : c1982.
6. Title: Cryptography and security services : mechanisms and applications / Manuel Mogollon.
Author: Mogollon, Manuel.
Publication: Cybertech Pub., Hershey, : 2007.
7. Title: Formal modeling of role hierarchy and delegation constraints in role based access control policies / by Nafi’ Yousef Eid Alsawae’r ; supervised by Khair Eddin Sabri.
نمذجة رسمية لقيود التسلسل الهرمي والتفويض في سياسات التحكم المعتمده على الدور في الوصول
Author: al-Sawae’r, Nafi’ Yousef Eid.
Publication: 2017.
8. Title: Metasploit : the penetration tester's guide / by David Kennedy [and others].
Metasploit (Electronic resource)
Metasploit (Electronic resource)
Metasploit (Electronic resource)
Publication: No Starch Press, San Francisco : �2011.
9. Title: Introduction to data security and controls/ Edward R. Buck..
Author: Buck, Edward R.
Publication: QED Information Sciences, Wellesly:
10. Title: Information integrity : a structure for its definition and management / Hal B. Becker.
Author: Becker, Hal B.
Publication: McGraw-Hill, New York : c1983.
11. Title: Cryptography, a primer / Alan G. Konheim.
Author: Konheim, Alan G., 1934-
Publication: Wiley, New York : c1981.
12. Title: Firewalls 24 seven / Matthew Strebe, Charles Perkins.
Firewalls twenty four seven
24 seven
Twenty four seven
Author: Strebe, Matthew.
Publication: Sybex, San Francisco, CA : c2000.
13. Title: Cryptography and data security / Dorothy Elizabeth Robling Denning.
Author: Denning, Dorothy Elizabeth Robling, 1945
Publication: Addison-Wesley, Reading, Mass. : c1982.
14. Title: Linux firewalls.
Linux.
Linux firewalls.
Author: Suehring, Steve.
Publication: Novell Press, Indianapolis, Ind. : 2006.
Edition: 3rd ed. / Steve Suehring, Robert Ziegler.
15. Title: Professional rootkits / Ric Vieler.
Rootkits
Wrox professional guides
Microsoft Windows (Computer file)
Author: Vieler, Ric, 1960-
Publication: Wiley/Wrox, Indianapolis, IN : c2007.
16. Title: Firewalls 24 seven / Matthew Strebe, Charles Perkins.
Firewalls twenty four seven
24 seven
Twenty four seven
Author: Strebe, Matthew.
Publication: Sybex, San Francisco, CA : c2000.
17. Title: Rootkits, spyware/adware, keyloggers and backdoors : detection and neutralization / Oleg Zaytsev.
Author: Zaytsev, Oleg.
Publication: A-List, Wayne, Pa. : c2007.
Edition: 1st ed.
18. Title: Network security : private communication in a public world / Charlie Kaufman, Radia Perlman, Mike Speciner.
Prentice Hall series in computer networking and distributed systems
Author: Kaufman, Charlie.
Publication: Prentice Hall PTR, Upper Saddle River, NJ : c2002.
Edition: 2nd ed.
19. Title: Cryptology unlocked / Reinhard Wobst ; translated by Angelika Shafir.
Author: Wobst, Reinhard.
Publication: John Wiley & Sons, Chichester ; Hoboken, NJ : c2007.
20. Title: Practical intrusion analysis : prevention and detection for the twenty-first century / Ryan Trost.
Author: Trost, Ryan.
Publication: Addison-Wesley, Upper Saddle River, NJ : c2010.
 
 
Results 1 - 20 of 42
2 3 Next >>
Duplicate Items
Add to My List

Print
Sorts and Limits