Refine your search

Your search returned 424 results.

Not what you expected? Check for suggestions
Safe and secure : secure your home network, and protect your privacy online / Arman Danesh, Felix Lau, and Ali Mehrassa.

by Danesh, Arman | Lau, Felix | Mehrassa, Ali.

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: Indianapolis, Ind. : Sams, c2002Availability: Items available for loan: Institute of Environmental Science and Engineering (IESE)Call number: 005.8 (1).
Database nation : the death of privacy in the 21st century / Simson Garfinkel.

by Garfinkel, Simson.

Edition: 1st ed.Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: Beijing ; Cambridge : O'Reilly, c2000Availability: Items available for loan: NUST Law School (NLS)Call number: 323.44/8 GAR (1).
Digital fortress / Dan Brown.

by Brown, Dan, 1964-.

Material type: Text Text; Format: print ; Literary form: Fiction Publisher: New York : Thomas Dunne Books, 1998Online access: Contributor biographical information | Publisher description | Sample text Availability: Items available for loan: Central Library (CL)Call number: 823 BRO (3).
Fundamentals of computer security Josef Pieprzyk.

by Pieprzyk, Josef.

Publisher: Berlin : New York : Springer, c2003Online access: Publisher description | Table of contents only Availability: Items available for loan: Central Library (CL)Call number: 005.8 PIE (1).
Java security :writing and deploying secure applications Scott Oaks ; [editors: Mike Loukides and Debra Cameron]

by Oaks, Scott | Loukides, Michael Kosta [oth] | Cameron, Debra [oth].

Edition: 2. ed. Publisher: Sebastopol, Calif. : O'Reilly, 2001Availability: Items available for loan: Central Library (CL)Call number: 005.8 OAK (1).
Security engineering: a guide to building dependable distributed systems Ross J Anderson.

by Anderson, Ross.

Edition: 2nd ed. Publisher: Indianapolis, IN : Wiley Technology Pub., 2008Online access: Publisher description | Table of contents only Availability: Items available for loan: Central Library (CL)Call number: 005.8 AND (5).
Computer security : art and science Bishop, Matt.

by Matt Bishop.

Publisher: New Delhi : Pearson Education Inc., c2003Availability: Items available for loan: Central Library (CL)Call number: 005.8 BIS (5).
Security in computing Pfleeger, Shari Lawrence.

by Charles P Pfleeger.

Edition: 3rd Publisher: New Delhi :, Prentice-Hall of India Pvt.Ltd. 2006Availability: Items available for loan: Central Library (CL)Call number: 005.8 PFL (5).
Network security essentials : applications and standards William Stallings.

by Stallings, William.

Publisher: Upper Saddle River, NJ : Prentice Hall, c2000Availability: Items available for loan: Central Library (CL)Call number: 005.8 STA (3).
Java security Oaks, Scott.

by Scott Oaks.

Edition: 2nd Publisher: Sebastopol, CA : O’Reilly, c2001Availability: Items available for loan: Central Library (CL)Call number: 005.8 OAK (5).
Cryptography and network security: principles and practice principles and practice William Stallings.

by Stallings, William | Stallings, William.

Edition: 3rd ed. Publisher: Upper Saddle River, N.J. : Prentice Hall, c2003Availability: Items available for loan: Central Library (CL)Call number: 005.8 STA (6).
Cryptography and network security : principles and practice principles and practice William Stallings.

by Stallings, William | Stallings, William.

Edition: 2nd ed. Publisher: Upper Saddle River, N.J. : Prentice Hall, c1999Availability: Items available for loan: Central Library (CL)Call number: 005.8 STA (1).
Security in computing Charles P. Pfleeger.

by Pfleeger, Charles P.

Edition: 2nd ed. Publisher: Upper Saddle River, NJ : Prentice Hall PTR, c1997Availability: Items available for loan: Central Library (CL)Call number: 005.8 PFL (1).
Security in computing Charles P. Pfleeger, Shari Lawrence Pfleeger.

by Pfleeger, Charles P | Pfleeger, Shari Lawrence.

Edition: 4th ed. Publisher: Upper Saddle River, NJ : Prentice Hall, c2007Online access: Table of contents only Availability: Items available for loan: Central Library (CL)Call number: 005.8 PFL (3).
Applied cryptography: protocols, algorithms and source code in C Bruce Schneier

by Bruce Schneier.

Edition: 2nd ed. Publisher: New York : Wiley, c1996Availability: Items available for loan: Central Library (CL)Call number: 005.82 SCH (12). Checked out (1).
Network security: private communication in a public world Kaufman, Charlie

Edition: 2nd ed. Publisher: New Delhi : Pearson Education Inc, c2003Availability: Items available for loan: Central Library (CL)Call number: 005.820 KAU (7).
Digital fortress Dan Brown.

by Brown, Dan.

Publisher: London : Corgi, c1998Availability: Items available for loan: Central Library (CL)Call number: 813.54 BRO (2).
Mission-critical network planning Matthew Liotine.

by Liotine, Matthew.

Publisher: Boston : Artech House, c2003Availability: Items available for loan: Central Library (CL)Call number: 004.6 LIO (1).
Cisco router firewall security Richard A. Deal

by Deal, Richard A.

Publisher: Indianapolis, Ind. : Cisco Press, c2005Availability: Items available for loan: Central Library (CL)Call number: 004.6 DEA (1).
Hacking exposed J2EE & Java : developing secure applications with Java technology Brian Buege, Randy Layman, Art Taylor.

by Buege, Brian | Taylor, Art, 1958- | Layman, Randy.

Publisher: New York : McGraw-Hill/Osborne, c2002Availability: Items available for loan: Central Library (CL)Call number: 005.133 BUE (1).
Modern Cryptography: Theory and Practice Wenbo Mao

by Mao, Wenbo.

Publisher: New Delhi : Pearson Education Inc. , c2004Availability: Items available for loan: Central Library (CL)Call number: 005.8 MAO (1). Checked out (1).
MCSE Windows 2000 network security design: training guide Roberta Bragg.

by Bragg, Roberta.

Edition: 1st ed. Publisher: New Delhi : Techmedia, 2000Online access: Table of contents Availability: Items available for loan: Central Library (CL)Call number: 005.44769 BRA (1).
The CERT guide to system and network security practices Julia H. Allen.

by Allen, Julia H.

Publisher: Boston, MA ; Singapore : Addison-Wesley, c2001Availability: Items available for loan: Central Library (CL)Call number: 005.8 ALL (1).
PC week intranet and internet firewall strategies Edward Amoroso and Ronald Sharp.

by Amoroso, Edward G | Sharp, Ronald.

Publisher: Emeryville, Calif. : Ziff-Davis Press, c1996Other title: PC week intranet and internet firewall strategies | Intranet and internet firewall strategies.Availability: Items available for loan: Central Library (CL)Call number: 005.8 AMO (1).
Maximum security Anonymous.

Edition: 3rd ed. Publisher: Indianapolis, Ind. : Sams Pub., c2001Availability: Items available for loan: Central Library (CL)Call number: 005.8 ANO (2). Checked out (1).
Techniques and applications of digital watermarking and content protection Michael Arnold, Martin Schmucker, Stephen D. Wolthusen.

by Arnold, Michael | Schmucker, Martin | Wolthusen, Stephen D.

Publisher: Boston : Artech House, c2003Other title: Digital watermarking and content protection.Availability: Items available for loan: Central Library (CL)Call number: 005.8 ARN (1).
CCSP Cisco secure PIX Firewall advanced exam certification guide Greg Bastien, Earl Carter, Christain Abera Degu.

by Bastien, Greg | Degu, Christian | Carter, Earl.

Edition: 2nd ed. Publisher: Indianapolis, IN : Cisco, c2005Availability: Items available for loan: Central Library (CL)Call number: 005.8 BAS (1).
Information hiding techniques for steganography and digital watermarking Stefan Katzenbeisser, Fabien A.P. Petitcolas, editors

by Katzenbeisser, Stefan [edt] | Petitcolas, Fabien A. P [edt].

Publisher: Boston : Artech House, cop. 2000Availability: Items available for loan: Central Library (CL)Call number: 005.8 KAT (3).
Cisco ASA and PIX firewall handbook David Hucaby.

by Hucaby, David.

Publisher: Indianapolis, IN : Cisco Press, c2005Availability: Items available for loan: Central Library (CL)Call number: 005.8 HUC (1).
Biometrics, computer security systems and artificial intelligence applications Khalid Saeed, Jerzy Pejas, Romuald Mosdorf

by Saeed, Khalid | Pejaⳬ Jerzy, 1954- | Mosdorf, Romuald | MyiLibrary.

Publisher: New York : Springer, c2006Online access: Click here to access online | Click here to access online Availability: Items available for loan: Central Library (CL)Call number: 005.8 KHA (1).
Principles of secure network systems design Sumit Ghosh ; with a foreword by Harold Lawson.

by Ghosh, Sumit.

Publisher: New York : Springer, c2002Online access: Table of contents | Publisher description Availability: Items available for loan: Central Library (CL)Call number: 005.8 GHO (1).
Cryptography for Internet and database applications : developing secret and public key techniques with Java Nick Galbreath.

by Galbreath, Nick.

Publisher: New York : John Wiley & Sons, cop. 2002Availability: Items available for loan: Central Library (CL)Call number: 005.8 GAL (1).
Secrets and lies : digital security in a networked world Bruce Schneier.

by Schneier, Bruce.

Publisher: New York : Wiley Pub., c2000Availability: Items available for loan: Central Library (CL)Call number: 005.8 SCH (5).
Wireless security : models, threats, and solutions Randall K. Nichols, Panos C. Lekkas.

by Nichols, Randall K | Lekkas, Panos C.

Publisher: New York ; London : McGraw-Hill, c2002Online access: Contributor biographical information | Table of contents Availability: Items available for loan: Central Library (CL)Call number: 005.8 NIC (1).
Trojans, worms, and spyware: a computer security professional's guide to malicious code a computer security professional's guide to malicious code Michael Erbschloe

by Erbschloe, Michael.

Publisher: Amsterdam ; Boston : Elsevier Butterworth Heinemann, c2005Online access: Table of contents | Publisher description Availability: Items available for loan: Central Library (CL)Call number: 005.8 ERB (1).
Security architecture : design deployment and operations Christopher M. King, Curtis E. Dalton, T. Ertem Osmanoglu.

by King, Christopher M | Dalton, Curtis E | Osmanoglu, T. Ertem.

Publisher: New York : Osborne/McGraw-Hill, c2001Online access: Publisher description | Table of contents | Contributor biographical information Availability: Items available for loan: Central Library (CL)Call number: 005.8 KIN (2).
Java 2 network security Marco Pistoia ... [et al.].

by Pistoia, Marco.

Edition: 2nd ed. Publisher: Upper Saddle River, N.J. : Prentice Hall, c1999Availability: Items available for loan: Central Library (CL)Call number: 005.8.PIS (2).
User's guide to cryptography and standards Alexander W. Dent, Chris J. Mitchell.

by Dent, Alexander W | Mitchell, Chris.

Publisher: Boston : Artech House, c2005Other title: Cryptography and standards.Availability: Items available for loan: Central Library (CL)Call number: 005.8 DEN (1).
Designing security architecture solutions Jay Ramachandran.

by Ramachandran, Jay.

Publisher: New York : John Wiley, 2002Availability: Items available for loan: Central Library (CL)Call number: 005.8 RAM (1).
Information security risk analysis Thomas R. Peltier.

by Peltier, Thomas R.

Edition: 2nd ed. Publisher: Boca Raton : Auerbach Publications, 2005Online access: Publisher description Availability: Items available for loan: Central Library (CL)Call number: 005.8 PEL (1).
Firewall architecture for the enterprise Norbert Pohlmann and Tim Crothers.

by Pohlmann, Norbert | Crothers, Tim.

Publisher: New York, NY : Wiley Pub., c2002Online access: Contributor biographical information | Publisher description | Table of contents Availability: Items available for loan: Central Library (CL)Call number: 005.8 POH (1).
Enterprise security Robert C. Newman

by Newman, Robert C.

Publisher: New Delhi : Pearson Education Inc., c2003Availability: Items available for loan: Central Library (CL)Call number: 005.8 NEW (2).
Defense and detection strategies against Internet worms Jose Nazario.

by Nazario, Jose.

Publisher: Boston, MA : Artech House, 2004Availability: Items available for loan: Central Library (CL)Call number: 005.8 NAZ (1).
Mastering network security Chris Brenton, Cameron Hunt.

by Brenton, Chris | Hunt, Cameron.

Edition: 2nd ed. Publisher: San Francisco : Sybex, c2003Online access: Contributor biographical information | Publisher description | Table of contents only Availability: Items available for loan: Central Library (CL)Call number: 005.8 BRE (5).
Security for mobility edited by Chris J. Mitchell.

by Mitchell, Chris J | Institution of Electrical Engineers.

Publisher: London : Institution of Electrical Engineers, c2004Online access: Publisher description | Table of contents only Availability: Items available for loan: Central Library (CL)Call number: 005.8 MIT (1).
.NET security Jason Bock ...

by Bock, Jason [aut].

Publisher: Berkeley, Calif. : Apress, cop. 2002Availability: Items available for loan: Central Library (CL)Call number: 005.8 BOC (1).
Java security Gary McGraw & Edward Felten.

by McGraw, Gary | Felten, Edward, , 1963-.

Publisher: New York : Wiley , c1997Other title: Hostile applets, holes, and antidotes : what every Netscape and Internet user needs to know.Availability: Items available for loan: Central Library (CL)Call number: 005.8 MCG (1).
Special Ops : host and network security for Microsoft, UNIX, and Oracle by Erik Pace Birkholz ; special foreword by Stuart McClure

by Birkholz, Erik Pace | McClure, Stuart [aui].

Publisher: Rockland, MA : Syngress, cop. 2003Availability: Items available for loan: Central Library (CL)Call number: 005.8 BIR (1).
Implementing database security and auditing Ron Ben Natan

by Ben-Natan, Ron.

Publisher: India : Elsevier Digital Press, c2005Availability: Items available for loan: Central Library (CL)Call number: 005.8 BEN (2).
Principles of computer security: Security+ and beyond Security+ and beyond Wm. Arthur Conklin ... [et al.].

by Conklin, Wm. Arthur.

Publisher: Boston, Mass. : McGraw-Hill Technology Education, c2004Availability: Items available for loan: Central Library (CL)Call number: 005.8 CON (1).
© 2023 Central Library, National University of Sciences and Technology. All Rights Reserved.