|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Securing Web services with WS-Security : demystifying WS-Security, WS-Policy, SAML, XML Signature, and XML Encryption / Jothy Rosenberg, David L. Remy. by Rosenberg, Jonathan B | Remy, David L. Publisher: Indianapolis, IN : SAMS, c2004Availability: Items available for loan: Military College of Signals (MCS)Call number: 005.8,ROS (1).
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
The art of memory forensics : detecting malware and threats in Windows, Linux, and Mac memory / Michael Hale Ligh, Andrew Case, Jamie Levy, Aaron Walters. by Ligh, Michael Hale | Case, Andrew (Digital forensics researcher) | Levy, Jamie | Walters, Aaron. Material type: Text; Format:
print
; Literary form:
Not fiction
Publisher: Indianapolis, IN : Wiley, [2014]Copyright date: ©2014Other title: Detecting malware and threats in Windows, Linux, and Mac memory.Online access: Contributor biographical information | Table of contents only Availability: Items available for loan: Central Library (CL)Call number: 004.5028558 LIG (2).
|
|
|
|
Defense and detection strategies against internet worms by Nazario, Jose. Material type: Text; Format:
print
; Literary form:
Not fiction
Publisher: BOSTON ARTECH HOUSE 2004Availability: Items available for loan: College of Electrical & Mechanical Engineering (CEME)Call number: 005.84 NAZ (1).
|
|
|
|
|
|
|
|
Introduction to communication electronic warfare systems by Poisel, Richard.A. Material type: Text; Format:
print
; Literary form:
Not fiction
Publisher: LONDON ARTECH HOUSE 2002Availability: Items available for loan: College of Electrical & Mechanical Engineering (CEME)Call number: 623.73 POS (1).
|
|
|
|
Hacking exposed computer forensics secrets and solutions by Davis, Chris , Cowen, David , Philipp, Aaron. Material type: Text; Format:
print
; Literary form:
Not fiction
Publisher: NEW DELHI TATA MCGRAW HILL 2005Availability: Items available for loan: College of Electrical & Mechanical Engineering (CEME)Call number: 005.8 DAV (1).
|
|
|
|
Defending the digital frontier by Babiak, Jan, Butters, J, Doll, M.W. Edition: 2ND EDMaterial type: Text; Format:
print
; Literary form:
Not fiction
Publisher: USA WILEY 2005Availability: Items available for loan: College of Electrical & Mechanical Engineering (CEME)Call number: 005.8 BAB (1).
|
|
|
|
Internet firewells and network security by Hare, Chris , Sujan, Karanji. Material type: Text; Format:
print
; Literary form:
Not fiction
Publisher: INDIA NRP 1995Availability: Items available for loan: College of Electrical & Mechanical Engineering (CEME)Call number: 005.8 HAR'I (1).
|
|
|
|
Disappearing cryptography being and nothingness on the net by Wayner, Peter. Material type: Text; Format:
print
; Literary form:
Not fiction
Publisher: BOSTON AP PROFESSIONAL 1996Availability: Items available for loan: College of Electrical & Mechanical Engineering (CEME)Call number: 005.82 WAY (1).
|
|
|
|
Authentication systems for secure networks by Oppliger, Rolf. Material type: Text; Format:
print
; Literary form:
Not fiction
Publisher: LONDON ARTECH HOUSE 1996Availability: Items available for loan: College of Electrical & Mechanical Engineering (CEME)Call number: 005.8 OPP (1).
|
|
|
|
Practical cryptography for data internetworks by Stallings, William. Material type: Text; Format:
print
; Literary form:
Not fiction
Publisher: USA IEEE COMPUTER SOCIETY 1996Availability: Items available for loan: College of Electrical & Mechanical Engineering (CEME)Call number: 005.8 STA (1).
|
|
|
|
Complete book of pc and lan security by Cobb, Stephen. Material type: Text; Format:
print
; Literary form:
Not fiction
Publisher: NEWYORK WINDCREST MCGRAW HILL 1992Availability: Items available for loan: College of Electrical & Mechanical Engineering (CEME)Call number: 005.8 COB (1).
|
|
|
|
Complete lan security control by Davis, Peter.T. Material type: Text; Format:
print
; Literary form:
Not fiction
Publisher: NEWYORK MCGRAW HILL 1994Availability: Items available for loan: College of Electrical & Mechanical Engineering (CEME)Call number: 005.8 DAV (1).
|
|
|
|
Hacking : the art of exploitation / Jon Erickson. by Erickson, Jon, 1977-. Edition: 2nd ed.Material type: Text; Format:
print
; Literary form:
Not fiction
Publisher: San Francisco, CA : No Starch Press, c2008Online access: Table of contents Availability: Items available for loan: Military College of Signals (MCS)Call number: 005.8,ERI (1).
|
|
|
|
|
|
|
|
Network security assessment : know your network / Chris McNab. by McNab, Chris (Chris R.), 1980- [author.]. Edition: Third editionMaterial type: Text; Format:
print
; Literary form:
Not fiction
Publisher: Sebastopol, CA : O'Reilly Media, Inc., 2016Copyright date: ©2017Availability: Items available for loan: Military College of Signals (MCS)Call number: 005.8,MCN (1).
|
|
|
|
|