My Library

   
Limit search to available items
118 results found. sorted by date .
Result Page   Prev 1 2 3  
Add Marked to Bag Add All On Page Add Marked to My Lists
Keywords (101-118 of 118)
101
Book
Book Cover

Copies

Location Call No. Status
 Female Library  TK5105.59 S33 2003    Available
 Female Library  TK5105.59 S33 2003 c.2  Available
102
Book
Book Cover

Computer security : art and science


Bishop, Matt (Matthew A.)
Boston, MA : Addison-Wesley, 2003 2003

Rating:

 

Copies

Location Call No. Status
 Male Library  QA76.9.A25 B56 2003    Available
103
Book
Book Cover

Computers, ethics, and society



New York : Oxford University Press, 2003 2003

Rating:

 

Copies

Location Call No. Status
 Female Library  QA76.9.C66 C572 2003    Available
 Female Library  QA76.9.C66 C572 2003 c.2  Available
104
Book
Book Cover

Web security : for network and system administrators


Mackey, David
Cambridge, Mass. ; London : Course Technology, 2003 2003

Rating:

 

Copies

Location Call No. Status
 Female Library  TK5105.59 M27 2003    Available
105
Book
Book Cover

Building secure software : how to avoid security problems the right way


Viega,John
Boston : Addison - Wesley , 2002 2002

Rating:

 

Copies

Location Call No. Status
 Female Library  QA76.76.D47 V857 2002    Available
106
Book
Book Cover

Authentication : from passwords to public keys


Smith, Richard E. 1952 -
Boston : Addison-Wesley, 2002 2002

Rating:

 

Copies

107
Book
Book Cover

Security complete.



London : Sybex, 2002 2002

Rating:

 

Copies

108
Book
Book Cover

Professional Java security


Garms, Jess
Birmingham, UK : Wrox Press, 2001. 2001

Rating:

 

Copies

109
Book
Book Cover

Hacking exposed : network security secrets & solutions


Scambray, Joel
Berkeley, Calif. : Osborne/McGraw-Hill, 2001. 2001

Rating:

 

Copies

Location Call No. Status
 Female Library  TK5105.59 M48 2001    Available
110
Book
Book Cover

Cryptography decrypted


Mel, H. X. 1948 -
Boston, MA : Addison-Wesley , 2001 2001

Rating:

 

Copies

Location Call No. Status
 Female Library  QA76.9.A25 M44 2001    Available
 Female Library  QA76.9.A25 M44 2001 c.2  Available
111
Book
Book Cover

Copies

112
Book
Book Cover

Building Internet firewalls


Zwicky, Elizabeth D
Beijing ; Cambridge [Mass.] : O'Reilly, c2000. 2000

Rating:

 

Copies

Location Call No. Status
 Female Library  TK5105.59 .Z85 2000    Available
113
Book
Book Cover

Intranet security : stories from the trenches


McCarthy, Linda
Mountainview, Calif. : Sun Microsystems Press, 1998. 1998

Rating:

 

Copies

114
Book
Book Cover

E-commerce security : weak links, best defenses


Ghosh, Anup K
New York : John Wiley, 1998. 1998

Rating:

Copies

Location Call No. Status
 Female Library  HF5548.32 .G48 1998    Available
115
Book
Book Cover

Corporate fraud


Comer, Michael J
London : Routledge, 1997 1997

Rating:

 

Copies

Location Call No. Status
 Female Library  HV6768 .C65 1997    Available
 Male Library  HV6768 .C65 1997    Available
116
Book
Book Cover

Internet and TCP/IP network security : securing protocols and applications


Pabrai, Uday O
New York : McGraw-Hill, c1996. 1996

Rating:

 

Copies

117
Book
Book Cover

Network security : private communication in a public world


Kaufman, Charlie
Upper Saddle River, N.J : PTR Prentice Hall, 2002  

Rating:

 

Copies

Location Call No. Status
 Male Library  QA76.9.A25 K345 2002    Available
118
Book
Book Cover

Guide to computer forensics and investigations : processing digital evidence


Nelson, Bill
Boston, MA : Cengage Learning, 2016  

Rating:

 

Copies

Location Call No. Status
 Female Library  HV8079.C65 N45 2016    Available
Add Marked to Bag Add All On Page
Locate in results
Resources
More Information
Result Page   Prev 1 2 3