IUKL Library

Your search returned 659 results. Subscribe to this search

Not what you expected? Check for suggestions
|
Computer security.

by Gollmann, Dieter.

Material type: book Book Publisher: New York : John Wiley & Sons, 1999Availability: Items available for loan: IUKL Library [Call number: QA76.9 Gol] (1).
Place hold Log in to add tags. Add to cart
Security in computing.

by Pfleeger, Charles P.

Material type: book Book Publisher: New Jersey : Prentice Hall, 1997Availability: Items available for loan: IUKL Library [Call number: QA76.9 Pfl] (1). Checked out (1).
Secrets and lies : digital security in a networked world.

by Schneier, Bruce.

Material type: book Book Publisher: New York : John Wiley & Sons, 2000Availability: Items available for loan: IUKL Library [Call number: QA76.9 Sch] (1).
Network security essentials - applications and standards.

by Stallings, William.

Material type: book Book Publisher: New Jersey : Prentice Hall, 1999Availability: Items available for loan: IUKL Library [Call number: TK5105.59 Sta] (1).
Information Assurance Architecture.

by Willett, Keith D.

Edition: 1st.Material type: book Book Publisher: Boca Raton : CRC Press, 2008Availability: Items available for loan: IUKL Library [Call number: QA76.9 Wil] (1). Items available for reference: IUKL Library [Call number: QA76.9 Wil] (1).
Computer forensics : incident response essentials / Warren G. Kruse II, Jay G. Heiser.

by Kruse, Warren G | Heiser, Jay G.

Material type: book Book Publisher: Boston, M.A. : Addison-Wesley, 2002Availability: Items available for loan: IUKL Library [Call number: QA76.9 Kru] (2). Items available for reference: IUKL Library [Call number: QA75.9 Kru] (1).
Computer security fundamentals.

by Easttom, Chuck.

Material type: book Book Publisher: New Jersey : Prentice Hall, 2006Availability: Items available for loan: IUKL Library [Call number: QA76.9 Eas] (3).
Modern Cryptography : Theory & Practice.

by Wenbo Mao.

Material type: book Book Publisher: New Jersey : Prentice Hall, 2004Availability: Items available for reference: IUKL Library [Call number: QA76.9 Wen] (1).
Firewalls and VPNs : principles and practices / Richard W. Tibbs, Edwards B, Oakes.

by Tibbs, Richard | Oakes, Edward B.

Edition: 1st ed.Material type: book Book Publisher: New Jersey : Prentice Hall, 2006Availability: Items available for loan: IUKL Library [Call number: QA76.9 Tib] (1). Items available for reference: IUKL Library [Call number: QA76.9 Tib] (1).
Applied Crytography.

by Schneier, Bruce.

Material type: book Book Publisher: New York : John Wiley & Sons, 1996Availability: Items available for reference: IUKL Library [Call number: QA76.9 Sch] (1).
CCNA cisco certified network associate.

by Lammle, Todd.

Edition: 5th.Material type: book Book Publisher: San Francisco : Sybex, 2005Availability: Items available for reference: IUKL Library [Call number: QA76.3 Lam] (1).
Hack proofing your e-commerce site [electronic resource] : the only way to stop a hacker is to think like one / [Ryan Russell ... [et al.]].

by Russell, Ryan, 1969- | ebrary, Inc.

Material type: book Book; Format: electronic available online remote; Literary form: Not fiction Publisher: Rockland, Mass. ; [Great Britain] : Syngress, c2001Online access: An electronic book accessible through the World Wide Web; click to view Availability: No items available
Hack proofing Windows 2000 [electronic resource] / Chad Todd ; Norris L. Johnson, technical editor.

by Todd, Chad | ebrary, Inc.

Material type: book Book; Format: electronic available online remote; Literary form: Not fiction Publisher: Rockland, Mass. : [London : Syngress ; International Thomson [distributor]], c2001Other title: Hack proofing Windows 2000 server.Online access: An electronic book accessible through the World Wide Web; click to view Availability: No items available
Check Point NG [electronic resource] : next generation security administration / Drew Simonis ... [et al.].

by Simonis, Drew | ebrary, Inc.

Material type: book Book; Format: electronic available online remote; Literary form: Not fiction Publisher: Rockland, Mass. : Syngress Publishing, Inc., c2002Other title: Check Point Next Generation | CheckPoint NG.Online access: An electronic book accessible through the World Wide Web; click to view Availability: No items available
Security and embedded systems [electronic resource] / edited by Dimitrios N. Serpanos and Ran Giladi.

by NATO Advanced Research Workshop on Security and Embedded Systems (2005 August 22-26 : Patrai, Greece) | Giladi, Ran | Serpanos, Dimitrios Nikolaou | ebrary, Inc.

Material type: book Book; Format: electronic available online remote; Literary form: Not fiction Publisher: Amsterdam ; Washington, D.C. : IOS Press, c2006Online access: An electronic book accessible through the World Wide Web; click to view Availability: No items available
Verification of infinite-state systems with applications to security [electronic resource] / edited by Edmund Clarke, Marius Minea and Ferucio Lauren�tiu �Tiplea.

by NATO Advanced Research Workshop on Verification of Infinite-state Systems with Applications to Security (2005 March 17-22 : Tima�soara, Romania) | Clarke, Edmund | Minea, Marius | �Tiplea, Ferucio Lauren�tiu | ebrary, Inc.

Material type: book Book; Format: electronic available online remote; Literary form: Not fiction Publisher: Amsterdam ; Washington, D.C. : IOS Press, c2006Online access: An electronic book accessible through the World Wide Web; click to view Availability: No items available
Hack proofing ColdFusion [electronic resource] / Greg Meyer ... [et al.].

by Meyer, Greg [aut] | ebrary, Inc.

Material type: book Book; Format: electronic available online remote; Literary form: Not fiction Publisher: Rockland, Mass. : Syngress Publishing, Inc., c2002Other title: Hackproofing ColdFusion.Online access: An electronic book accessible through the World Wide Web; click to view Availability: No items available
Configuring ISA server 2000 [electronic resource] : building firewalls for windows 2000 / [Thomas W. Shinder, Debra Littlejohn Shinder ; Martin Grasdal, technical editor].

by Shinder, Thomas W | Shinder, Debra Littlejohn | Grasdal, Martin | ebrary, Inc.

Material type: book Book; Format: electronic available online remote; Literary form: Not fiction Publisher: Rockland, Mass. ; [Great Britain] : Syngress, c2001Online access: An electronic book accessible through the World Wide Web; click to view Availability: No items available
Hack proofing Sun Solaris 8 [electronic resource] / Thomas Vincent.

by Vincent, Thomas | ebrary, Inc.

Material type: book Book; Format: electronic available online remote; Literary form: Not fiction Publisher: Rockland, Mass. : London : Syngress Media ; International Thomson, 2001Online access: An electronic book accessible through the World Wide Web; click to view Availability: No items available
Hack proofing XML [electronic resource] / Neal O'Farrell.

by O'Farrell, Neal | ebrary, Inc.

Material type: book Book; Format: electronic available online remote; Literary form: Not fiction Publisher: Rockland, Mass. : Syngress Media, 2002Online access: An electronic book accessible through the World Wide Web; click to view Availability: No items available
The Library's homepage is at http://library.iukl.edu.my/.