IUKL Library

20160628 MQA BMM (Computer Security) Subscribe to this list

| Select titles to:
ISA Server 2004 unleashed / Michael Noel.

by Noel, Michael.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Indianapolis, Ind. : Sams, c2006Availability: Items available for loan: IUKL Library [Call number: TK5105.8 Isa] (1). Log in to add tags.
Administering Windows Vista security : the big surprises .

by Minasi, Mark | Hynes, Byron.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Indianapolis, IN : Wiley Publishing, Inc., 2007Availability: Items available for loan: IUKL Library [Call number: QA76.9 Min] (1).
Applied Crytography.

by Schneier, Bruce.

Material type: book Book Publisher: New York : John Wiley & Sons, 1996Availability: Items available for reference: IUKL Library [Call number: QA76.9 Sch] (1).
Auditing IT infrastructures for compliance / Martin M. Weiss and Michael G. Solomon.

by Weiss, Martin (Martin M.) | Solomon, Michael G.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Sudbury, MA : Jones & Bartlett Learning c2011Availability: Items available for loan: IUKL Library [Call number: QA76.9 Wei] (1).
Beginning cryptography with Java. David Hook.

by Hook, David.

Publisher: Indianapolis : Wiley Pub, 2005Availability: Items available for loan: IUKL Library [Call number: QA76.9 Hoo] (4). Items available for reference: IUKL Library [Call number: QA76.9 Hoo] (1).
Business data communications : infastructure, networking and security/ William Stallings... [et.al.].

by Stallings, William | Case, Thomas | Bhattacharjee, Arup Kumar | Mukherjee, Soumen.

Edition: 7th ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston, [Massachusetts] : Pearson, [2013]Availability: Items available for loan: IUKL Library [Call number: HF5548.2 Bus] (1).
Computer forensics computer crime scene investigation / John R. Vacca.

by Vacca, John R | ebrary, Inc.

Edition: 2nd ed.Material type: book Book; Format: electronic ; Literary form: Not fiction Publisher: Hingham, Mass. : Charles River Media, 2005Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan: IUKL Library [Call number: QA76.9 Vac] (1).
Computer forensics : incident response essentials / Warren G. Kruse II, Jay G. Heiser.

by Kruse, Warren G | Heiser, Jay G.

Material type: book Book Publisher: Boston, M.A. : Addison-Wesley, 2002Availability: Items available for loan: IUKL Library [Call number: QA76.9 Kru] (2). Items available for reference: IUKL Library [Call number: QA75.9 Kru] (1).
Computer security / by the editors of Time-Life Books

by Time-Life Books.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Alexandria, Va. : Time-Life Books, c1986Availability: Items available for loan: IUKL Library [Call number: QA76.9 Com] (1).
Computer security fundamentals / Chuck Easttom.

by Easttom, Chuck.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Indianapolis, Ind. : Pearson, c2012Availability: Items available for loan: IUKL Library [Call number: QA76.9 Eas] (1). Items available for reference: IUKL Library [Call number: QA76.9 Eas] (1).
Computer security fundamentals.

by Easttom, Chuck.

Material type: book Book Publisher: New Jersey : Prentice Hall, 2006Availability: Items available for loan: IUKL Library [Call number: QA76.9 Eas] (3).
Computer security.

by Gollmann, Dieter.

Material type: book Book Publisher: New York : John Wiley & Sons, 1999Availability: Items available for loan: IUKL Library [Call number: QA76.9 Gol] (1).
Critical infrastructure protection in homeland security : defending a networked nation / Ted G. Lewis.

by Lewis, T. G. (Theodore Gyle), 1941-.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Hoboken, N.J. : Wiley-Interscience, c2006Availability: Items available for reference: IUKL Library [Call number: QA76.9 Lew] (2).
Cryptography and public key infrastructure on the Internet / Klaus Schmeh.

by Schmeh, Klaus.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Chichester, West Sussex, England : Wiley, c2003Availability: Items available for loan: eLibrary (branch) [Call number: QA76.9 Sch] (1).
Cyber attacks : protecting national infrastructure / Edward G Amoroso, John R Vacca

by Amoroso, Edward G | Vacca, John R.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Waltham, MA : Butterworth-Heinemann, 2013Availability: Items available for loan: eLibrary (branch) [Call number: HV6773.2 Amo] (1).
Cyber security and IT infrastructure protection / edited by John R. Vacca.

by Vacca, John R.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Waltham, MA : Syngress is an imprint of Elsevier, 2014Other title: Cyber security and information technology infrastructure protection.Availability: Items available for loan: eLibrary (branch) [Call number: QA76.9 Cyb] (1).
Firewalls and VPNs : principles and practices / Richard W. Tibbs, Edwards B, Oakes.

by Tibbs, Richard | Oakes, Edward B.

Edition: 1st ed.Material type: book Book Publisher: New Jersey : Prentice Hall, 2006Availability: Items available for loan: IUKL Library [Call number: QA76.9 Tib] (1). Items available for reference: IUKL Library [Call number: QA76.9 Tib] (1).
Fundamentals of network security.

by Maiwald, Eric.

Material type: book Book Publisher: New York : McGraw Hill, 2004Availability: Items available for loan: IUKL Library [Call number: TK5105.59 Mai] (2). Items available for reference: IUKL Library [Call number: TK5105.59 Mai] (1).
Global terrorism and new media : the post-Al Qaeda generation / Philip Seib and Dana M. Janbek.

by Seib, Philip M, 1949- | Janbek, Dana M.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: London : Routledge, 2011Availability: Items available for loan: IUKL Library [Call number: P96 Sei] (1).
Guide to network defense and countermeasures / Randy Weaver, Dawn Weaver, Dean Farwood.

by Weaver, Randy | Farwood, Dean | Weaver, Dawn.

Edition: 3rd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Australia ; Boston, MA, USA : Course Technology, Cengage Learning, [2014] ©2014Availability: Items available for loan: IUKL Library [Call number: TK5105.59 Wea] (1). Items available for reference: IUKL Library [Call number: TK5105.59 Wea] (1).
Hack notes web security portable refernce.

by Shema, Mike.

Material type: book Book Publisher: Singapore : McGraw Hill, 2003Availability: Items available for loan: IUKL Library [Call number: QA76.9 She] (1).
Handbook on securing cyber-physical critical infrastructure : foundation and challenges / Sajal Das, Krishna Kant, Nan Zhang

by Das, Sajal K | Kant, Krishna | Zhang, Nan, 1982-.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Waltham, MA : Morgan Kaufmann, c2012Availability: Items available for loan: IUKL Library [Call number: TK5105.59 Han] (1).
Information Assurance Architecture.

by Willett, Keith D.

Edition: 1st.Material type: book Book Publisher: Boca Raton : CRC Press, 2008Availability: Items available for loan: IUKL Library [Call number: QA76.9 Wil] (1). Items available for reference: IUKL Library [Call number: QA76.9 Wil] (1).
Information security and ethics : social and organizational issues / Marian Quigley [editor]

by Quigley, Marian edt.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Hershey : IRM Press, c2005Availability: Items available for loan: IUKL Library [Call number: T14.5 Inf] (1).
Inside network security assessment : guarding your IT infrastructure / Michael Gregg, David Kim.

by Gregg, Michael (Michael C.) | Kim, David.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Indianapolis, Ind. : Sams, c2006Availability: Items available for loan: IUKL Library [Call number: TK5105.59 Gre] (1). Items available for reference: IUKL Library [Call number: TK5105.59 Gre] (1).
Internet firewalls and network security.

by Hare, Chris | Siyan, Karanjit.

Material type: book Book Publisher: Indianapolis : New York Institute, 1996Availability: Items available for loan: IUKL Library [Call number: TK5105.875 Har] (1).
IT compliance and controls : best practices for implementation / James J. Deluccia IV.

by Deluccia, James J, 1977-.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Hoboken, N.J. : John Wiley & Sons, c2008Availability: Items available for loan: IUKL Library [Call number: HD30.2 Del] (1).
Java 2 network security.

by Gupta, Deepak | Pistoia, Marco | Reller, Duane F | Nagnur, Milind | Ramani.

Material type: book Book Publisher: New Jersey : Prentice Hall, 1999Availability: Items available for loan: IUKL Library [Call number: TK5105.5 Gup] (1).
Java security.

by Oaks, Scott.

Material type: book Book Publisher: Cambridge : O'Reilly, 2001Availability: Items available for loan: IUKL Library [Call number: QA76.73 Oak] (1).
Network security bible / [by] Eric Cole, Ronald Krutz, and James W. Conley.

by Cole, Eric | Krutz, Ronald L | Conley, James W.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Indianapolis, IN : Wiley Pub., 2009Availability: Items available for loan: IUKL Library [Call number: QA76.9 Col] (2). Items available for reference: IUKL Library [Call number: QA76.9 Col] (1).
Network security essential applications and standards.

by Stallings,William.

Edition: 3rd.Material type: book Book Publisher: New Jersey : Prentice Hall, 2007Availability: Items available for loan: IUKL Library [Call number: TK5105.59 Sta] (2). Items available for reference: IUKL Library [Call number: TK5105.59 Sta] (1).
Network security essentials - applications and standards.

by Stallings, William.

Material type: book Book Publisher: New Jersey : Prentice Hall, 1999Availability: Items available for loan: IUKL Library [Call number: TK5105.59 Sta] (1).
Network security essentials : applications and standards / William Stallings.

by Stallings, William.

Edition: 5th ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston : Pearson, [2014] Availability: Items available for loan: IUKL Library [Call number: TK5105.59 Sta] (1). Items available for reference: IUKL Library [Call number: TK5105.59 Sta] (1).
Network security principles and practices / Saadat Malik

by Malik, Saadat.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Great Britain : Cisco, 2003Availability: Items available for loan: IUKL Library [Call number: TK5105.59 Mal] (1). Items available for reference: IUKL Library [Call number: TK5105.59 Mal] (1).
Public key infrastructure : implementation and design / Suranjan Choudhury, Kartik Bhatnagar, and Wasim Haque.

by Choudhury, Suranjan | Haque, Wasim | Bhatnagar, Kartik.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York, NY : M&T Books, c2002Availability: Items available for loan: eLibrary (branch) [Call number: HD30.38 Cho] (1).
Secrets and lies : digital security in a networked world.

by Schneier, Bruce.

Material type: book Book Publisher: New York : John Wiley & Sons, 2000Availability: Items available for loan: IUKL Library [Call number: QA76.9 Sch] (1).
Secrets and lies : digital security in a networked world.

by Schneier, Bruce.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York : John Wiley & Sons, 2000Availability: Items available for reference: IUKL Library [Call number: QA76.9 Sch] (1).
Security in computing.

by Pfleeger, Charles P.

Material type: book Book Publisher: New Jersey : Prentice Hall, 1997Availability: Items available for loan: IUKL Library [Call number: QA76.9 Pfl] (1). Checked out (1).
Security in computing.

by Pfleeger, Charles P.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Upper Saddle River : Prentice Hall, 1997Availability: No items available Checked out (1).
Security in fixed and wireless networks : an introduction to securing data communications / Günter Schäfer ; translated by Hedwig Jourdan von Schmoeger.

by Schäfer, Günter.

Publisher: Chichester ; Wiley, c2003Availability: Items available for loan: IUKL Library [Call number: TK5105.59 Sch] (1). Items available for reference: IUKL Library [Call number: TK5105.59 Sch] (1).
Security issues of IT outsourcing guest editors: Sokratis K. Katsikas and Stefanos Gritzalis.

by Gritzalis, Stefanos | Katsikas, Sokratis | ebrary, Inc.

Material type: book Book; Format: electronic ; Literary form: Not fiction Publisher: Bradford, England : Emerald Group Publishing, c2006Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan: IUKL Library [Call number: T58.64] (1).
Security patterns : integrating security and systems engineering / Markus Schumacher ... [et al.].

by Schumacher, Markus.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Chichester, England : John Wiley & Sons, c2006Availability: Items available for reference: IUKL Library [Call number: QA76.9 Sec] (1).
Security+ Guide to Network Security Fundamentals.

by Ciampa, Mark.

Edition: 3rd.Material type: book Book Publisher: Australia : [s.n.], 2009Availability: Items available for reference: IUKL Library [Call number: TK5105.59 Cia] (1).
TCP/IP : Architecture, protocols and implementation with IPv6 and IP security.

by Feit, Sidnie.

Material type: book Book Publisher: New York : McGraw Hill, 1998Availability: Items available for loan: IUKL Library [Call number: TK5105.585 Fei] (1).
The software vulnerability guide Herbert H. Thompson, Scott G. Chase.

by Thompson, Herbert H | Chase, Scott G | ebrary, Inc.

Edition: 1st ed.Material type: book Book; Format: electronic ; Literary form: Not fiction Publisher: Hingham, Mass. : Charles River Media, 2005Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for reference: IUKL Library [Call number: QA76.9 Tho] (1).
VMware vSphere and virtual infrastructure security : securing the virtual environment / Edward L. Haletky.

by Haletky, Edward.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Upper Saddle River, NJ. : Prentice Hall, c2009Availability: Items available for loan: IUKL Library [Call number: QA76.9 Hal] (1).
VPN applications guide : real solutions for enterprise networks.

by McDysan, David.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York : John Wiley, 2000Availability: Items available for loan: IUKL Library [Call number: TK5105.875 Mcd] (1).
Web security : a step-by-step reference guide.

by Stein, Lincoln D.

Material type: book Book Publisher: Massachusetts : Addison-Wesley, 1997Availability: Items available for loan: IUKL Library [Call number: TK5105.59 Ste] (1).
Log in to create new lists.
The Library's homepage is at http://library.iukl.edu.my/.