Refine your search

Your search returned 425 results.

Not what you expected? Check for suggestions
CISSP - Certified Information Systems Security Professional (E-BOOK) study guide / James Michael Stewart, Ed Tittel, Mike Chapple

by Stewart, James Michael | Chapple, Mike | Tittel, Ed.

Edition: 3. ed. Publisher: San Francisco, Calif. ; London : SYBEX, cop. 2005Availability: Items available for loan: Military College of Signals (MCS) (1).
Introduction to computer security (E-BOOK) Matt Bishop.

by Bishop, Matt.

Publisher: Boston : Addison-Wesley, c2005Online access: Table of contents Availability: Items available for loan: Military College of Signals (MCS) (1).
Introduction to modern cryptography (E-BOOK) Jonathan Katz, Yehuda Lindell.

by Katz, Jonathan | Lindell, Yehuda.

Publisher: Boca Raton : Chapman & Hall/CRC, c2008Online access: Publisher description | Table of contents only Availability: Items available for loan: Military College of Signals (MCS) (1).
Securing the cloud : cloud computer security techniques and tactics / Vic J.R. Winkler.

by Winkler, J. R.

Publisher: Waltham, MA : Syngress/Elsevier, 2011Availability: Items available for loan: Military College of Signals (MCS)Call number: 005.8,WIN (1).
Mechanics of user identification and authentication fundamentals of identity management Dobromir Todorov.

by Todorov, Dobromir.

Publisher: Boca Raton : Auerbach Publications, c2007Online access: Publisher description Availability: Items available for loan: Military College of Signals (MCS)Call number: 005.8,TOD (1).
Security strategies in Linux platforms and applications / Michael Jang.

by Jang, Michael H.

Publisher: Sudbury, MA : Jones & Bartlett Learning, c2011Availability: Items available for loan: Military College of Signals (MCS)Call number: 005.8,JAN (1).
Ethical hacking and penetration testing guide / Rafay Baloch.

by Baloch, Rafay.

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: Boca Raton : CRC Press, Taylor & Francis Group, [2015]Copyright date: ©2015Online access: Cover image Availability: Items available for loan: Central Library (CL)Call number: 005.8 BAL (1).
Security in computing / Charles P. Pfleeger, Shari Lawrence Pfleeger, Jonathan Margulies.

by Pfleeger, Charles P, 1948- | Pfleeger, Shari Lawrence | Margulies, Jonathan.

Edition: Fifth edition.Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: Upper Saddle River, NJ : Prentice Hall, [2015]Availability: Items available for loan: Central Library (CL)Call number: 005.8 PFL (1).
The state of the art in intrusion prevention and detection / edited by Al-Sakib Khan Pathan.

by Pathan, Al-Sakib Khan.

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: Boca Raton, [Florida] : CRC Press/Taylor & Francis Group, [2014]Availability: No items available : Checked out (1).
Network anomaly detection : a machine learning perspective / Dhruba Kumar Bhattacharyya, Jugal Kumar Kalita.

by Bhattacharyya, Dhruba K.

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: Boca Raton : CRC Press, Taylor & Francis Group, [2014]Availability: Items available for loan: Central Library (CL)Call number: 005.8 BHA (1).
Encyclopedia of policy studies / Rainer Nagel.

by Nagel, Rainer | Nagel, Stuart.

Edition: 2nd ed. Publisher: [S.l.] : CRC Press, 1994Online access: Amazon.com | Amazon customer reviews Availability: Items available for reference: Central Library (CL) Not for loanCall number: 320.603 NAG (1). :
Applied cryptography: protocols, algorithms and source code in C Bruce Schneier

by Bruce Schneier.

Edition: 2nd ed. Publisher: New York : Wiley, c1996Availability: Items available for loan: Central Library (CL)Call number: 005.82 SCH (1).
Windows registry forensics : advanced digital forensic analysis of the Windows Registry / Harlan Carvey.

by Carvey, Harlan A [author.].

Edition: Second editionMaterial type: Text Text; Format: print ; Literary form: Not fiction Publisher: Amersterdam : Syngress is an imprint of Elsevier, [2016]Availability: Items available for loan: Central Library (CL)Call number: 005.8 CAR (2).
Windows forensic analysis toolkit : advanced analysis techniques for Windows 8 / Harlan Carvey.

by Carvey, Harlan A.

Edition: 4th ed.Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: Amsterdam ; Boston : Syngress, [2014]Availability: Items available for loan: Central Library (CL)Call number: 363.25968 CAR (2).
The art of memory forensics : detecting malware and threats in Windows, Linux, and Mac memory / Michael Hale Ligh, Andrew Case, Jamie Levy, Aaron Walters.

by Ligh, Michael Hale | Case, Andrew (Digital forensics researcher) | Levy, Jamie | Walters, Aaron.

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: Indianapolis, IN : Wiley, [2014]Copyright date: ©2014Other title: Detecting malware and threats in Windows, Linux, and Mac memory.Online access: Contributor biographical information | Table of contents only Availability: Items available for loan: Central Library (CL)Call number: 004.5028558 LIG (2).
The disaster recovery handbook a step-by-step plan to ensure business continuity and protect vital operations, facilities, and assets / Michael Wallace and Lawrence Webber.

by Wallace, Michael | Webber, Larry | ebrary, Inc.

Edition: 1 st ed.Material type: Text Text Publisher: India,New Delhi : Prentice Hall, c2007Online access: Click here to access online Availability: Items available for loan: Military College of Engineering (MCE) Call number: 658.478 WAL (1).
Commonsense computer security : your practical guide to preventing accidental and deliberate electronic data loss / Martin R. Smith.

by Smith, Martin R.

Material type: Text Text Publisher: London ; New York : McGraw-Hill, c1989Availability: Items available for loan: Military College of Engineering (MCE) Call number: 005.8 SMI (1).
Computers, ethics, and society / edited by M. David Ermann, Michele S. Shauf.

by Ermann, M. David | Shauf, Michele S.

Edition: 3rd ed.Material type: Text Text Publisher: New York : Oxford University Press, 2003Online access: Click here to access online | Click here to access online Availability: Items available for loan: Military College of Engineering (MCE) Call number: 303.4834 ERM (2).
Applied cryptography ,protocoles, algorithms and source conde in c

by Schneier, Bruce.

Edition: 2NDMaterial type: Text Text; Format: print ; Literary form: Not fiction Publisher: NEW YORK JOHN WILEY ,JOHN WILEY & SONS 1996Availability: Items available for loan: College of Electrical & Mechanical Engineering (CEME)Call number: 005.82 SCH (1). Checked out (1).
Computer security

by Gollmann, Dieter.

Edition: 3RDMaterial type: Text Text; Format: print ; Literary form: Not fiction Publisher: INDIA WILEY 2014Availability: No items available : Checked out (1).
Security in computing

by Pfleeger, Charles . P ,Pfleeger , Shari. Lawrence.

Edition: 3RDMaterial type: Text Text; Format: print ; Literary form: Not fiction Publisher: NEW DELHI PEARSON EDUCATION ASIA 2003Availability: No items available : Checked out (1).
User's guide to cryptography and standards

by Dent, Alexander.W,Mitchell, Chris.J.

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: BOSTON ARTECH HOUSE 2005Availability: Items available for loan: College of Electrical & Mechanical Engineering (CEME)Call number: 005.8 DEN (1).
Netspionage, the global threat to information

by Boni, William Kovacich, Gerald L.

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: OXFORD BUTTERWORTH HEINEMANN 2000Availability: Items available for loan: College of Electrical & Mechanical Engineering (CEME)Call number: 005.8 BON (1).
Disaster proofing information systems, a complete methodology for eliminating single points of failure

by Buchanan, Robert W.

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: NEW YORK MCGRAW HILL 2003Availability: Items available for loan: College of Electrical & Mechanical Engineering (CEME)Call number: 005.86 BUC (1).
Server +, tm certification bible

by Kay, Trevor.

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: NEW YORK HUNGRY MINDS 2003Availability: Items available for loan: College of Electrical & Mechanical Engineering (CEME)Call number: 005.8 KAY (2).
COMMONSENSE COMPUTER SECURITY

by SMITH, MARTIN R.

Material type: Text Text Publisher: NEWYORK MCGRAW HILL 1989Availability: Items available for loan: College of Electrical & Mechanical Engineering (CEME)Call number: 005.8 SMI'C (1).
Computer security;art and science

by Bishop, Matt.

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: INDIA PEARSON EDUCATION ASIA 2003Availability: Items available for loan: College of Electrical & Mechanical Engineering (CEME)Call number: 005.8 BIS (2).
Firewalls for dummies

by Brian Komar | Ronald Beekelaar and Joern Wettern.

Edition: 2nd edMaterial type: Text Text Publisher: New York Wiley Pub 2003Availability: Items available for loan: College of Electrical & Mechanical Engineering (CEME)Call number: 280 SCB (1).
Unix system security a guide for users and system administrators

by Curry, David A.

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: NEWYORK ADDISON WESLEY 1992Availability: Items available for loan: College of Electrical & Mechanical Engineering (CEME)Call number: 005.43 CUR'U (1).
Practical cryptography for data internetworks

by Stallings, William.

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: USA IEEE COMPUTER SOCIETY 1996Availability: Items available for loan: College of Electrical & Mechanical Engineering (CEME)Call number: 005.8 STA (1).
Cult of the Dead Cow : how the original hacking supergroup might just save the world Joseph Menn.

by Menn, Joseph [author.].

Edition: First edition.Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: New York : PublicAffairs, 2019Availability: Items available for reference: Central Library (CL) Not for loanCall number: 303.4833 MEN (1). :
Social engineering : the science of human hacking / Christopher Hadnagy.

by Hadnagy, Christopher [author.] | Wozniak, Steve, 1950- [writer of foreword.].

Edition: Second edition.Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: Indianapolis, IN : Wiley, [2018]Copyright date: ©2018Availability: Items available for loan: Military College of Signals (MCS)Call number: 005.8,HAD (1).
Hacking : the art of exploitation / Jon Erickson.

by Erickson, Jon, 1977-.

Edition: 2nd ed.Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: San Francisco, CA : No Starch Press, c2008Online access: Table of contents Availability: Items available for loan: Military College of Signals (MCS)Call number: 005.8,ERI (1).
Hacking exposed 7 : network security secrets & solutions / Stuart McClure, Joel Scambray, George Kurtz.

by McClure, Stuart | Mcclure, Stuart | Scambray, Joel | Kurtz, George.

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: New York : McGraw-Hill, [2012]Copyright date: ©2012Availability: Items available for loan: Military College of Signals (MCS)Call number: 005.8,MCC (3).
Corporate computer security / Randall J. Boyle (Longwood University), Raymond R. Panko (University of Hawaiʻi at Mānoa).

by Panko, Raymond R [author.] | Boyle, Randall [author.].

Edition: Fourth edition.Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: Boston : Pearson, [2015]Availability: Items available for loan: Military College of Signals (MCS)Call number: 005.8,PAN (1). Items available for reference: Military College of Signals (MCS) Not for loanCall number: 005.8,PAN (1). Checked out (1).
Threat modeling : designing for security / Adam Shostack.

by Shostack, Adam [author.].

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: Indianapolis, IN : Wiley, [2014]Copyright date: ©2014Availability: No items available : Checked out (1).
Computer security : principles and practice / William Stallings, Lawrie Brown,

by Stallings, William [author.] | Brown, Lawrie [author.].

Edition: Fourth Edition.Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: New York, NY : Pearson, [2018]Availability: Items available for loan: Military College of Signals (MCS)Call number: 005.8,STA (3). Items available for reference: Military College of Signals (MCS) Not for loanCall number: 005.8,STA (1).
Advanced penetration testing : hacking the world's most secure networks / Wil Allsopp.

by Allsopp, Wil [author.].

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: Indianapolis, IN : Wiley, [2017]Availability: Items available for loan: Military College of Signals (MCS)Call number: 005.8,ALL (1).
Computer security : art and science / Matt Bishop ; with contributions from Elisabeth Sullivan and Michelle Ruppel.

by Bishop, Matt (Matthew A.) [author.] | Sullivan, Elisabeth [contributor.] | Ruppel, Michelle [contributor.].

Edition: Second edition.Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: Boston : Addison-Wesley, [2019]Copyright date: ©2019Availability: Items available for loan: Military College of Signals (MCS)Call number: 005.8,BIS (1). Items available for reference: Military College of Signals (MCS) Not for loanCall number: 005.8,BIS (1). Checked out (1).
Practical malware analysis : the hands-on guide to dissecting malicious software / by Michael Sikorski and Andrew Honig.

by Sikorski, Michael | Honig, Andrew.

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: San Francisco : No Starch Press, c2012Online access: Contributor biographical information | Publisher description | Table of contents only Availability: Items available for reference: Military College of Signals (MCS) Not for loanCall number: 005.84,SIK (1). :
Cryptography and network security : principles and practice / William Stallings.

by Stallings, William [author.].

Edition: Seventh edition.Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: Boston : Pearson, [2017]Availability: Items available for loan: Military College of Signals (MCS)Call number: 005.82,STA (4). Items available for reference: Military College of Signals (MCS) Not for loanCall number: 005.82,STA (1).
Malware forensics field guide for Windows systems : digital forensics field guides / Cameron H. Malin, Eoghan Casey, James M. Aquilina; Curtis W. Rose, technical editor.

by Malin, Cameron H | Casey, Eoghan | Aquilina, James M.

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: Waltham, MA : Syngress, c2012. 4803161Availability: Items available for loan: Military College of Signals (MCS)Call number: 005.84,MAL (1).
Penetration testing : a hands-on introduction to hacking / by Georgia Weidman.

by Weidman, Georgia.

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: San Francisco : No Starch Press, [2014]Availability: Items available for loan: Military College of Signals (MCS)Call number: 005.8092,WEI (1).
Human dimensions of cybersecurity / by Terry Bossomaier, Steven D'Alessandro, Roger Bradbury.

by Bossomaier, Terry R. J. (Terry Richard John) [author.] | D'Alessandro, Steven [author.] | Bradbury, R. H. (Roger H.) [author.].

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: Boca Raton : CRC Press, [2020]Availability: Items available for loan: Military College of Signals (MCS)Call number: 005.8,BOS (1).
Security in computing / Charles P. Pfleeger.

by Pfleeger, Charles P.

Edition: Fourth EditionMaterial type: Text Text; Format: print ; Literary form: Not fiction Publisher: India 2009Availability: Items available for loan: Military College of Signals (MCS)Call number: 005.8,PFL (1).
Real digital forensics : computer security and incident response / Keith J. Jones, Richard Bejtlich, Curtis W. Rose.

by Jones, Keith J. (Keith John) | Bejtlich, Richard | Rose, Curtis W.

Material type: Text Text; Format: print ; Literary form: Not fiction ; Audience: Specialized; Publisher: Upper Saddle River, NJ : Addison-Wesley, 2005Availability: Items available for loan: Military College of Signals (MCS)Call number: 005.8,JON (1).
VMware vSphere and virtual infrastructure security : securing the virtual environment / Edward L. Haletky.

by Haletky, Edward.

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: Upper Saddle River, NJ. : Prentice Hall, c2009Availability: Items available for loan: Military College of Signals (MCS)Call number: 005.8,HAL (1).
Computer security fundamentals / Chuck Easttom.

by Easttom, Chuck [author.].

Edition: Third edition.Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: Indianapolis, Indiana : Pearson, [2016]Online access: E-book Availability: Items available for loan: Military College of Signals (MCS)Call number: 005.8,EAS (1).
Fundamentals of information systems security / David Kim, Michael G. Solomon.

by Kim, David (Information technology security consultant) [author.] | Solomon, Michael (Michael G.), 1963- [author.].

Edition: Third edition.Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: Burlington, MA : Jones & Bartlett Learning, [2018]Availability: Items available for loan: Military College of Signals (MCS)Call number: 005.8,KIM (1).
Security for software engineers / James N. Helfrich.

by Helfrich, James N [author.].

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: Boca Raton : Taylor & Francis, a CRC title, part of the Taylor & Francis imprint, a member of the Taylor & Francis Group, the academic division of T&F Informa, plc, 2018Availability: Items available for loan: Military College of Signals (MCS)Call number: 005.8,HEL (1).
© 2023 Central Library, National University of Sciences and Technology. All Rights Reserved.