|
21.
|
CISSP practice exams/ Shon Harris.
by Harris, Shon. Edition: 2nd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: McGraw-Hill, 2013Availability: Items available for loan: Main Library
[Call number: QA 76.3 HAR 2013]
(1).
|
|
22.
|
Hacking web apps : detecting and preventing web application security problems / Mike Shema.
by Shema, Mike. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Amsterdam ; Boston : Syngress, c2012Availability: Items available for loan: Main Library
[Call number: TK 5105.59 SHE 2012]
(1).
|
|
23.
|
Social media security : leveraging social networking while mitigating risk / Michael Cross.
by Cross, Michael. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Amsterdam, [Netherlands] : Syngress, 2014Availability: Items available for loan: Main Library
[Call number: HM 742 CRO 2014]
(1).
|
|
24.
|
The secure information society : ethical, legal and political challenges / J�org Kr�uger, Bertram Nickolay, Sandro Gaycken, editors.
by Kr�uger, J�org | Nickolay, Bertram | Gaycken, Sandro, 1973-. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: London ; New York : Springer, c2013Availability: Items available for loan: Main Library
[Call number: QA 76.9.A25 SEC 2013]
(1).
|
|
25.
|
How to Cheat at securing a wireless network/ Chris Hurley, Brian Baker, Christian Barnes, Tony Bautts [five others]
by Hurley, Chris | Baker, Brian | Barnes, Christian. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Rockland: Syngress Publishing, Inc., 2006Availability: Items available for loan: Main Library
[Call number: TK 7872.D42 HUR 2006]
(2).
|
|
26.
|
Managed code rootkits: hooking into runtime environments/ by Erez Metula
by Metula, E. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Burlington: Elsevier, 2011Availability: Items available for loan: Main Library
[Call number: QA 76.9.A25 MET 2011]
(1).
|
|
27.
|
Data breach preparartion and response: breaches are certain, impact is not/ by Kevvie Fowler; Curtis Rose, Technical Editor
by Fowler, K | Rose, C. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Amsterdam: Elsevier, 2016Availability: Items available for loan: Main Library
[Call number: TK 5105.59 FOW 2016]
(1).
|
|
28.
|
International Conference on Secure Communication Systems, 22-23 February 1984 / organised by the Electronics and Computing and Control Divisions of the Institution of Electrical Engineers in association with the British Computer Society, Institute of Acoustics, Institute of Physics.
by International Conference on Secure Communication Systems (1st : 1984 : London, England) International Conference on Secure Communication Systems (1st : 1984 : London, England) International Conference on Secure Communication Systems (1st : 1984 : London, England) International Conference on Secure Communication Systems (1st : 1984 : London, England) | Institution of Electrical Engineers. Electronics Division. Institution of Electrical Engineers. Electronics Division | Institution of Electrical Engineers. Computing & Control Division. Institution of Electrical Engineers. Computing & Control Division. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: London ; New York : London ; New York : The Institution, c1984Availability: No items available
|
|
29.
|
The protection of property against crime / [by] James Bunting.
by Bunting, James. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Folkestone : Bailey and Swinfen, 1975Availability: No items available
|
|
30.
|
Computer crime.
by McKnight, Gerald. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: London : Joseph, 1973Availability: No items available
|
|
31.
|
Guide to computer network security / Joseph Migga Kizza
by Kizza, Joseph Migga. Edition: Second editionMaterial type: Book; Format:
print
; Literary form:
Not fiction
Publisher: London : Springer, 2013Availability: Items available for loan: Main Library
[Call number: TK 5105.59 KIZ 2013 .]
(1).
|
|
32.
|
You: for sale : protecting your personal data and privacy online / Stuart Sumner and Mike Rispoli, technical editor.
by Sumner, Stuart | Rispoli, Mike [technical editor]. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Amsterdam : Elsevier, 2016Availability: Items available for loan: Main Library
[Call number: HV 6675 SUM 2016]
(1).
|
|
33.
|
Achieving systems safety : proceedings of the twentieth Safety-Critical Systems Symposium, Bristol, UK, 7-9th February 2012 / edited by Chris Dale and Tom Anderson
by Dale, Chris, 1953- [editor] | Anderson, Tom, 1947- [editor]. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: London : Springer, 2012Availability: Items available for loan: Main Library
[Call number: TA 169.7 ACH 2012]
(1).
|
|
34.
|
Essential skills for hackers / Kevin Cardwell ; contributing editor, Henry Dalziel.
by Cardwell, Kevin [author.] | Dalziel, Henry [editor.]. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston : Elsevier; 2016Availability: Items available for loan: Main Library
[Call number: QA 76.9.A25 CAR 2016]
(1).
|
|
35.
|
Google hacking for penetration testers / Johnny Long, Bill Garner and Justin Brown
by Long, Johnny [author.] | Gardner, Bill [author.] | Brown, Justin [author.]. Edition: Third edition.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Amsterdam : Syngress, 2016Availability: Items available for loan: Main Library
[Call number: TK 5105.885 .G66 LON 2016]
(1).
|
|
36.
|
Cyber security awareness for lawyers / by David Willson and contributing editor, Henry Dalziel.
by Willson, David [author] | Dalziel, Henry [contributing editor.]. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Amsterdam : Elsevier, 2016Availability: Items available for loan: Main Library
[Call number: HV 6773 WIL 2016]
(1).
|
|
37.
|
The handbook of security / edited by Martin Gill, Professor of Criminology and Director of Perpetuity Research, UK.
by Gill, Martin [editor]. Edition: 2nd edition.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: London : Palgrave Macmillan, 2014Online access: Click here to access online Availability: Items available for loan: Main Library
[Call number: HV 8290 HAN 2014]
(1).
|
|
38.
|
Embedded multimedia security systems : algorithms and architectures / Amit Pande and Joseph Zambreno.
by Pande, Amit | Zambreno, Joseph [author]. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: London : Springer, c2013Availability: Items available for loan: Main Library
[Call number: TK 7895.E42 PAN 2013 C.1]
(1).
|
|
39.
|
Advances in Computers Vol. 94 edited by Ali Hurson, Atif Memon
by Hurson,Ali | Memon,Atif. Publisher: London : Elsevier , 2014Availability: Items available for loan: Main Library
[Call number: QA 76.754 ADV 2014]
(1).
|
|
40.
|
Computer and information security handbook / edited by John R. Vacca
by Vacca, John R [editor]. Edition: Second edition. Publisher: Amsterdam : Elsevier Inc., 2013Availability: Items available for loan: Main Library
[Call number: QA 76.9.A25 COM 2013]
(1).
|