Research Catalog

Search tip: Enter one or more keywords. Use quotation marks to search for an exact phrase.

Advanced search

Active filters

Displaying 19 of 19 results

Forensic discovery / Dan Farmer, Wietse Venema.

Text

Upper Saddle River, NJ : Addison-Wesley, [2005], ©2005.

2005-2005

2 items

FormatCall numberItem location
FormatBook/TextCall numberQA76.9.A25 F34 2005Item locationOff-site
Request for on-site useRequest scan
How do I pick up this item and when will it be ready?
FormatCall numberItem location
FormatBook/TextCall numberItem locationOff-site

Not available - Please for assistance.

Computer forensics : incident response essentials / Warren G. Kruse II, Jay G. Heiser.

Text

Boston, Mass. : Addison-Wesley : Lucent Technologies, c2002.

2002

1 item

FormatCall numberItem location
FormatTextCall numberQA76.9.A25 K78 2002Item locationOff-site

Intercept : the secret history of computers and spies / Gordon Corera.

Text

London : Weidenfeld & Nicolson, 2015.

2015

1 item

FormatCall numberItem location
FormatBook/TextCall numberJN329.I6 C67 2015Item locationOff-site

Introduction to network security / Douglas Jacobson.

Text

Boca Raton : Chapman & Hall/CRC, ©2009.

2009

0 resources

Protection and security on the information superhighway / Frederick B. Cohen.

Text

New York : Wiley, ©1995.

1995

1 item

FormatCall numberItem location
FormatBook/TextCall numberQA76.9.A25 C59 1995Item locationOff-site

Security, accuracy, and privacy in computer systems.

Text

Englewood Cliffs, N.J., Prentice-Hall [1973]

1973

1 item

FormatCall numberItem location
FormatBook/TextCall numberHF5548.2.M342Item locationOff-site

Malicious cryptography : exposing cryptovirology / Adam Young, Moti Yung.

Text

Hoboken, NJ : Wiley, ©2004.

2004

1 item

FormatCall numberItem location
FormatBook/TextCall numberQA76.9.A25 Y65 2004Item locationOff-site

Software security engineering : a guide for project managers / Julia H. Allen [and others].

Text

Upper Saddle River, NJ : Addison-Wesley, ©2008.

2008

1 item

FormatCall numberItem location
FormatBook/TextCall numberQA76.9.A25 S654 2008Item locationOff-site

Host Identity Protocol (HIP) : towards the secure mobile Internet / Andrei Gurtov.

Text

Chichester, U.K. : Wiley, 2008.

2008

1 item

FormatCall numberItem location
FormatBook/TextCall numberTK5103.4885 .G87 2008Item locationOff-site

Open source systems security certification / Ernesto Damiani, Claudio Agostino Ardagna, Nabil El Ioini.

Text

New York : Springer, ©2009.

2009

1 item

FormatCall numberItem location
FormatBook/TextCall numberQA76.9.A25 D36 2009Item locationOff-site

Security in computing systems : challenges, approaches and solutions / Joachim Biskup.

Text

Berlin : Springer, ©2009.

2009

1 item

FormatCall numberItem location
FormatBook/TextCall numberQA76.9.A25 B57 2009Item locationOff-site

Security in wireless ad hoc and sensor networks / Erdal Çayırcı, Chunming Rong.

Text

Chichester, U.K. : Wiley, ©2009.

2009

1 item

FormatCall numberItem location
FormatBook/TextCall numberTK5105.59 .C387 2009Item locationOff-site

Security of information and communication networks / Stamatios V. Kartalopoulos.

Text

Hoboken, N.J. : Wiley, ©2009.

2009

1 item

FormatCall numberItem location
FormatBook/TextCall numberTK5105.59 .K377 2009Item locationOff-site

Security in a Web 2.0+ world : a standards based approach / C. Solari ; and contributors.

Text

Chichester, West Sussex : Wiley, 2009.

2009

1 item

FormatCall numberItem location
FormatBook/TextCall numberTK5105.88817 .S65 2009Item locationOff-site

Mobile communication systems and security / Man Young Rhee.

Text

Singapore ; Hoboken, NJ : J. Wiley & Sons (Asia) ; [Piscataway, NJ] : IEEE Press, ©2009.

2009

1 item

FormatCall numberItem location
FormatBook/TextCall numberTK5103.2 .R47 2009Item locationOff-site

Handbook of electronic security and digital forensics / edited by Hamid Jahankhani [and others].

Text

Singapore ; Hackensack, NJ : World Scientific, ©2010.

2010

1 item

FormatCall numberItem location
FormatBook/TextCall numberQA76.9.A25 H355 2010Item locationOff-site

When gadgets betray us : the dark side of our infatuation with new technologies / Robert Vamosi.

Text

New York : Basic Books, ©2011.

2011

1 item

FormatCall numberItem location
FormatBook/TextCall numberQA76.9.C66 V36 2011Item locationOff-site

Information security for automated speech identification / Fathi E. Abd El-Samie.

Text

New York : Springer, 2011.

2011

1 item

FormatCall numberItem location
FormatBook/TextCall numberTK7895.S65 E57 2011Item locationOff-site

No results found from Digital Research Books Beta

Digital books for research from multiple sources worldwide - all free to read, download, and keep. No library card required.

Read more about the project

Explore Digital Research Books Beta