My Library

   
Limit search to available items
Result Page   1 2 Next  
Add Marked to Bag Add All On Page Add Marked to My Lists
Subjects (1-50 of 66)
Computer security
1
Book
Book Cover

Authentication : from passwords to public keys


Smith, Richard E. 1952 -
Boston : Addison-Wesley, 2002 2002

Rating:

 

Copies

2
Book
Book Cover

Building secure software : how to avoid security problems the right way


Viega,John
Boston : Addison - Wesley , 2002 2002

Rating:

 

Copies

Location Call No. Status
 Female Library  QA76.76.D47 V857 2002    Available
3
Text-Book
Book Cover

Cloud computing security : foundations and challenges



Boca Raton : CRC Press/Taylor & Francis Group, 2017. 2017

Rating:

 

Copies

Location Call No. Status
 Male Library  QA76.585.C5825 2017    Available
 Female Library  QA76.585.C5825 2017    Available
4
Book
Book Cover

Computer forensics : principles and practices


Volonino, Linda
Upper Saddle River, N.J. : Pearson/Prentice Hall, 2006 2006

Rating:

 

Copies

Location Call No. Status
 Female Library  QA76.9.A25 V59145 2006    Available
5
Book
Book Cover

Computer security


Gollmann, Dieter
Chichester, England ; Hoboken, NJ : Wiley, 2006 2006

Rating:

 

Copies

Location Call No. Status
 Female Library  QA76.9.A25 G65 2006    Available
6
Book
Book Cover

Computer security : art and science


Bishop, Matt (Matthew A.)
Boston, MA : Addison-Wesley, 2003 2003

Rating:

 

Copies

Location Call No. Status
 Male Library  QA76.9.A25 B56 2003    Available
7
Book
Book Cover

Computer security fundamentals


Easttom, Chuck
Upper Saddle River, NJ : Pearson Prentice Hall, 2006 2006

Rating:

 

Copies

Location Call No. Status
 Female Library  QA76.9.A25 E27 2006    Available
8
Book
Book Cover

Computer security : principles and practice


Stallings, William
Upper Saddle River, N.J. : Prentice Hall, 2008 2008

Rating:

 

Copies

Location Call No. Status
 Female Library  QA76.9.A25 S685 2008    Available
9
Book
Book Cover

Computer security : principles and practice


Stallings, William
Boston : Pearson, 2012 2012

Rating:

 

Copies

Location Call No. Status
 Female Library  QA76.9.A25 S685 2012    Available
10
Book
Book Cover

Computer security : principles and practice


Stallings, William
Upper Saddle River : Pearson, 2018. 2018

Rating:

 

Copies

Location Call No. Status
 Male Library  QA76.9.A25 S685 2018    Available
 Male Library  QA76.9.A25 S685 2018 c.2  Available
 Female Library  QA76.9.A25 S685 2018    Available
There are additional copies/volumes of this item
11
Book
Book Cover

Computers, ethics, and society



New York : Oxford University Press, 2003 2003

Rating:

 

Copies

Location Call No. Status
 Female Library  QA76.9.C66 C572 2003    Available
 Female Library  QA76.9.C66 C572 2003 c.2  Available
12
Book
Book Cover

Corporate computer and network security


Panko, R. R
Boston : Prentice Hall, 2010 2010

Rating:

 

Copies

Location Call No. Status
 Female Library  QA76.9.A25 P36 2010    Available
13
Book
Book Cover

Cryptographiy,information theory,and error-correction : a handbook for 21st century


Bruen, Aiden A., 1941-
New Jersey : A John wiley & sons,INC.,publication., 2005 2005

Rating:

 

Copies

Location Call No. Status
 Female Library  QA76.9.A25 B79 2005    Available
14
Book
Book Cover

Cryptography and network security : principles and practice


Stallings, William
Upper Saddle River, N.J. : Prentice Hall International, 2003 2003

Rating:

 

Copies

Location Call No. Status
 Female Library  TK5105.59 S713 2003    Available
 Female Library  TK5105.59 S713 2003 c.2  Available
 Male Library  TK5105.59 S713 2003    Available
There are additional copies/volumes of this item
15
Book
Book Cover

Cryptography and network security : principles and practice


Stallings, William
Upper Saddle River, N.J. : Pearson/Prentice Hall, 2006 2006

Rating:

Copies

Location Call No. Status
 Female Library  TK5105.59 S713 2006    Available
 Female Library  TK5105.59 S713 2006 c.2  Available
 Male Library  TK5105.59 S713 2006    Available
16
Book
Book Cover

Cryptography and network security : principles and practice


Stallings, William
Boston : Prentice Hall, c2011 2011

Rating:

 

Copies

Location Call No. Status
 Female Library  TK5105.59 .S713 2011    Available
 Male Library  TK5105.59 .S713 2011    Available
17
Text-Book
Book Cover

Cryptography and network security : principles and practice


Stallings, William, author
Boston : Pearson, 2017. 2017

Rating:

 

Copies

Location Call No. Status
 Male Library  TK5105.59.S713 2017 c.2  Available
 Male Library  TK5105.59.S713 2017    Available
 Female Library  TK5105.59.S713 2017    Available
There are additional copies/volumes of this item
18
Book
Book Cover

Cryptography decrypted


Mel, H. X. 1948 -
Boston, MA : Addison-Wesley , 2001 2001

Rating:

 

Copies

Location Call No. Status
 Female Library  QA76.9.A25 M44 2001    Available
 Female Library  QA76.9.A25 M44 2001 c.2  Available
19
Book
Book Cover

Cyber security and IT infrastructure protection



Waltham, MA : Syngress is an imprint of Elsevier, 2014 2014

Rating:

 

Copies

Location Call No. Status
 Female Library  QA76.9.A25 C9183 2014    Available
 Male Library  QA76.9.A25 C9183 2014    Available
20
Book
Book Cover

Cyber security culture : counteracting cyber threats through organizational learning and training


Trim, Peter R. J
London ; New York : Routledge, 2013 2013

Rating:

 

Copies

Location Call No. Status
 Female Library  HD30.2 .T75 2013    Available
 Male Library  HD30.2 .T75 2013    Available
21
Text-Book
Book Cover

Cybersecurity and privacy - bridging the gap



Gistrup, Denmark : River Publishers, 2017. 2017

Rating:

 

Copies

Location Call No. Status
 Male Library  QA76.9.A25 C934 2017    Available
 Female Library  QA76.9.A25 C934 2017    Available
22
Book
Book Cover

Cybersecurity essentials


Brooks, Charles J., author
2018

Rating:

 

Copies

Location Call No. Status
 Male Library  TK5105.59.B766 2018    Available
 Female Library  TK5105.59.B766 2018    Available
23
Text-Book
Book Cover

Cybersecurity : protecting critical infrastructures from cyber attack and cyber warfare



Boca Raton : CRC Press/Taylor & Francis Group, 2015. 2015

Rating:

 

Copies

Location Call No. Status
 Male Library  QA76.9.A25 C957 2015    Available
 Female Library  QA76.9.A25 C957 2015    Available
24
Book
Book Cover

Data hiding and applications: image watermaking and steganography


Alaziz, Hanaa Abd
Deutschland , Germany : LAP LAMBERT Academic publishing, 2012 2012

Rating:

 

Copies

Location Call No. Status
 Female Library  QA76.9.A25 A43 2012    Available
 Female Library  QA76.9.A25 A43 2012 c.2  Available
25
Book
Book Cover

Elementary information security


Smith, Richard E., 1952-
Burlington, MA : Jones & Bartlett Learning, 2013 2013

Rating:

 

Copies

Location Call No. Status
 Female Library  QA76.9.A25 S652 2013    Available
 Male Library  QA76.9.A25 S652 2013    Available
 Male Library  QA76.9.A25 S652 2013 c.2  Available
26
Book
Book Cover

Elementary information security


Smith, Richard E., 1952-
Burlington, MA : Jones & Bartlett Learning, 2016. 2016

Rating:

 

Copies

Location Call No. Status
 Male Library  QA76.9.A25 S652 2016    Available
 Female Library  QA76.9.A25 S652 2016    Available
27
Book
Book Cover

Fundamentals of computer security


Pieprzyk, Josef
Berlin; New York : Springer , 2003 2003

Rating:

 

Copies

Location Call No. Status
 Female Library  QA76.9.A25 P536 2003    Available
28
Book
Book Cover

Guide to computer forensics and investigations


Nelson, Bill
Boston, Mass. : Thomson Course Technology, 2006 2006

Rating:

 

Copies

Location Call No. Status
 Female Library  QA76.9.A25 N45 2006    Available
29
Book
Book Cover

Guide to computer forensics and investigations : processing digital evidence


Nelson, Bill
Boston, MA : Cengage Learning, 2016  

Rating:

 

Copies

Location Call No. Status
 Female Library  HV8079.C65 N45 2016    Available
30
Book
Book Cover

Guide to network defense and countermeasures


Weaver, Randy
Boston : Thomson/Course technology, 2007 2007

Rating:

 

Copies

Location Call No. Status
 Female Library  TK5105.59 W33 2007    Available
31
Book
Book Cover

Guide to network defense and countermeasures


Weaver, Randy
Australia ; Boston, MA, USA : Course Technology, Cengage Learning, 2014 2014

Rating:

 

Copies

Location Call No. Status
 Female Library  TK5105.59 W415 2014    Available
32
Book
Book Cover

Guide to network security



Boston, MA : Course Technology/Cengage Learning, 2013 2013

Rating:

 

Copies

Location Call No. Status
 Female Library  QA76.9.A25 W458 2013    Available
33
Book
Book Cover

Guide to network security


Whitman, Michael E
Boston, MA : Course Technology, 2013 2013

Rating:

 

Copies

Location Call No. Status
 Female Library  QA76.9.A25 W458 2013    Available
34
Text-Book
Book Cover

Copies

Location Call No. Status
 Male Library  QA76.9.A25 S493 2016    Available
 Female Library  QA76.9.A25 S493 2016    Available
35
Book
Book Cover

Hacking exposed : network security secrets & solutions


Scambray, Joel
Berkeley, Calif. : Osborne/McGraw-Hill, 2001. 2001

Rating:

 

Copies

Location Call No. Status
 Female Library  TK5105.59 M48 2001    Available
36
Book
Book Cover

Handbook of research on digital crime, cyberspace security, and information assurance



Hershey, PA : Information Science Reference, An Imprint of IGI Global, [2015] 2015

Rating:

 

Copies

Location Call No. Status
 Female Library  HV6773 .H375 2015    Available
 Male Library  HV6773 .H375 2015    Available
37
Book
Book Cover

Hands-on ethical hacking and network defense


Simpson, Michael T., 1954-
Boston, MA, USA : Cengage Learning, ‏2017. 2017

Rating:

 

Copies

Location Call No. Status
 Female Library  QA76.9.A25 S55 2017    Available
 Male Library  QA76.9.A25 S55 2017    Available
 Male Library  QA76.9.A25 S55 2017 c.2  Available
There are additional copies/volumes of this item
38
Book
Book Cover

Hands-on ethical hacking and network defense


Simpson, Michael T., 1954- author
Australia ; Boston, MA : Cengage Learning, 2021. 2021

Rating:

 

Copies

Location Call No. Status
 Male Library  QA76.9.A25 S55 2021    DUE 10-05-23 Billed
 Female Library  QA76.9.A25 S55 2021    Available
39
Book
Book Cover

Information security illuminated


Solomon, Michael, 1963-
Sudbury, MA : Jones and Bartlett, 2005 2005

Rating:

 

Copies

Location Call No. Status
 Female Library  QA76.9.A25 C435 2005 c.2  Available
40
Book
Book Cover

Information security : principles and practices


Merkow, Mark S
Upper Saddle River, N.J. : Pearson Prentice Hall, 2006 2006

Rating:

Copies

Location Call No. Status
 Female Library  QA76.9.A25 M485 2006    Available
41
Book
Book Cover

Information security : the complete reference


Rhodes-Ousley, Mark
Emeryville, Calif. : McGraw-Hill/Osborne ; London : McGraw-Hill [distributor], 2013 2013

Rating:

 

Copies

Location Call No. Status
 Female Library  QA76.9.A25 R463 2013    Available
 Female Library  QA76.9.A25 R463 2013 c.2  Available
 Male Library  QA76.9.A25 R463 2013    Available
There are additional copies/volumes of this item
42
Book
Book Cover

Introduction to computer security


Bishop, Matt (Matthew A.)
Boston : Addison-Wesley, 2005 2005

Rating:

Copies

Location Call No. Status
 Female Library  QA76.9.A25 B563 2005    Available
43
Book
Book Cover

Introduction to cryptography with Java applets


Bishop, David, 1963-
Boston : Jones and Bartlett, 2003 2003

Rating:

 

Copies

Location Call No. Status
 Female Library  QA76.9.A25 B565 2003    Available
44
Text-Book
Book Cover

IT auditing : using controls to protect information assets


Kegerreis, Mike
New York : McGraw-Hill, c2020. 2011

Rating:

 

Copies

Location Call No. Status
 Male Library  QA76.9.A93 K44 2020    Available
 Male Library  QA76.9.A93 K44 2020 c.2  Available
 Female Library  QA76.9.A93 K44 2020    Available
There are additional copies/volumes of this item
45
Book
Book Cover

Copies

Location Call No. Status
 Female Library  QA76.9.A25 L23 2013    Available
 Female Library  QA76.9.A25 L23 2013 c.2  Available
46
Book
Book Cover

Copies

Location Call No. Status
 Female Library  QA76.9.A25 M35 2006    Available
47
Book
Book Cover

Management of information security


Whitman, Michael E. 1964-
Boston, Mass. ; London : Course Technology, 2004 2004

Rating:

 

Copies

Location Call No. Status
 Female Library  TK5105.59 W54 2004    Available
48
Book
Book Cover

Management of information security


Whitman, Michael E. 1964-
Stamford, CT, USA : Cengage Learning, 2014 2014

Rating:

Copies

49
Book
Book Cover

Copies

50
Book
Book Cover

Network security essentials : applications and standards


Stallings, William
Upper Saddle River, NJ. : Prentice Hall , 2003 2003

Rating:

 

Copies

Location Call No. Status
 Female Library  TK5105.59 S73 2003    Available
 Female Library  TK5105.59 S73 2003 c.2  Available
Add Marked to Bag Add All On Page
Locate in results
Resources
More Information
Result Page   1 2 Next