Active filters
Displaying 19 of 19 results
Forensic discovery / Dan Farmer, Wietse Venema.
Text
Upper Saddle River, NJ : Addison-Wesley, [2005], ©2005.
2005-2005
2 items
Format | Call number | Item location |
---|---|---|
FormatBook/Text | Call numberQA76.9.A25 F34 2005 | Item locationOff-site |
Format | Call number | Item location |
---|---|---|
FormatBook/Text | Call number | Item locationOff-site |
Not available - Please for assistance.
Computer forensics : incident response essentials / Warren G. Kruse II, Jay G. Heiser.
Text
Boston, Mass. : Addison-Wesley : Lucent Technologies, c2002.
2002
1 item
Format | Call number | Item location |
---|---|---|
FormatText | Call numberQA76.9.A25 K78 2002 | Item locationOff-site |
Intercept : the secret history of computers and spies / Gordon Corera.
Text
London : Weidenfeld & Nicolson, 2015.
2015
1 item
Format | Call number | Item location |
---|---|---|
FormatBook/Text | Call numberJN329.I6 C67 2015 | Item locationOff-site |
Introduction to network security / Douglas Jacobson.
Text
Boca Raton : Chapman & Hall/CRC, ©2009.
2009
0 resources
Protection and security on the information superhighway / Frederick B. Cohen.
Text
New York : Wiley, ©1995.
1995
1 item
Format | Call number | Item location |
---|---|---|
FormatBook/Text | Call numberQA76.9.A25 C59 1995 | Item locationOff-site |
Security, accuracy, and privacy in computer systems.
Text
Englewood Cliffs, N.J., Prentice-Hall [1973]
1973
1 item
Format | Call number | Item location |
---|---|---|
FormatBook/Text | Call numberHF5548.2.M342 | Item locationOff-site |
Malicious cryptography : exposing cryptovirology / Adam Young, Moti Yung.
Text
Hoboken, NJ : Wiley, ©2004.
2004
1 item
Format | Call number | Item location |
---|---|---|
FormatBook/Text | Call numberQA76.9.A25 Y65 2004 | Item locationOff-site |
Software security engineering : a guide for project managers / Julia H. Allen [and others].
Text
Upper Saddle River, NJ : Addison-Wesley, ©2008.
2008
1 item
Format | Call number | Item location |
---|---|---|
FormatBook/Text | Call numberQA76.9.A25 S654 2008 | Item locationOff-site |
Host Identity Protocol (HIP) : towards the secure mobile Internet / Andrei Gurtov.
Text
Chichester, U.K. : Wiley, 2008.
2008
1 item
Format | Call number | Item location |
---|---|---|
FormatBook/Text | Call numberTK5103.4885 .G87 2008 | Item locationOff-site |
Open source systems security certification / Ernesto Damiani, Claudio Agostino Ardagna, Nabil El Ioini.
Text
New York : Springer, ©2009.
2009
1 item
Format | Call number | Item location |
---|---|---|
FormatBook/Text | Call numberQA76.9.A25 D36 2009 | Item locationOff-site |
Security in computing systems : challenges, approaches and solutions / Joachim Biskup.
Text
Berlin : Springer, ©2009.
2009
1 item
Format | Call number | Item location |
---|---|---|
FormatBook/Text | Call numberQA76.9.A25 B57 2009 | Item locationOff-site |
Security in wireless ad hoc and sensor networks / Erdal Çayırcı, Chunming Rong.
Text
Chichester, U.K. : Wiley, ©2009.
2009
1 item
Format | Call number | Item location |
---|---|---|
FormatBook/Text | Call numberTK5105.59 .C387 2009 | Item locationOff-site |
Security of information and communication networks / Stamatios V. Kartalopoulos.
Text
Hoboken, N.J. : Wiley, ©2009.
2009
1 item
Format | Call number | Item location |
---|---|---|
FormatBook/Text | Call numberTK5105.59 .K377 2009 | Item locationOff-site |
Security in a Web 2.0+ world : a standards based approach / C. Solari ; and contributors.
Text
Chichester, West Sussex : Wiley, 2009.
2009
1 item
Format | Call number | Item location |
---|---|---|
FormatBook/Text | Call numberTK5105.88817 .S65 2009 | Item locationOff-site |
Mobile communication systems and security / Man Young Rhee.
Text
Singapore ; Hoboken, NJ : J. Wiley & Sons (Asia) ; [Piscataway, NJ] : IEEE Press, ©2009.
2009
1 item
Format | Call number | Item location |
---|---|---|
FormatBook/Text | Call numberTK5103.2 .R47 2009 | Item locationOff-site |
Handbook of electronic security and digital forensics / edited by Hamid Jahankhani [and others].
Text
Singapore ; Hackensack, NJ : World Scientific, ©2010.
2010
1 item
Format | Call number | Item location |
---|---|---|
FormatBook/Text | Call numberQA76.9.A25 H355 2010 | Item locationOff-site |
When gadgets betray us : the dark side of our infatuation with new technologies / Robert Vamosi.
Text
New York : Basic Books, ©2011.
2011
1 item
Format | Call number | Item location |
---|---|---|
FormatBook/Text | Call numberQA76.9.C66 V36 2011 | Item locationOff-site |
Information security for automated speech identification / Fathi E. Abd El-Samie.
Text
New York : Springer, 2011.
2011
1 item
Format | Call number | Item location |
---|---|---|
FormatBook/Text | Call numberTK7895.S65 E57 2011 | Item locationOff-site |
Computer security and industrial cryptography : state of the art and evolution : ESAT course, Leuven, Belgium, May 21-23, 1991 / Bart Preneel, René Govaerts, Joos Vandewalle, (eds.).
Text
Berlin ; New York : Springer-Verlag, ©1993.
1993
1 item
Format | Call number | Item location |
---|---|---|
FormatBook/Text | Call numberQA76.9.A25 C6373 1993 | Item locationOff-site |