|
ISA Server 2004 unleashed / Michael Noel.
by Noel, Michael. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Indianapolis, Ind. : Sams, c2006Availability: Items available for loan: IUKL Library [Call number: TK5105.8 Isa] (1).
Log in to add tags.
Add to cart (remove)
|
|
Administering Windows Vista security : the big surprises .
by Minasi, Mark | Hynes, Byron. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Indianapolis, IN : Wiley Publishing, Inc., 2007Availability: Items available for loan: IUKL Library [Call number: QA76.9 Min] (1).
Add to cart (remove)
|
|
Applied Crytography.
by Schneier, Bruce. Material type: Book Publisher: New York : John Wiley & Sons, 1996Availability: Items available for reference: IUKL Library [Call number: QA76.9 Sch] (1).
Add to cart (remove)
|
|
Auditing IT infrastructures for compliance / Martin M. Weiss and Michael G. Solomon.
by Weiss, Martin (Martin M.) | Solomon, Michael G. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Sudbury, MA : Jones & Bartlett Learning c2011Availability: Items available for loan: IUKL Library [Call number: QA76.9 Wei] (1).
Add to cart (remove)
|
|
Beginning cryptography with Java. David Hook.
by Hook, David. Publisher: Indianapolis : Wiley Pub, 2005Availability: Items available for loan: IUKL Library [Call number: QA76.9 Hoo] (4). Items available for reference: IUKL Library [Call number: QA76.9 Hoo] (1).
Add to cart (remove)
|
|
Business data communications : infastructure, networking and security/ William Stallings... [et.al.].
by Stallings, William | Case, Thomas | Bhattacharjee, Arup Kumar | Mukherjee, Soumen. Edition: 7th ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston, [Massachusetts] : Pearson, [2013]Availability: Items available for loan: IUKL Library [Call number: HF5548.2 Bus] (1).
Add to cart (remove)
|
|
Computer forensics computer crime scene investigation / John R. Vacca.
by Vacca, John R | ebrary, Inc. Edition: 2nd ed.Material type: Book; Format:
electronic
; Literary form:
Not fiction
Publisher: Hingham, Mass. : Charles River Media, 2005Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan: IUKL Library [Call number: QA76.9 Vac] (1).
Add to cart (remove)
|
|
Computer forensics : incident response essentials / Warren G. Kruse II, Jay G. Heiser.
by Kruse, Warren G | Heiser, Jay G. Material type: Book Publisher: Boston, M.A. : Addison-Wesley, 2002Availability: Items available for loan: IUKL Library [Call number: QA76.9 Kru] (2). Items available for reference: IUKL Library [Call number: QA75.9 Kru] (1).
Add to cart (remove)
|
|
Computer security / by the editors of Time-Life Books
by Time-Life Books. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Alexandria, Va. : Time-Life Books, c1986Availability: Items available for loan: IUKL Library [Call number: QA76.9 Com] (1).
Add to cart (remove)
|
|
Computer security fundamentals / Chuck Easttom.
by Easttom, Chuck. Edition: 2nd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Indianapolis, Ind. : Pearson, c2012Availability: Items available for loan: IUKL Library [Call number: QA76.9 Eas] (1). Items available for reference: IUKL Library [Call number: QA76.9 Eas] (1).
Add to cart (remove)
|
|
Computer security fundamentals.
by Easttom, Chuck. Material type: Book Publisher: New Jersey : Prentice Hall, 2006Availability: Items available for loan: IUKL Library [Call number: QA76.9 Eas] (3).
Add to cart (remove)
|
|
Computer security.
by Gollmann, Dieter. Material type: Book Publisher: New York : John Wiley & Sons, 1999Availability: Items available for loan: IUKL Library [Call number: QA76.9 Gol] (1).
Add to cart (remove)
|
|
Critical infrastructure protection in homeland security : defending a networked nation / Ted G. Lewis.
by Lewis, T. G. (Theodore Gyle), 1941-. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Hoboken, N.J. : Wiley-Interscience, c2006Availability: Items available for reference: IUKL Library [Call number: QA76.9 Lew] (2).
Add to cart (remove)
|
|
Cryptography and public key infrastructure on the Internet / Klaus Schmeh.
by Schmeh, Klaus. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Chichester, West Sussex, England : Wiley, c2003Availability: Items available for loan: eLibrary (branch) [Call number: QA76.9 Sch] (1).
Add to cart (remove)
|
|
Cyber attacks : protecting national infrastructure / Edward G Amoroso, John R Vacca
by Amoroso, Edward G | Vacca, John R. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Waltham, MA : Butterworth-Heinemann, 2013Availability: Items available for loan: eLibrary (branch) [Call number: HV6773.2 Amo] (1).
Add to cart (remove)
|
|
Cyber security and IT infrastructure protection / edited by John R. Vacca.
by Vacca, John R. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Waltham, MA : Syngress is an imprint of Elsevier, 2014Other title: Cyber security and information technology infrastructure protection.Availability: Items available for loan: eLibrary (branch) [Call number: QA76.9 Cyb] (1).
Add to cart (remove)
|
|
Firewalls and VPNs : principles and practices / Richard W. Tibbs, Edwards B, Oakes.
by Tibbs, Richard | Oakes, Edward B. Edition: 1st ed.Material type: Book Publisher: New Jersey : Prentice Hall, 2006Availability: Items available for loan: IUKL Library [Call number: QA76.9 Tib] (1). Items available for reference: IUKL Library [Call number: QA76.9 Tib] (1).
Add to cart (remove)
|
|
Fundamentals of network security.
by Maiwald, Eric. Material type: Book Publisher: New York : McGraw Hill, 2004Availability: Items available for loan: IUKL Library [Call number: TK5105.59 Mai] (2). Items available for reference: IUKL Library [Call number: TK5105.59 Mai] (1).
Add to cart (remove)
|
|
Global terrorism and new media : the post-Al Qaeda generation / Philip Seib and Dana M. Janbek.
by Seib, Philip M, 1949- | Janbek, Dana M. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: London : Routledge, 2011Availability: Items available for loan: IUKL Library [Call number: P96 Sei] (1).
Add to cart (remove)
|
|
Guide to network defense and countermeasures / Randy Weaver, Dawn Weaver, Dean Farwood.
by Weaver, Randy | Farwood, Dean | Weaver, Dawn. Edition: 3rd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Australia ; Boston, MA, USA : Course Technology, Cengage Learning, [2014] ©2014Availability: Items available for loan: IUKL Library [Call number: TK5105.59 Wea] (1). Items available for reference: IUKL Library [Call number: TK5105.59 Wea] (1).
Add to cart (remove)
|
|
Hack notes web security portable refernce.
by Shema, Mike. Material type: Book Publisher: Singapore : McGraw Hill, 2003Availability: Items available for loan: IUKL Library [Call number: QA76.9 She] (1).
Add to cart (remove)
|
|
Handbook on securing cyber-physical critical infrastructure : foundation and challenges / Sajal Das, Krishna Kant, Nan Zhang
by Das, Sajal K | Kant, Krishna | Zhang, Nan, 1982-. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Waltham, MA : Morgan Kaufmann, c2012Availability: Items available for loan: IUKL Library [Call number: TK5105.59 Han] (1).
Add to cart (remove)
|
|
Information Assurance Architecture.
by Willett, Keith D. Edition: 1st.Material type: Book Publisher: Boca Raton : CRC Press, 2008Availability: Items available for loan: IUKL Library [Call number: QA76.9 Wil] (1). Items available for reference: IUKL Library [Call number: QA76.9 Wil] (1).
Add to cart (remove)
|
|
Information security and ethics : social and organizational issues / Marian Quigley [editor]
by Quigley, Marian edt. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Hershey : IRM Press, c2005Availability: Items available for loan: IUKL Library [Call number: T14.5 Inf] (1).
Add to cart (remove)
|
|
Inside network security assessment : guarding your IT infrastructure / Michael Gregg, David Kim.
by Gregg, Michael (Michael C.) | Kim, David. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Indianapolis, Ind. : Sams, c2006Availability: Items available for loan: IUKL Library [Call number: TK5105.59 Gre] (1). Items available for reference: IUKL Library [Call number: TK5105.59 Gre] (1).
Add to cart (remove)
|
|
Internet firewalls and network security.
by Hare, Chris | Siyan, Karanjit. Material type: Book Publisher: Indianapolis : New York Institute, 1996Availability: Items available for loan: IUKL Library [Call number: TK5105.875 Har] (1).
Add to cart (remove)
|
|
IT compliance and controls : best practices for implementation / James J. Deluccia IV.
by Deluccia, James J, 1977-. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Hoboken, N.J. : John Wiley & Sons, c2008Availability: Items available for loan: IUKL Library [Call number: HD30.2 Del] (1).
Add to cart (remove)
|
|
Java 2 network security.
by Gupta, Deepak | Pistoia, Marco | Reller, Duane F | Nagnur, Milind | Ramani. Material type: Book Publisher: New Jersey : Prentice Hall, 1999Availability: Items available for loan: IUKL Library [Call number: TK5105.5 Gup] (1).
Add to cart (remove)
|
|
Java security.
by Oaks, Scott. Material type: Book Publisher: Cambridge : O'Reilly, 2001Availability: Items available for loan: IUKL Library [Call number: QA76.73 Oak] (1).
Add to cart (remove)
|
|
Network security bible / [by] Eric Cole, Ronald Krutz, and James W. Conley.
by Cole, Eric | Krutz, Ronald L | Conley, James W. Edition: 2nd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Indianapolis, IN : Wiley Pub., 2009Availability: Items available for loan: IUKL Library [Call number: QA76.9 Col] (2). Items available for reference: IUKL Library [Call number: QA76.9 Col] (1).
Add to cart (remove)
|
|
Network security essential applications and standards.
by Stallings,William. Edition: 3rd.Material type: Book Publisher: New Jersey : Prentice Hall, 2007Availability: Items available for loan: IUKL Library [Call number: TK5105.59 Sta] (2). Items available for reference: IUKL Library [Call number: TK5105.59 Sta] (1).
Add to cart (remove)
|
|
Network security essentials - applications and standards.
by Stallings, William. Material type: Book Publisher: New Jersey : Prentice Hall, 1999Availability: Items available for loan: IUKL Library [Call number: TK5105.59 Sta] (1).
Add to cart (remove)
|
|
Network security essentials : applications and standards / William Stallings.
by Stallings, William. Edition: 5th ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston : Pearson, [2014] Availability: Items available for loan: IUKL Library [Call number: TK5105.59 Sta] (1). Items available for reference: IUKL Library [Call number: TK5105.59 Sta] (1).
Add to cart (remove)
|
|
Network security principles and practices / Saadat Malik
by Malik, Saadat. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Great Britain : Cisco, 2003Availability: Items available for loan: IUKL Library [Call number: TK5105.59 Mal] (1). Items available for reference: IUKL Library [Call number: TK5105.59 Mal] (1).
Add to cart (remove)
|
|
Public key infrastructure : implementation and design / Suranjan Choudhury, Kartik Bhatnagar, and Wasim Haque.
by Choudhury, Suranjan | Haque, Wasim | Bhatnagar, Kartik. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York, NY : M&T Books, c2002Availability: Items available for loan: eLibrary (branch) [Call number: HD30.38 Cho] (1).
Add to cart (remove)
|
|
Secrets and lies : digital security in a networked world.
by Schneier, Bruce. Material type: Book Publisher: New York : John Wiley & Sons, 2000Availability: Items available for loan: IUKL Library [Call number: QA76.9 Sch] (1).
Add to cart (remove)
|
|
Secrets and lies : digital security in a networked world.
by Schneier, Bruce. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York : John Wiley & Sons, 2000Availability: Items available for reference: IUKL Library [Call number: QA76.9 Sch] (1).
Add to cart (remove)
|
|
Security in computing.
by Pfleeger, Charles P. Material type: Book Publisher: New Jersey : Prentice Hall, 1997Availability: Items available for loan: IUKL Library [Call number: QA76.9 Pfl] (1). Checked out (1).
Add to cart (remove)
|
|
Security in computing.
by Pfleeger, Charles P. Edition: 2nd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Upper Saddle River : Prentice Hall, 1997Availability: No items available Checked out (1).
Add to cart (remove)
|
|
Security in fixed and wireless networks : an introduction to securing data communications / Günter Schäfer ; translated by Hedwig Jourdan von Schmoeger.
by Schäfer, Günter. Publisher: Chichester ; Wiley, c2003Availability: Items available for loan: IUKL Library [Call number: TK5105.59 Sch] (1). Items available for reference: IUKL Library [Call number: TK5105.59 Sch] (1).
Add to cart (remove)
|
|
Security issues of IT outsourcing guest editors: Sokratis K. Katsikas and Stefanos Gritzalis.
by Gritzalis, Stefanos | Katsikas, Sokratis | ebrary, Inc. Material type: Book; Format:
electronic
; Literary form:
Not fiction
Publisher: Bradford, England : Emerald Group Publishing, c2006Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan: IUKL Library [Call number: T58.64] (1).
Add to cart (remove)
|
|
Security patterns : integrating security and systems engineering / Markus Schumacher ... [et al.].
by Schumacher, Markus. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Chichester, England : John Wiley & Sons, c2006Availability: Items available for reference: IUKL Library [Call number: QA76.9 Sec] (1).
Add to cart (remove)
|
|
Security+ Guide to Network Security Fundamentals.
by Ciampa, Mark. Edition: 3rd.Material type: Book Publisher: Australia : [s.n.], 2009Availability: Items available for reference: IUKL Library [Call number: TK5105.59 Cia] (1).
Add to cart (remove)
|
|
TCP/IP : Architecture, protocols and implementation with IPv6 and IP security.
by Feit, Sidnie. Material type: Book Publisher: New York : McGraw Hill, 1998Availability: Items available for loan: IUKL Library [Call number: TK5105.585 Fei] (1).
Add to cart (remove)
|
|
The software vulnerability guide Herbert H. Thompson, Scott G. Chase.
by Thompson, Herbert H | Chase, Scott G | ebrary, Inc. Edition: 1st ed.Material type: Book; Format:
electronic
; Literary form:
Not fiction
Publisher: Hingham, Mass. : Charles River Media, 2005Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for reference: IUKL Library [Call number: QA76.9 Tho] (1).
Add to cart (remove)
|
|
VMware vSphere and virtual infrastructure security : securing the virtual environment / Edward L. Haletky.
by Haletky, Edward. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Upper Saddle River, NJ. : Prentice Hall, c2009Availability: Items available for loan: IUKL Library [Call number: QA76.9 Hal] (1).
Add to cart (remove)
|
|
VPN applications guide : real solutions for enterprise networks.
by McDysan, David. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York : John Wiley, 2000Availability: Items available for loan: IUKL Library [Call number: TK5105.875 Mcd] (1).
Add to cart (remove)
|
|
Web security : a step-by-step reference guide.
by Stein, Lincoln D. Material type: Book Publisher: Massachusetts : Addison-Wesley, 1997Availability: Items available for loan: IUKL Library [Call number: TK5105.59 Ste] (1).
Add to cart (remove)
|