My Library

   
Limit search to available items
109 results found. sorted by date .
Result Page   Prev 1 2 3 Next  
Add Marked to Bag Add All On Page Add Marked to My Lists
Keywords (51-100 of 109)
51
Book
Book Cover

Cybersecurity : the essential body of knowledge


Shoemaker, Dan
Boston, MA : Course Technology Cengage Learning, 2012 2012

Rating:

 

Copies

Location Call No. Status
 Male Library  QA76.9.A25 S56 2012    Available
 Female Library  QA76.9.A25 S56 2012    Available
52
Book
Book Cover

Cryptography and network security : principles and practice


Stallings, William
Boston : Prentice Hall, c2011 2011

Rating:

 

Copies

Location Call No. Status
 Female Library  TK5105.59 .S713 2011    Available
 Male Library  TK5105.59 .S713 2011    Available
53
Text-Book
Book Cover

IT auditing : using controls to protect information assets


Kegerreis, Mike
New York : McGraw-Hill, c2020. 2011

Rating:

 

Copies

Location Call No. Status
 Male Library  QA76.9.A93 K44 2020    Available
 Male Library  QA76.9.A93 K44 2020 c.2  Available
 Female Library  QA76.9.A93 K44 2020    Available
There are additional copies/volumes of this item
54
Book
Book Cover

Corporate computer and network security


Panko, R. R
Boston : Prentice Hall, 2010 2010

Rating:

 

Copies

Location Call No. Status
 Female Library  QA76.9.A25 P36 2010    Available
55
Book
Book Cover

The management of network security : technology, design, and management control


Carr, Houston H., 1937-
Upper Saddle River, N.J. : Prentice Hall, 2010 2010

Rating:

 

Copies

Location Call No. Status
 Female Library  TK5105.59 C3655 2010    Available
 Female Library  TK5105.59 C3655 2010 c.2  Available
56
Book
Book Cover

CCNA Cisco certified network associate security study guide (Exam 640-553)


Deal, Richard A
San Francisco : McGraw-Hill Professional, 2009 2009

Rating:

 

Copies

Location Call No. Status
 Female Library  TK5105.59 D428 2009    Available
57
Book
Book Cover

Guide to firewalls and network security : intrusion detection and VPNs.



Clifton Park, N.Y. : Course Technology/Cengage Learning, 2009 2009

Rating:

 

Copies

Location Call No. Status
 Female Library  TK5105.59 G85 2009    Available
58
Book
Book Cover

Security+ guide to network security fundamentals


Ciampa, Mark
Boston, MA : Course Technology, 2009 2009

Rating:

 

Copies

Location Call No. Status
 Female Library  QA76.9.A25 C35 2009    Available
59
Book
Book Cover

Principles of information security


Whitman, Michael E. 1964-
Boston, Mass. : Course Technology Cengage Learning , 2009 2009

Rating:

 

Copies

Location Call No. Status
 Female Library  TK5105.59 W54 2009    Available
60
Book
Book Cover

cryptography and network security


Forouzan, Behrouz A
Boston : McGraw-Hill Higher Education, 2008 2008

Rating:

Copies

Location Call No. Status
 Female Library  TK5105.59 F672 2008    Available
 Male Library  TK5105.59 F672 2008    Available
61
Book
Book Cover

Router security strategies : securing IP network traffic planes


Schudel, Gregg
Indianapolis, Ind. : Cisco Press, 2008 2008

Rating:

 

Copies

Location Call No. Status
 Female Library  TK5105.543 S38 2008    Available
62
Book
Book Cover

Computer security : principles and practice


Stallings, William
Upper Saddle River, N.J. : Prentice Hall, 2008 2008

Rating:

 

Copies

Location Call No. Status
 Female Library  QA76.9.A25 S685 2008    Available
63
Book
Book Cover

End-to-end network security : defense-in-depth


Santos, Omar
Indianapolis, Ind. : Cisco Press, 2008 2008

Rating:

Copies

Location Call No. Status
 Female Library  TK5105.59 S313 2008    Available
64
Book
Book Cover

Guide to network defense and countermeasures


Weaver, Randy
Boston : Thomson/Course technology, 2007 2007

Rating:

 

Copies

Location Call No. Status
 Female Library  TK5105.59 W33 2007    Available
65
Book
Book Cover

Network security essentials : applications and standards


Stallings, William
Upper Saddle River, NJ. : Pearson International Education/Prentice Hall , 2007 2007

Rating:

 

Copies

Location Call No. Status
 Female Library  TK5105.59 S73 2007    Available
66
Book
Book Cover

Data communications and network security


Carr, Houston H., 1937-
Boston : McGraw-Hill Irwin, 2007 2007

Rating:

 

Copies

Location Call No. Status
 Female Library  TK5105.59 C365 2007    Available
67
Book
Book Cover

Computer security


Gollmann, Dieter
Chichester, England ; Hoboken, NJ : Wiley, 2006 2006

Rating:

 

Copies

Location Call No. Status
 Female Library  QA76.9.A25 G65 2006    Available
68
Book
Book Cover

Cryptography and network security : principles and practice


Stallings, William
Upper Saddle River, N.J. : Pearson/Prentice Hall, 2006 2006

Rating:

Copies

Location Call No. Status
 Female Library  TK5105.59 S713 2006    Available
 Female Library  TK5105.59 S713 2006 c.2  Available
 Male Library  TK5105.59 S713 2006    Available
69
Book
Book Cover

Computer security fundamentals


Easttom, Chuck
Upper Saddle River, NJ : Pearson Prentice Hall, 2006 2006

Rating:

 

Copies

Location Call No. Status
 Female Library  QA76.9.A25 E27 2006    Available
70
Book
Book Cover

Network defense and countermeasures : principles and practices


Easttom, Chuck
Upper Saddle River, N.J. : Pearson Prentice Hall, 2006 2006

Rating:

 

Copies

Location Call No. Status
 Female Library  TK5105.59 E26 2006    Available
71
Book
Book Cover

Copies

Location Call No. Status
 Female Library  QA76.9.A25 M35 2006    Available
72
Book
Book Cover

Readings and cases in the management of information security


Whitman, Michael E. 1964-
Boston, Mass. ; Canada : Thomson Course Technology, 2006 2006

Rating:

 

Copies

Location Call No. Status
 Female Library  TK5105.59 W45 2006    Available
73
Book
Book Cover

Computer forensics : principles and practices


Volonino, Linda
Upper Saddle River, N.J. : Pearson/Prentice Hall, 2006 2006

Rating:

 

Copies

Location Call No. Status
 Female Library  QA76.9.A25 V59145 2006    Available
74
Book
Book Cover

Information security : principles and practices


Merkow, Mark S
Upper Saddle River, N.J. : Pearson Prentice Hall, 2006 2006

Rating:

Copies

Location Call No. Status
 Female Library  QA76.9.A25 M485 2006    Available
75
Book
Book Cover

Anti-hacker tool kit



New York : McGraw-Hill/Osborne, 2006 2006

Rating:

 

Copies

Location Call No. Status
 Female Library  TK5105.59 J65 2006    Available
76
Book
Book Cover

Guide to computer forensics and investigations


Nelson, Bill
Boston, Mass. : Thomson Course Technology, 2006 2006

Rating:

 

Copies

Location Call No. Status
 Female Library  QA76.9.A25 N45 2006    Available
77
Book
Book Cover

Information security illuminated


Solomon, Michael, 1963-
Sudbury, MA : Jones and Bartlett, 2005 2005

Rating:

 

Copies

Location Call No. Status
 Female Library  QA76.9.A25 C435 2005 c.2  Available
78
Book
Book Cover

Cryptographiy,information theory,and error-correction : a handbook for 21st century


Bruen, Aiden A., 1941-
New Jersey : A John wiley & sons,INC.,publication., 2005 2005

Rating:

 

Copies

Location Call No. Status
 Female Library  QA76.9.A25 B79 2005    Available
79
Book
Book Cover

Principles of information security


Whitman, Michael E. 1964-
Boston, Mass. : [London] : Thomson Course Technology, 2005 2005

Rating:

 

Copies

Location Call No. Status
 Female Library  TK5105.59 W55 2005    Available
80
Book
Book Cover

Network security fundamentals


Laet, Gert De
Indianapolis, Ind. : Cisco, 2005 2005

Rating:

 

Copies

Location Call No. Status
 Female Library  TK5105.59 L34 2005    Available
81
Book
Book Cover

Introduction to computer security


Bishop, Matt (Matthew A.)
Boston : Addison-Wesley, 2005 2005

Rating:

Copies

Location Call No. Status
 Female Library  QA76.9.A25 B563 2005    Available
82
Book
Book Cover

Network security first-step


Thomas, Thomas M
Indianapolis, IN : Cisco Press, c2004 2004

Rating:

 

Copies

Location Call No. Status
 Female Library  TK5105.59.T43 2004    Available
83
Book
Book Cover

Copies

Location Call No. Status
 Female Library  TK5105.59 .C5737 2004    Available
84
Book
Book Cover

Management of information security


Whitman, Michael E. 1964-
Boston, Mass. ; London : Course Technology, 2004 2004

Rating:

 

Copies

Location Call No. Status
 Female Library  TK5105.59 W54 2004    Available
85
Book
Book Cover

Fundamentals of network security


Maiwald, Eric
New York : McGraw-Hill Technology Education, 2004 2004

Rating:

Copies

Location Call No. Status
 Female Library  TK5105.59 M362 2004    Available
86
Book
Book Cover

Network security : the complete reference


Bragg, Roberta
New York : McGraw-Hill/Osborne, 2004 2004

Rating:

Copies

Location Call No. Status
 Female Library  TK5105.59 B725 2004    Available
 Female Library  TK5105.59 B725 2004 c.2  Available
87
Book
Book Cover

Principles of computer security : Security+ and beyond



Boston, Mass. : McGraw-Hill Technology Education, 2004 2004

Rating:

 

Copies

Location Call No. Status
 Female Library  QA76.9.A25 P75 2004    Available
 Female Library  QA76.9.A25 P75 2004 c.2  Available
88
Book
Book Cover

Network security essentials : applications and standards


Stallings, William
Upper Saddle River, NJ. : Prentice Hall , 2003 2003

Rating:

 

Copies

Location Call No. Status
 Female Library  TK5105.59 S73 2003    Available
 Female Library  TK5105.59 S73 2003 c.2  Available
89
Book
Book Cover

Cryptography and network security : principles and practice


Stallings, William
Upper Saddle River, N.J. : Prentice Hall International, 2003 2003

Rating:

 

Copies

Location Call No. Status
 Female Library  TK5105.59 S713 2003    Available
 Female Library  TK5105.59 S713 2003 c.2  Available
 Male Library  TK5105.59 S713 2003    Available
There are additional copies/volumes of this item
90
Book
Book Cover

Network security principles and practices


Malik, Saadat
Indianapolis, Ind. : Cisco, 2003 2003

Rating:

 

Copies

Location Call No. Status
 Female Library  TK5105.59 M34 2003    Available
91
Book
Book Cover

Introduction to cryptography with Java applets


Bishop, David, 1963-
Boston : Jones and Bartlett, 2003 2003

Rating:

 

Copies

Location Call No. Status
 Female Library  QA76.9.A25 B565 2003    Available
92
Book
Book Cover

Fundamentals of computer security


Pieprzyk, Josef
Berlin; New York : Springer , 2003 2003

Rating:

 

Copies

Location Call No. Status
 Female Library  QA76.9.A25 P536 2003    Available
93
Book
Book Cover

Copies

Location Call No. Status
 Female Library  TK5105.59 S33 2003    Available
 Female Library  TK5105.59 S33 2003 c.2  Available
94
Book
Book Cover

Computer security : art and science


Bishop, Matt (Matthew A.)
Boston, MA : Addison-Wesley, 2003 2003

Rating:

 

Copies

Location Call No. Status
 Male Library  QA76.9.A25 B56 2003    Available
95
Book
Book Cover

Computers, ethics, and society



New York : Oxford University Press, 2003 2003

Rating:

 

Copies

Location Call No. Status
 Female Library  QA76.9.C66 C572 2003    Available
 Female Library  QA76.9.C66 C572 2003 c.2  Available
96
Book
Book Cover

Web security : for network and system administrators


Mackey, David
Cambridge, Mass. ; London : Course Technology, 2003 2003

Rating:

 

Copies

Location Call No. Status
 Female Library  TK5105.59 M27 2003    Available
97
Book
Book Cover

Building secure software : how to avoid security problems the right way


Viega,John
Boston : Addison - Wesley , 2002 2002

Rating:

 

Copies

Location Call No. Status
 Female Library  QA76.76.D47 V857 2002    Available
98
Book
Book Cover

Authentication : from passwords to public keys


Smith, Richard E. 1952 -
Boston : Addison-Wesley, 2002 2002

Rating:

 

Copies

99
Book
Book Cover

Security complete.



London : Sybex, 2002 2002

Rating:

 

Copies

100
Book
Book Cover

Professional Java security


Garms, Jess
Birmingham, UK : Wrox Press, 2001. 2001

Rating:

 

Copies

Add Marked to Bag Add All On Page
Locate in results
Resources
More Information
Result Page   Prev 1 2 3 Next