Refine your search

Your search returned 131 results.

1. Books
Advances in elliptic curve cryptography / edited by Ian F. Blake, Gadiel Seroussi, Nigel P. Smart

by Blake, Ian F [ed.] | Seroussi, Gadiel, 1955- [ed.] | Smart, Nigel P, 1967- [ed.].

Material type: book Book; Literary form: Not fiction ; Audience: Specialized; Publisher: Cambridge : Cambridge Univ. Press, 2005Accession number(s): 200505170030.Availability: Items available for loan: Main Campus [Call number: QA76.9 .A25 A382] (1).

2. Books
Android hacker's handbook / Joshua J. Drake...[et all.].

by Drake, Joshua J [author.].

Material type: book Book; Format: print ; Literary form: Not fiction ; Audience: Specialized; Publisher: Indianapolis, Ind. : John Wiley & Sons, ©2014Accession number(s): 2015000005996.Availability: Items available for loan: Main Campus [Call number: QA76.774 .A53 D724A 2014] (1).

3.
Applications of machine learning and deep learning for privacy and cybersecurity / Victor Lobo, Anacleto Correia.

by Lobo, Victor, 1965- [editor.] | Correia, Anacleto, 1961- [editor.].

Material type: book Book; Literary form: Not fiction ; Audience: Specialized; Publisher: Hershey, Pa. : Information Science Reference, an imprint of IGI Global, ©2022Online access: Electronic Resources Availability: No items available

4. Books
Applied cryptography : protocols, algorithms, and source code in C

by Schneier, Bruce.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York, N.Y. : Wiley, 1996Accession number(s): 187569.Availability: Items available for loan: Main Campus [Call number: QA76.9 .A25 S363A 1996] (1).

5.
Auditing and security [electronic resource] : AS/400, NT, UNIX, networks, and disaster recovery plans / Yusufali F. Musaji.

by Musaji, Yusufali F.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York, N.Y. : John Wiley, 2001Online access: Electronic Resources Availability: No items available

6. Books
Auditing and security : AS/400, NT, UNIX, networks, and disaster recovery plans / Yusufali F. Musaji

by Musaji, Yusufali F.

Material type: book Book; Literary form: Not fiction ; Audience: Specialized; Publisher: New York, N.Y. : Wiley, c2001Accession number(s): 200206130077, 200206130079.Availability: Items available for loan: Main Campus [Call number: QA76.9 .A93 M872A] (1).

7. Books
Beginning cryptography with Java / David Hook

by Hook, David, 1962-.

Material type: book Book; Literary form: Not fiction ; Audience: Specialized; Publisher: Indianapolis, Ind. : Wiley, c2005Accession number(s): 200803120006, 200803120007.Availability: Items available for loan: Main Campus [Call number: QA76.9 .A25 H664B] (1).

8.
Blockchain security from the bottom up : securing and preventing attacks on cryptocurrencies, decentralized applications, nfts, and smart contracts / Howard E. Poston, III.

by Poston, Howard E. III [author.].

Material type: book Book; Literary form: Not fiction ; Audience: Specialized; Copyright date: Hoboken, New Jersey : John Wiley & Sons, Inc., ©2022Online access: Electronic Resources Availability: No items available

9. Books
Building Internet firewalls

by Chapman, D. Brent | Zwicky, Elizabeth D.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Sebastopol, Calif. : O'Reilly, 1955Accession number(s): 174236.Availability: Items available for loan: Main Campus [Call number: TK5105.875 .I57 C426B] (1).

10. Books
Check point FireWall-1 : administration guide

by Goncalves, Marcus | Brown, Stven A.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York, N.Y. : McGraw-Hill, 2000Accession number(s): 91120000069, 91120000070.Availability: Items available for loan: Main Campus [Call number: TK5105.59 G662C] (1).

11. Books
Check point VPN-1/FireWall-1 NG : administration / Inti Shah, Andrew Ratcliffe

by Shah, Inti | Ratcliffe, Andrew.

Material type: book Book; Literary form: Not fiction ; Audience: Specialized; Publisher: New York, N.Y. : McGraw-Hill/Osborne, c2003Accession number(s): 200405140058, 200405140059.Availability: No items available

12. Books
CISSP certification : exam guide / Shon Harris

by Harris, Shon.

Edition: 2nd ed.Material type: book Book; Literary form: Not fiction ; Audience: Specialized; Publisher: New York, [N.Y.] : McGraw-Hill/Osborne, c2003Accession number(s): 200311080040.Availability: Items available for loan: Main Campus [Call number: TK5105.59 H377C 2003] (1).

13. Books
Complete guide to security and privacy metrics : measuring regulatory compliance, operational resilience, and ROI / Debra S. Herrmann.

by Herrmann, Debra S.

Material type: book Book; Literary form: Not fiction ; Audience: Specialized; Publisher: Boca Raton, Fla. : Auerbach Publications, c2007Accession number(s): 201209070033.Availability: Items available for loan: Main Campus [Call number: TK 5102.85 H477C] (1).

14. Books
Computer crime : a crimefighter's handbook

by Icove, David | Seger, Karl | VonStorch, William.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Sebastopol, Calif. : O'Reilly, 1995Accession number(s): 198980.Availability: Items available for loan: Main Campus [Call number: HV6773 I268C] (1).

15. Books
Computer security / Dieter Gollmann

by Gollmann, Dieter.

Material type: book Book; Literary form: Not fiction ; Audience: Specialized; Publisher: Chichester : Wiley, 2000Accession number(s): 200209130021, 200209130022.Availability: Items available for loan: Main Campus [Call number: QA76.9 .A25 G644C] (1).

16. Books
Computer security basics / Rick Lehtinen, Deborah Russell, and G.T. Gangemi Sr.

by Lehtinen, Rick | Russell, Deborah | Gangemi, G.T.

Edition: 2nd ed.Material type: book Book; Literary form: Not fiction ; Audience: Specialized; Publisher: Beijing : O'Reilly, 2006Accession number(s): 200807260030.Availability: Items available for loan: Main Campus [Call number: QA76.9 .A25 L437C 2006] (1).

17.
Configuring Windows 2000 without active directory [electronic resource] / Carol Bailey ; Thomas W. Shinder technical editor

by Bailey, Carol | Shinder, Thomas W [ed.].

Material type: book Book; Literary form: Not fiction ; Audience: Specialized; Publisher: Rockland, Mass. : Syngress, c2001Online access: Electronic Resources Availability: No items available

18. Books
Contemporary cryptoloty : the science of information integrity

by Simmons, Gustavus J., ed.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York, N.Y. : IEEE Press, 1992Accession number(s): 140920010045.Availability: Items available for loan: Main Campus [Call number: QA76.9 .A25 C667] (1).

19. Books
Corporate computer and network security / Raymond R. Panko

by Panko, Raymond R.

Edition: International ed.Material type: book Book; Literary form: Not fiction ; Audience: Specialized; Publisher: Upper Saddle River, N.J. : Pearson/Prentice Hall, c2004Accession number(s): 200407300065, 201009210039.Availability: Items available for loan: Main Campus [Call number: QA 76.9 .A25 P364C 2004] (1).

20. Books
Cryptography and network security : principles and practice / William Stallings.

by Stallings, William.

Edition: 5th ed. , international ed.Material type: book Book; Format: print ; Literary form: Not fiction ; Audience: Specialized; Publisher: Boston, Mass : Prentice Hall, c2011Accession number(s): 201306030065.Availability: Items available for loan: Main Campus [Call number: TK5105.59 S724C 2011] (1).


- Copyright © 2022 Library and Learning Space -

Powered by Koha