Refine your search

Your search returned 125 results.

1. Books
Advances in elliptic curve cryptography / edited by Ian F. Blake, Gadiel Seroussi, Nigel P. Smart

by Blake, Ian F [ed.] | Seroussi, Gadiel, 1955- [ed.] | Smart, Nigel P, 1967- [ed.].

Material type: book Book; Literary form: Not fiction ; Audience: Specialized; Publisher: Cambridge : Cambridge Univ. Press, 2005Accession number(s): 200505170030.Availability: Items available for loan: Main Campus [Call number: QA76.9 .A25 A382] (1).

2. Books
Android hacker's handbook / Joshua J. Drake...[et all.].

by Drake, Joshua J [author.].

Material type: book Book; Format: print ; Literary form: Not fiction ; Audience: Specialized; Publisher: Indianapolis, Ind. : John Wiley & Sons, ©2014Accession number(s): 2015000005996.Availability: Items available for loan: Main Campus [Call number: QA76.774 .A53 D724A 2014] (1).

3. Books
Applied cryptography : protocols, algorithms, and source code in C

by Schneier, Bruce.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York, N.Y. : Wiley, 1996Accession number(s): 187569.Availability: Items available for loan: Main Campus [Call number: QA76.9 .A25 S363A 1996] (1).

4.
Auditing and security [electronic resource] : AS/400, NT, UNIX, networks, and disaster recovery plans / Yusufali F. Musaji.

by Musaji, Yusufali F.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York, N.Y. : John Wiley, 2001Online access: Electronic Resources Availability: No items available

5. Books
Auditing and security : AS/400, NT, UNIX, networks, and disaster recovery plans / Yusufali F. Musaji

by Musaji, Yusufali F.

Material type: book Book; Literary form: Not fiction ; Audience: Specialized; Publisher: New York, N.Y. : Wiley, c2001Accession number(s): 200206130077, 200206130079.Availability: Items available for loan: Main Campus [Call number: QA76.9 .A93 M872A] (1).

6. Books
Beginning cryptography with Java / David Hook

by Hook, David, 1962-.

Material type: book Book; Literary form: Not fiction ; Audience: Specialized; Publisher: Indianapolis, Ind. : Wiley, c2005Accession number(s): 200803120006, 200803120007.Availability: Items available for loan: Main Campus [Call number: QA76.9 .A25 H664B] (1).

7. Books
Building Internet firewalls

by Chapman, D. Brent | Zwicky, Elizabeth D.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Sebastopol, Calif. : O'Reilly, 1955Accession number(s): 174236.Availability: Items available for loan: Main Campus [Call number: TK5105.875 .I57 C426B] (1).

8. Books
Check point FireWall-1 : administration guide

by Goncalves, Marcus | Brown, Stven A.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York, N.Y. : McGraw-Hill, 2000Accession number(s): 91120000069, 91120000070.Availability: Items available for loan: Main Campus [Call number: TK5105.59 G662C] (1).

9. Books
Check point VPN-1/FireWall-1 NG : administration / Inti Shah, Andrew Ratcliffe

by Shah, Inti | Ratcliffe, Andrew.

Material type: book Book; Literary form: Not fiction ; Audience: Specialized; Publisher: New York, N.Y. : McGraw-Hill/Osborne, c2003Accession number(s): 200405140058, 200405140059.Availability: No items available

10. Books
CISSP certification : exam guide / Shon Harris

by Harris, Shon.

Edition: 2nd ed.Material type: book Book; Literary form: Not fiction ; Audience: Specialized; Publisher: New York, [N.Y.] : McGraw-Hill/Osborne, c2003Accession number(s): 200311080040.Availability: Items available for loan: Main Campus [Call number: TK5105.59 H377C 2003] (1).

11. Books
Complete guide to security and privacy metrics : measuring regulatory compliance, operational resilience, and ROI / Debra S. Herrmann.

by Herrmann, Debra S.

Material type: book Book; Literary form: Not fiction ; Audience: Specialized; Publisher: Boca Raton, Fla. : Auerbach Publications, c2007Accession number(s): 201209070033.Availability: Items available for loan: Main Campus [Call number: TK 5102.85 H477C] (1).

12. Books
Computer crime : a crimefighter's handbook

by Icove, David | Seger, Karl | VonStorch, William.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Sebastopol, Calif. : O'Reilly, 1995Accession number(s): 198980.Availability: Items available for loan: Main Campus [Call number: HV6773 I268C] (1).

13. Books
Computer security / Dieter Gollmann

by Gollmann, Dieter.

Material type: book Book; Literary form: Not fiction ; Audience: Specialized; Publisher: Chichester : Wiley, 2000Accession number(s): 200209130021, 200209130022.Availability: Items available for loan: Main Campus [Call number: QA76.9 .A25 G644C] (1).

14. Books
Computer security basics / Rick Lehtinen, Deborah Russell, and G.T. Gangemi Sr.

by Lehtinen, Rick | Russell, Deborah | Gangemi, G.T.

Edition: 2nd ed.Material type: book Book; Literary form: Not fiction ; Audience: Specialized; Publisher: Beijing : O'Reilly, 2006Accession number(s): 200807260030.Availability: Items available for loan: Main Campus [Call number: QA76.9 .A25 L437C 2006] (1).

15.
Configuring Windows 2000 without active directory [electronic resource] / Carol Bailey ; Thomas W. Shinder technical editor

by Bailey, Carol | Shinder, Thomas W [ed.].

Material type: book Book; Literary form: Not fiction ; Audience: Specialized; Publisher: Rockland, Mass. : Syngress, c2001Online access: Electronic Resources Availability: No items available

16. Books
Contemporary cryptoloty : the science of information integrity

by Simmons, Gustavus J., ed.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York, N.Y. : IEEE Press, 1992Accession number(s): 140920010045.Availability: Items available for loan: Main Campus [Call number: QA76.9 .A25 C667] (1).

17. Books
Corporate computer and network security / Raymond R. Panko

by Panko, Raymond R.

Edition: International ed.Material type: book Book; Literary form: Not fiction ; Audience: Specialized; Publisher: Upper Saddle River, N.J. : Pearson/Prentice Hall, c2004Accession number(s): 200407300065, 201009210039.Availability: Items available for loan: Main Campus [Call number: QA 76.9 .A25 P364C 2004] (1).

18. Books
Cryptography and network security : principles and practice / William Stallings.

by Stallings, William.

Edition: 5th ed. , international ed.Material type: book Book; Format: print ; Literary form: Not fiction ; Audience: Specialized; Publisher: Boston, Mass : Prentice Hall, c2011Accession number(s): 201306030065.Availability: Items available for loan: Main Campus [Call number: TK5105.59 S724C 2011] (1).

19. Books
Cryptography and network security : principles and practice / William Stallings

by Stallings, William.

Edition: 2nd ed.Material type: book Book; Literary form: Not fiction ; Audience: Specialized; Publisher: Upper Saddle River, N.J. : Prentice Hall, c1999Accession number(s): 200207020052.Availability: Items available for loan: Main Campus [Call number: TK5105.59 S724C 1999] (1).

20. Books
Cryptography and network security / Behrouz A. Forouzan

by Forouzan, Behrouz A.

Edition: McGraw-Hill international ed.Material type: book Book; Literary form: Not fiction ; Audience: Specialized; Publisher: Boston, Mass. : McGraw Hill, 2008Accession number(s): 200810240027.Availability: Items available for loan: Main Campus [Call number: TK5105.59 F676C 2008] (1).


- Copyright © 2022 Library and Learning Space -

Powered by Koha