My Library

   
Limit search to available items
22 results found. sorted by date .
Add Marked to Bag Add All On Page Add Marked to My Lists
Keywords (1-22 of 22)
1
Book
Book Cover

Governing new frontiers in the information age : toward cyber peace


Shackelford, Scott J.
Cambridge, United Kingdom : Cambridge University Press, 2022. 2022

Rating:

 

Copies

Location Call No. Status
 Male Library  KZ6718.S535 2022    Available
2
Book
Book Cover

Internet of things : threats, landscape, and countermeasures



Boca Raton : CRC Press, 2021. 2021

Rating:

 

Copies

Location Call No. Status
 Male Library  TK5105.8857 .I657 2021    Available
 Male Library  TK5105.8857 .I657 2021 c.2  Available
 Female Library  TK5105.8857 .I657 2021    Available
There are additional copies/volumes of this item
3
---
Book Cover

Practical IoT hacking : the definitive guide to attacking the internet of things


Chantzis, Fotios
San Francisco : No Starch Press, Inc., 2021. 2021

Rating:

 

Copies

Location Call No. Status
 Male Library  TK5105.8857.C533 2021    Available
 Female Library  TK5105.8857.C533 2021    Available
4
Text-Book
Book Cover

Identity management for internet of things


Mahalle, Parikshit N.
Aalborg, Denmark : River Publishers, 2015. 2015

Rating:

 

Copies

Location Call No. Status
 Male Library  QA76.5915.M34 2015    Available
 Female Library  QA76.5915.M34 2015    Available
5
Book
Book Cover

Security strategies in Web applications and social networking


Harwood, Mike
Sudbury, MA : Jones & Bartlett Learning, 2011 2011

Rating:

 

Copies

Location Call No. Status
 Female Library  HM742 H38 2011    Available
 Female Library  HM742 H38 2011 c.2  Available
 Female Library  HM742 H38 2011 c.3  Available
There are additional copies/volumes of this item
6
Book
Book Cover

Copies

Location Call No. Status
 Female Library  HM742 L23 2011    Available
 Female Library  HM742 L23 2011 c.2  Available
7
Book
Book Cover

Guide to network defense and countermeasures


Weaver, Randy
Boston : Thomson/Course technology, 2007 2007

Rating:

 

Copies

Location Call No. Status
 Female Library  TK5105.59 W33 2007    Available
8
Book
Book Cover

Network security essentials : applications and standards


Stallings, William
Upper Saddle River, NJ. : Pearson International Education/Prentice Hall , 2007 2007

Rating:

 

Copies

Location Call No. Status
 Female Library  TK5105.59 S73 2007    Available
9
Book
Book Cover

Network security essentials : applications and standards


Stallings, William
Upper Saddle River, NJ. : Prentice Hall , 2003 2003

Rating:

 

Copies

Location Call No. Status
 Female Library  TK5105.59 S73 2003    Available
 Female Library  TK5105.59 S73 2003 c.2  Available
10
Book
Book Cover

Cryptography and network security : principles and practice


Stallings, William
Upper Saddle River, N.J. : Prentice Hall International, 2003 2003

Rating:

 

Copies

Location Call No. Status
 Female Library  TK5105.59 S713 2003    Available
 Female Library  TK5105.59 S713 2003 c.2  Available
 Male Library  TK5105.59 S713 2003    Available
There are additional copies/volumes of this item
11
Book
Book Cover

Network security principles and practices


Malik, Saadat
Indianapolis, Ind. : Cisco, 2003 2003

Rating:

 

Copies

Location Call No. Status
 Female Library  TK5105.59 M34 2003    Available
12
Book
Book Cover

Counter hack : a step-by-step guide to computer attacks and effective defenses


Skoudis, Ed
Upper Saddle River, N.J. : Prentice Hall PTR, 2002 2002

Rating:

 

Copies

Location Call No. Status
 Female Library  TK5105.59 S57 2002    Available
 Male Library  TK5105.59 S57 2002    Available
13
Book
Book Cover

Check point fire wall - 1 administration and CCSA study guide


Dangerfield, Steven
Upper Saddle River N.J. : Prentice Hall, 2002 2002

Rating:

 

Copies

Location Call No. Status
 Female Library  QA76.9A25 D33 2002    Available
 Female Library  QA76.9A25 D33 2002 c.2  Available
14
Book
Book Cover

Hacking exposed : network security secrets & solutions


Scambray, Joel
Berkeley, Calif. : Osborne/McGraw-Hill, 2001. 2001

Rating:

 

Copies

Location Call No. Status
 Female Library  TK5105.59 M48 2001    Available
15
Book
Book Cover

Copies

16
Book
Book Cover

Building Internet firewalls


Zwicky, Elizabeth D
Beijing ; Cambridge [Mass.] : O'Reilly, c2000. 2000

Rating:

 

Copies

Location Call No. Status
 Female Library  TK5105.59 .Z85 2000    Available
17
Book
Book Cover

Inside internet security : What hackers dont want you to know...


Crume, Jeff
Harlow (England) : Addison-Wesley , 2000 2000

Rating:

 

Copies

Location Call No. Status
 Female Library  TK5105.59 C78 2000    Available
 Female Library  TK5105.59 C78 2000 c.2  Available
18
Book
Book Cover

The process of network security : designing and managing a safe network


Wadlow, Thomas A
Reading, Mass. : Addison Wesley, 2000 2000

Rating:

 

Copies

19
Book
Book Cover

Intranet security : stories from the trenches


McCarthy, Linda
Mountainview, Calif. : Sun Microsystems Press, 1998. 1998

Rating:

 

Copies

20
Book
Book Cover

E-commerce security : weak links, best defenses


Ghosh, Anup K
New York : John Wiley, 1998. 1998

Rating:

Copies

Location Call No. Status
 Female Library  HF5548.32 .G48 1998    Available
21
Book
Book Cover

Internet and TCP/IP network security : securing protocols and applications


Pabrai, Uday O
New York : McGraw-Hill, c1996. 1996

Rating:

 

Copies

22
Book
Book Cover

Building secure and reliable network applications


Birman, kenneth P
Greenwish : Manning , 1996. 1996

Rating:

 

Copies

Location Call No. Status
 Female Library  TK5105.59 B57 1996    Available
Add Marked to Bag Add All On Page Add Marked to My Lists
Resources
More Information