Refine your search

Your search returned 131 results.

61. Books
Information security analytics : finding security insights, patterns and anomalies in big data / Mark Ryan M.Talabis [and three others] ; D. Kaye, technical editor.

by Talabis, Mark [author] | McPherson, Robert [author] | Miyamoto, I [author] | Martin, Jason L [author] | Kaye, D [editor].

Edition: 1st edition.Material type: book Book; Format: print ; Literary form: Not fiction ; Audience: Specialized; Copyright date: Amsterdam : Elsevier, ©2015Accession number(s): 2016000003236.Availability: Items available for loan: Main Campus [Call number: QA76.9.A25 I536 2015] (1).

62.
Information security and ethics [electronic resource] : social and organizational issues / Marian Quigley [editor].

by Quigley, Marian [ed.].

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Hershey : IRM Press, ©2005Online access: Electronic resources Availability: No items available

63. Books
Information security architecture : an integrated approach to security in the organization / Jan Killmeyer Tudor

by Tudor, Jan Killmeyer.

Material type: book Book; Literary form: Not fiction ; Audience: Specialized; Publisher: Boca Raton, Fla. : Auerbach, 2001Accession number(s): 200308150040.Availability: Items available for loan: Main Campus [Call number: QA76.9 .A25 T826I] (1).

64. Books
Information security management handbook volume 2

by Tipton, Harold F., ed | Krause, Micki, ed.

Edition: 4th ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton, Fla. : Auerbach, 2001Accession number(s): 140920010011.Availability: Items available for loan: Main Campus [Call number: QA76.9 .A25 I536 2001] (1).

65. Books
Information security policies, procedures, and standardes : guidelines for effective information security management / Thomas R. Peltier

by Peltier, Thomas R.

Material type: book Book; Literary form: Not fiction ; Audience: Specialized; Publisher: Boca Raton, Fla. : Auerbach, c2002Accession number(s): 200308150073.Availability: Items available for loan: Main Campus [Call number: QA76.9 .A25 P447I] (1).

66. Books
Information security risk analysis / Thomas R. Peltier

by Peltier, Thomas R.

Material type: book Book; Literary form: Not fiction ; Audience: Specialized; Publisher: Boca Raton, Fla. : Auerbach, c2001Accession number(s): 200308150036.Availability: Items available for loan: Main Campus [Call number: QA76.9 .A25 P447I] (1).

67. Books
Information technology security & risk management / Jill Slay, Andy Koronios

by Slay, Jill | Koronios, Andy.

Material type: book Book; Literary form: Not fiction ; Audience: Specialized; Publisher: Australia : Wiley, 2006Other title: Information technology security and risk management.Accession number(s): 200712110019.Availability: Items available for loan: Main Campus [Call number: QA76.9 .A25 S529I] (1).

68. Books
Innocent code : a security wake-up call for Web programmers / Sverre H. Huseby

by Huseby, Sverre H.

Material type: book Book; Literary form: Not fiction ; Audience: Specialized; Publisher: Chichester : Wiley, c2004Accession number(s): 200603030016, 200603030017.Availability: Items available for loan: Main Campus [Call number: QA76.9 .A25 H873I] (2).

69.
Intelligent security systems : how artificial intelligence, machine learning and data science work for and against computer security / Leon Reznik.

by Reznik, Leonid, 1955- [author.].

Material type: book Book; Literary form: Not fiction ; Audience: Specialized; Publisher: Piscataway, N.J. : IEEE Press, ©2022Online access: Electronic Resources Availability: No items available

70. Books
Internet security : professional reference

by Atkins, Derek.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Indianapolis, Ind. : New Riders, 1997Accession number(s): 203157, 203158.Availability: Items available for loan: Main Campus [Call number: TK5105.875 .I57 I573 1997] (1).

71. Books
Internet security and firewalls / V.V. Preetham with NIIT

by Preetham, V.V | NIIT (Corporation).

Material type: book Book; Literary form: Not fiction ; Audience: Specialized; Publisher: Cincinnati, Ohio : Premier Press, c2002Accession number(s): 200407300074, 200410290183.Availability: Items available for loan: Main Campus [Call number: TK5105.59 P733I] (1).

72. Books
Introduction to modern cryptography / Jonathan Katz, Yehuda Lindell

by Katz, Jonathan | Lindell, Yehuda.

Material type: book Book; Literary form: Not fiction ; Audience: Specialized; Publisher: Boca Raton, Fla. : Chapman & Hall/CRC, c2008Accession number(s): 200807160012.Availability: Items available for loan: Main Campus [Call number: QA76.9 .A25 K379I] (1).

73. Books
Java 2 network security / Marco Pistoia ... [et al.]

by Pistoia, Marco.

Edition: 2nd ed.Material type: book Book; Literary form: Not fiction ; Audience: Specialized; Publisher: Upper Saddle River, N.J. : Prentice Hall PTR, 1999Accession number(s): 200205020010.Availability: Items available for loan: Main Campus [Call number: QA76.9 .A25 J382 1999] (1).

74. Books
Linux firewalls / Robert L. Ziegler, Carl B. Constantine

by Ziegler, Robert L | Constantine, Carl B.

Edition: 2nd ed.Material type: book Book; Literary form: Not fiction ; Audience: Specialized; Publisher: Indianapolis, Ind. : New Riders, c2002Accession number(s): 200305210034.Availability: Items available for loan: Main Campus [Call number: QA76.9 .A25 Z533L 2002] (1).

75.
Local area network management, design and security [electronic resource] : a practical approach / Arne Mikalsen and Per Borgesen

by Mikalsen, Arne | Borgesen, Per.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Chichester : Wiley, c2002Online access: Electronic Resources Availability: No items available

76. Books
Mac OS X security / Bruce Potter, Preston Norvell, Brian Wotring

by Potter, Bruce | Norvell, Preston | Wotring, Brian.

Material type: book Book; Literary form: Not fiction ; Audience: Specialized; Publisher: Indianapolis, Ind. : New Riders, 2003Accession number(s): 200408060031, 200408060032.Availability: Items available for loan: Main Campus [Call number: QA76.76 .O63 P677M] (1).

77. Books
Malware : fighting malicious code / Ed Skoudis with Lenny Zeltser.

by Skoudis, Ed | Zeltser, Lenny.

Material type: book Book; Format: print ; Literary form: Not fiction ; Audience: Specialized; Publisher: Upper Saddle River, N.J. : Prentice Hall PTR, c2004Accession number(s): 2015000002647.Availability: Items available for loan: Main Campus [Call number: QA76.9 .A25 S568M 2004] (1).

78. Books
Malware analyst's cookbook and DVD : tools and techniques for fighting malicious code / Michael Hale Ligh ... [et al.].

by Ligh, Michael Hale.

Material type: book Book; Literary form: Not fiction ; Audience: Specialized; Publisher: Indianapolis, Ind. : Wiley, c2011Accession number(s): 201312170005.Availability: Items available for loan: Main Campus [Call number: QA 76.9 .A25 M348] (1).

79. Books
Management of information security / Michael E. Whitman, Herbert J. Mattord

by Whitman, Michael E | Mattord, Herbert J.

Material type: book Book; Literary form: Not fiction ; Audience: Specialized; Publisher: Australia : Thomson/Course Technology, c2004Accession number(s): 200407230016.Availability: Items available for loan: Main Campus [Call number: TK5105.59 W447M] (1).

80. Books
Mission critical! Internet security

by Syngress (Firm).

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Rockland, Mass. : Syngress, 2001Accession number(s): 81120010044.Availability: Items available for loan: Main Campus [Call number: TK5105.875 .I57 M577] (1).


- Copyright © 2022 Library and Learning Space -

Powered by Koha