My Library

   
Limit search to available items
118 results found. sorted by date .
Result Page   Prev 1 2 3 Next  
Add Marked to Bag Add All On Page Add Marked to My Lists
Keywords (51-100 of 118)
51
Book
Book Cover

Technocrime, policing, and surveillance



London ; New York : Routledge, Taylor & Francis Group, 2013 2013

Rating:

 

Copies

Location Call No. Status
 Male Library  HV6773 T4 2013    Available
 Female Library  HV6773 T4 2013    Available
52
Book
Book Cover

The basics of hacking and penetration testing : ethical hacking and penetration testing made easy


Engebretson, Patrick (Patrick Henry), 1974-
Amsterdam ; Boston : Syngress, an imprint of Elsevier, 2013 2013

Rating:

 

Copies

Location Call No. Status
 Female Library  QA76.9.A25 E5443 2013    Available
 Female Library  QA76.9.A25 E5443 2013 c.2  Available
53
Book
Book Cover

Guide to network security


Whitman, Michael E
Boston, MA : Course Technology, 2013 2013

Rating:

 

Copies

Location Call No. Status
 Female Library  QA76.9.A25 W458 2013    Available
54
Book
Book Cover

Cyber security culture : counteracting cyber threats through organizational learning and training


Trim, Peter R. J
London ; New York : Routledge, 2013 2013

Rating:

 

Copies

Location Call No. Status
 Female Library  HD30.2 .T75 2013    Available
 Male Library  HD30.2 .T75 2013    Available
55
Book
Book Cover

Computer security : principles and practice


Stallings, William
Boston : Pearson, 2012 2012

Rating:

 

Copies

Location Call No. Status
 Female Library  QA76.9.A25 S685 2012    Available
56
Book
Book Cover

Data hiding and applications: image watermaking and steganography


Alaziz, Hanaa Abd
Deutschland , Germany : LAP LAMBERT Academic publishing, 2012 2012

Rating:

 

Copies

Location Call No. Status
 Female Library  QA76.9.A25 A43 2012    Available
 Female Library  QA76.9.A25 A43 2012 c.2  Available
57
Book
Book Cover

Cybersecurity : the essential body of knowledge


Shoemaker, Dan
Boston, MA : Course Technology Cengage Learning, 2012 2012

Rating:

 

Copies

Location Call No. Status
 Male Library  QA76.9.A25 S56 2012    Available
 Female Library  QA76.9.A25 S56 2012    Available
58
Book
Book Cover

Computer forensics : cybercriminals, laws, and evidence


Maras, Marie-Helen, 1979-
Sudbury, Mass. : Jones & Bartlett Learning, 2012 2012

Rating:

 

Copies

Location Call No. Status
 Female Library  KF8947.5 .M37 2012    Available
59
Book
Book Cover

Cryptography and network security : principles and practice


Stallings, William
Boston : Prentice Hall, c2011 2011

Rating:

 

Copies

Location Call No. Status
 Female Library  TK5105.59 .S713 2011    Available
 Male Library  TK5105.59 .S713 2011    Available
60
Text-Book
Book Cover

IT auditing : using controls to protect information assets


Kegerreis, Mike
New York : McGraw-Hill, c2020. 2011

Rating:

 

Copies

Location Call No. Status
 Male Library  QA76.9.A93 K44 2020    Available
 Male Library  QA76.9.A93 K44 2020 c.2  Available
 Female Library  QA76.9.A93 K44 2020    Available
There are additional copies/volumes of this item
61
Book
Book Cover

Corporate computer and network security


Panko, R. R
Boston : Prentice Hall, 2010 2010

Rating:

 

Copies

Location Call No. Status
 Female Library  QA76.9.A25 P36 2010    Available
62
Book
Book Cover

The management of network security : technology, design, and management control


Carr, Houston H., 1937-
Upper Saddle River, N.J. : Prentice Hall, 2010 2010

Rating:

 

Copies

Location Call No. Status
 Female Library  TK5105.59 C3655 2010    Available
 Female Library  TK5105.59 C3655 2010 c.2  Available
63
Book
Book Cover

CCNA Cisco certified network associate security study guide (Exam 640-553)


Deal, Richard A
San Francisco : McGraw-Hill Professional, 2009 2009

Rating:

 

Copies

Location Call No. Status
 Female Library  TK5105.59 D428 2009    Available
64
Book
Book Cover

Guide to firewalls and network security : intrusion detection and VPNs.



Clifton Park, N.Y. : Course Technology/Cengage Learning, 2009 2009

Rating:

 

Copies

Location Call No. Status
 Female Library  TK5105.59 G85 2009    Available
65
Book
Book Cover

Security+ guide to network security fundamentals


Ciampa, Mark
Boston, MA : Course Technology, 2009 2009

Rating:

 

Copies

Location Call No. Status
 Female Library  QA76.9.A25 C35 2009    Available
66
Book
Book Cover

Principles of information security


Whitman, Michael E. 1964-
Boston, Mass. : Course Technology Cengage Learning , 2009 2009

Rating:

 

Copies

Location Call No. Status
 Female Library  TK5105.59 W54 2009    Available
67
Book
Book Cover

cryptography and network security


Forouzan, Behrouz A
Boston : McGraw-Hill Higher Education, 2008 2008

Rating:

Copies

Location Call No. Status
 Female Library  TK5105.59 F672 2008    Available
 Male Library  TK5105.59 F672 2008    Available
68
Book
Book Cover

Router security strategies : securing IP network traffic planes


Schudel, Gregg
Indianapolis, Ind. : Cisco Press, 2008 2008

Rating:

 

Copies

Location Call No. Status
 Female Library  TK5105.543 S38 2008    Available
69
Book
Book Cover

Computer security : principles and practice


Stallings, William
Upper Saddle River, N.J. : Prentice Hall, 2008 2008

Rating:

 

Copies

Location Call No. Status
 Female Library  QA76.9.A25 S685 2008    Available
70
Book
Book Cover

End-to-end network security : defense-in-depth


Santos, Omar
Indianapolis, Ind. : Cisco Press, 2008 2008

Rating:

Copies

Location Call No. Status
 Female Library  TK5105.59 S313 2008    Available
71
Book
Book Cover

Technology in warfare : the electronic dimension


Baram, Abdul Karim
Abu Dhabi : The Emirates Center for Strategic Studies and Research, 2008 2008

Rating:

 

Copies

Location Call No. Status
 Male Library  UG485 .B373 2008    Available
 Male Library  UG485 .B373 2008 c.2  Available
72
Book
Book Cover

Guide to network defense and countermeasures


Weaver, Randy
Boston : Thomson/Course technology, 2007 2007

Rating:

 

Copies

Location Call No. Status
 Female Library  TK5105.59 W33 2007    Available
73
Book
Book Cover

Network security essentials : applications and standards


Stallings, William
Upper Saddle River, NJ. : Pearson International Education/Prentice Hall , 2007 2007

Rating:

 

Copies

Location Call No. Status
 Female Library  TK5105.59 S73 2007    Available
74
Book
Book Cover

Data communications and network security


Carr, Houston H., 1937-
Boston : McGraw-Hill Irwin, 2007 2007

Rating:

 

Copies

Location Call No. Status
 Female Library  TK5105.59 C365 2007    Available
75
Book
Book Cover

Computer security


Gollmann, Dieter
Chichester, England ; Hoboken, NJ : Wiley, 2006 2006

Rating:

 

Copies

Location Call No. Status
 Female Library  QA76.9.A25 G65 2006    Available
76
Book
Book Cover

Cryptography and network security : principles and practice


Stallings, William
Upper Saddle River, N.J. : Pearson/Prentice Hall, 2006 2006

Rating:

Copies

Location Call No. Status
 Female Library  TK5105.59 S713 2006    Available
 Female Library  TK5105.59 S713 2006 c.2  Available
 Male Library  TK5105.59 S713 2006    Available
77
Book
Book Cover

Computer security fundamentals


Easttom, Chuck
Upper Saddle River, NJ : Pearson Prentice Hall, 2006 2006

Rating:

 

Copies

Location Call No. Status
 Female Library  QA76.9.A25 E27 2006    Available
78
Book
Book Cover

Network defense and countermeasures : principles and practices


Easttom, Chuck
Upper Saddle River, N.J. : Pearson Prentice Hall, 2006 2006

Rating:

 

Copies

Location Call No. Status
 Female Library  TK5105.59 E26 2006    Available
79
Book
Book Cover

Copies

Location Call No. Status
 Female Library  QA76.9.A25 M35 2006    Available
80
Book
Book Cover

Readings and cases in the management of information security


Whitman, Michael E. 1964-
Boston, Mass. ; Canada : Thomson Course Technology, 2006 2006

Rating:

 

Copies

Location Call No. Status
 Female Library  TK5105.59 W45 2006    Available
81
Book
Book Cover

Computer forensics : principles and practices


Volonino, Linda
Upper Saddle River, N.J. : Pearson/Prentice Hall, 2006 2006

Rating:

 

Copies

Location Call No. Status
 Female Library  QA76.9.A25 V59145 2006    Available
82
Book
Book Cover

Information security : principles and practices


Merkow, Mark S
Upper Saddle River, N.J. : Pearson Prentice Hall, 2006 2006

Rating:

Copies

Location Call No. Status
 Female Library  QA76.9.A25 M485 2006    Available
83
Book
Book Cover

Anti-hacker tool kit



New York : McGraw-Hill/Osborne, 2006 2006

Rating:

 

Copies

Location Call No. Status
 Female Library  TK5105.59 J65 2006    Available
84
Book
Book Cover

Guide to computer forensics and investigations


Nelson, Bill
Boston, Mass. : Thomson Course Technology, 2006 2006

Rating:

 

Copies

Location Call No. Status
 Female Library  QA76.9.A25 N45 2006    Available
85
Book
Book Cover

Information security illuminated


Solomon, Michael, 1963-
Sudbury, MA : Jones and Bartlett, 2005 2005

Rating:

 

Copies

Location Call No. Status
 Female Library  QA76.9.A25 C435 2005 c.2  Available
86
Book
Book Cover

Cryptographiy,information theory,and error-correction : a handbook for 21st century


Bruen, Aiden A., 1941-
New Jersey : A John wiley & sons,INC.,publication., 2005 2005

Rating:

 

Copies

Location Call No. Status
 Female Library  QA76.9.A25 B79 2005    Available
87
Book
Book Cover

Principles of information security


Whitman, Michael E. 1964-
Boston, Mass. : [London] : Thomson Course Technology, 2005 2005

Rating:

 

Copies

Location Call No. Status
 Female Library  TK5105.59 W55 2005    Available
88
Book
Book Cover

Network security fundamentals


Laet, Gert De
Indianapolis, Ind. : Cisco, 2005 2005

Rating:

 

Copies

Location Call No. Status
 Female Library  TK5105.59 L34 2005    Available
89
Book
Book Cover

Introduction to computer security


Bishop, Matt (Matthew A.)
Boston : Addison-Wesley, 2005 2005

Rating:

Copies

Location Call No. Status
 Female Library  QA76.9.A25 B563 2005    Available
90
Book
Book Cover

Network security first-step


Thomas, Thomas M
Indianapolis, IN : Cisco Press, c2004 2004

Rating:

 

Copies

Location Call No. Status
 Female Library  TK5105.59.T43 2004    Available
91
Book
Book Cover

Copies

Location Call No. Status
 Female Library  TK5105.59 .C5737 2004    Available
92
Book
Book Cover

Management of information security


Whitman, Michael E. 1964-
Boston, Mass. ; London : Course Technology, 2004 2004

Rating:

 

Copies

Location Call No. Status
 Female Library  TK5105.59 W54 2004    Available
93
Book
Book Cover

Fundamentals of network security


Maiwald, Eric
New York : McGraw-Hill Technology Education, 2004 2004

Rating:

Copies

Location Call No. Status
 Female Library  TK5105.59 M362 2004    Available
94
Book
Book Cover

Network security : the complete reference


Bragg, Roberta
New York : McGraw-Hill/Osborne, 2004 2004

Rating:

Copies

Location Call No. Status
 Female Library  TK5105.59 B725 2004    Available
 Female Library  TK5105.59 B725 2004 c.2  Available
95
Book
Book Cover

Principles of computer security : Security+ and beyond



Boston, Mass. : McGraw-Hill Technology Education, 2004 2004

Rating:

 

Copies

Location Call No. Status
 Female Library  QA76.9.A25 P75 2004    Available
 Female Library  QA76.9.A25 P75 2004 c.2  Available
96
Book
Book Cover

Network security essentials : applications and standards


Stallings, William
Upper Saddle River, NJ. : Prentice Hall , 2003 2003

Rating:

 

Copies

Location Call No. Status
 Female Library  TK5105.59 S73 2003    Available
 Female Library  TK5105.59 S73 2003 c.2  Available
97
Book
Book Cover

Cryptography and network security : principles and practice


Stallings, William
Upper Saddle River, N.J. : Prentice Hall International, 2003 2003

Rating:

 

Copies

Location Call No. Status
 Female Library  TK5105.59 S713 2003    Available
 Female Library  TK5105.59 S713 2003 c.2  Available
 Male Library  TK5105.59 S713 2003    Available
There are additional copies/volumes of this item
98
Book
Book Cover

Network security principles and practices


Malik, Saadat
Indianapolis, Ind. : Cisco, 2003 2003

Rating:

 

Copies

Location Call No. Status
 Female Library  TK5105.59 M34 2003    Available
99
Book
Book Cover

Introduction to cryptography with Java applets


Bishop, David, 1963-
Boston : Jones and Bartlett, 2003 2003

Rating:

 

Copies

Location Call No. Status
 Female Library  QA76.9.A25 B565 2003    Available
100
Book
Book Cover

Fundamentals of computer security


Pieprzyk, Josef
Berlin; New York : Springer , 2003 2003

Rating:

 

Copies

Location Call No. Status
 Female Library  QA76.9.A25 P536 2003    Available
Add Marked to Bag Add All On Page
Locate in results
Resources
More Information
Result Page   Prev 1 2 3 Next