Refine your search

Your search returned 85 results.

Not what you expected? Check for suggestions
Mechanics of user identification and authentication fundamentals of identity management Dobromir Todorov.

by Todorov, Dobromir.

Publisher: Boca Raton : Auerbach Publications, c2007Online access: Publisher description Availability: Items available for loan: Military College of Signals (MCS)Call number: 005.8,TOD (1).
Securing Web services with WS-Security : demystifying WS-Security, WS-Policy, SAML, XML Signature, and XML Encryption / Jothy Rosenberg, David L. Remy.

by Rosenberg, Jonathan B | Remy, David L.

Publisher: Indianapolis, IN : SAMS, c2004Availability: Items available for loan: Military College of Signals (MCS)Call number: 005.8,ROS (1).
Access control systems : security, identity management and trust models / by Messaoud Benantar.

by Benantar, Messaoud.

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: New York : Springer Science+Business Media, c2006Online access: Publisher description | Table of contents only Availability: Items available for loan: Central Library (CL)Call number: 005.8 BEN (1).
Broadband network & device security / Benjamin M. Lail.

by Lail, Benjamin M.

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: New York : McGraw-Hill/Osborne, c2002Online access: Table of contents | Publisher description | Contributor biographical information Availability: Items available for loan: Institute of Environmental Science and Engineering (IESE)Call number: 621.3821 LAI (1).
The state of the art in intrusion prevention and detection / edited by Al-Sakib Khan Pathan.

by Pathan, Al-Sakib Khan.

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: Boca Raton, [Florida] : CRC Press/Taylor & Francis Group, [2014]Availability: Items available for loan: Central Library (CL)Call number: 005.8 PAT (1).
Network anomaly detection : a machine learning perspective / Dhruba Kumar Bhattacharyya, Jugal Kumar Kalita.

by Bhattacharyya, Dhruba K.

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: Boca Raton : CRC Press, Taylor & Francis Group, [2014]Availability: Items available for loan: Central Library (CL)Call number: 005.8 BHA (1).
Norman Foster : a global architecture / Martin Pawley.

by Pawley, Martin | Foster, Norman, 1935-.

Publisher: New York : Universe : Distributed to the U.S. trade by St. Martin's Press, 1999Online access: Contributor biographical information | Publisher description Availability: Items available for reference: School of Art Design and Architecture (SADA) Not for loanCall number: REF 720.92 PAW 1999 (1). :
Understanding cyber security : emerging governance and strategy / edited by Gary Schaub Jr.

by Schaub, Gary, Jr, 1969- [editor.].

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: London ; New York : Rowman & Littlefield International, Ltd., [2018]Availability: Items available for loan: Centre for International Peace & Stability (CIPS)Call number: 384.334 UND 2019 (1).
Windows registry forensics : advanced digital forensic analysis of the Windows Registry / Harlan Carvey.

by Carvey, Harlan A [author.].

Edition: Second editionMaterial type: Text Text; Format: print ; Literary form: Not fiction Publisher: Amersterdam : Syngress is an imprint of Elsevier, [2016]Availability: Items available for loan: Central Library (CL)Call number: 005.8 CAR (2).
Windows forensic analysis toolkit : advanced analysis techniques for Windows 8 / Harlan Carvey.

by Carvey, Harlan A.

Edition: 4th ed.Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: Amsterdam ; Boston : Syngress, [2014]Availability: Items available for loan: Central Library (CL)Call number: 363.25968 CAR (2).
The art of memory forensics : detecting malware and threats in Windows, Linux, and Mac memory / Michael Hale Ligh, Andrew Case, Jamie Levy, Aaron Walters.

by Ligh, Michael Hale | Case, Andrew (Digital forensics researcher) | Levy, Jamie | Walters, Aaron.

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: Indianapolis, IN : Wiley, [2014]Copyright date: ©2014Other title: Detecting malware and threats in Windows, Linux, and Mac memory.Online access: Contributor biographical information | Table of contents only Availability: Items available for loan: Central Library (CL)Call number: 004.5028558 LIG (2).
Cryptography,theory and practice

by Stinson, Douglas.R.

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: NEWYORK CRC 1995Availability: Items available for loan: College of Electrical & Mechanical Engineering (CEME)Call number: 005.82 STI'C (1).
Rsa security's official guide to cryptography

by Burnett, Steve, Paine, Stephen.

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: NEW YORK MCGRAW HILL 2004Availability: Items available for loan: College of Electrical & Mechanical Engineering (CEME)Call number: 005.82 BUR (4).
Hacking : the art of exploitation / Jon Erickson.

by Erickson, Jon, 1977-.

Edition: 2nd ed.Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: San Francisco, CA : No Starch Press, c2008Online access: Table of contents Availability: Items available for loan: Military College of Signals (MCS)Call number: 005.8,ERI (1).
Hacking exposed 7 : network security secrets & solutions / Stuart McClure, Joel Scambray, George Kurtz.

by McClure, Stuart | Mcclure, Stuart | Scambray, Joel | Kurtz, George.

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: New York : McGraw-Hill, [2012]Copyright date: ©2012Availability: Items available for loan: Military College of Signals (MCS)Call number: 005.8,MCC (3).
Corporate computer security / Randall J. Boyle (Longwood University), Raymond R. Panko (University of Hawaiʻi at Mānoa).

by Panko, Raymond R [author.] | Boyle, Randall [author.].

Edition: Fourth edition.Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: Boston : Pearson, [2015]Availability: Items available for loan: Military College of Signals (MCS)Call number: 005.8,PAN (2). Checked out (1).
Threat modeling : designing for security / Adam Shostack.

by Shostack, Adam [author.].

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: Indianapolis, IN : Wiley, [2014]Copyright date: ©2014Availability: Items available for loan: Military College of Signals (MCS)Call number: 005.8, SHO (1).
Computer security : principles and practice / William Stallings, Lawrie Brown,

by Stallings, William [author.] | Brown, Lawrie [author.].

Edition: Fourth Edition.Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: New York, NY : Pearson, [2018]Availability: Items available for loan: Military College of Signals (MCS)Call number: 005.8,STA (3). Items available for reference: Military College of Signals (MCS) Not for loanCall number: 005.8,STA (1).
Cryptography and network security : principles and practice / William Stallings.

by Stallings, William [author.].

Edition: Seventh edition.Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: Boston : Pearson, [2017]Availability: Items available for loan: Military College of Signals (MCS)Call number: 005.82,STA (4). Items available for reference: Military College of Signals (MCS) Not for loanCall number: 005.82,STA (1).
The CERT guide to insider threats : how to prevent, detect, and respond to information technology crimes (theft, sabotage, fraud) / Dawn Cappelli, Andrew Moore, Randall Trzeciak.

by Cappelli, Dawn | Moore, Andrew | Trzeciak, Randall.

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: Upper Saddle River, NJ : Addison-Wesley, c2012Availability: Items available for loan: Military College of Signals (MCS)Call number: 658.478,CAP (1).
Human dimensions of cybersecurity / by Terry Bossomaier, Steven D'Alessandro, Roger Bradbury.

by Bossomaier, Terry R. J. (Terry Richard John) [author.] | D'Alessandro, Steven [author.] | Bradbury, R. H. (Roger H.) [author.].

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: Boca Raton : CRC Press, [2020]Availability: Items available for loan: Military College of Signals (MCS)Call number: 005.8,BOS (1).
Computer security fundamentals / Chuck Easttom.

by Easttom, Chuck [author.].

Edition: Third edition.Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: Indianapolis, Indiana : Pearson, [2016]Online access: E-book Availability: Items available for loan: Military College of Signals (MCS)Call number: 005.8,EAS (1).
Fundamentals of information systems security / David Kim, Michael G. Solomon.

by Kim, David (Information technology security consultant) [author.] | Solomon, Michael (Michael G.), 1963- [author.].

Edition: Third edition.Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: Burlington, MA : Jones & Bartlett Learning, [2018]Availability: Items available for loan: Military College of Signals (MCS)Call number: 005.8,KIM (1).
Effective cybersecurity : understanding and using standards and best practices / William Stallings.

by Stallings, William [author.].

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: Upper Saddle River, NJ : Addison-Wesley, [2019]Copyright date: ©2019Other title: Effective cybersecurity: a guide to using best practices and standards.Availability: Items available for loan: Military College of Signals (MCS)Call number: 005.8,STA (1).
Hacking for dummies / by Kevin Beaver ; foreword by Richard Stiennon.

by Beaver, Kevin [author.] | Stiennon, Richard, 1959- [author of introduction, etc.].

Edition: 5th edition.Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: Hoboken, NJ : John Wiley & Sons, Inc., [2016]Copyright date: ©2016Online access: Contributor biographical information | Publisher description | Table of contents only Availability: Items available for loan: Military College of Signals (MCS)Call number: 005.8, BEA (1).
Hacking the hacker : learn from the experts who take down hackers / Roger A. Grimes.

by Grimes, Roger A [author.] | International Information Systems Security Certification Consortium.

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: Indianapolis, IN : John Wiley & Sons, Inc., [2017]Copyright date: ©2017Availability: No items available : Checked out (1).
Computer and information security handbook / edited by John R. Vacca.

by Vacca, John R [editor.].

Edition: Third edition.Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: Cambridge, MA : Morgan Kaufmann Publishers, an imprint of Elsevier, [2017]Copyright date: ©2017Online access: Online chapters Click here to access online chapters. Link valid as of 2017-09-20. Availability: Items available for reference: Military College of Signals (MCS) Not for loanCall number: 005.8,VAC (1). :
Error correcting coding and security for data networks : analysis of the superchannel concept / G. Kabatiansky, E. Krouk, S. Semenov.

by Kabatiansky, G | Kabatiansky, G | Krouk, E | Semenov, S.

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: Hoboken, N.J. : John Wiley, 2005Online access: Table of contents only | Publisher description Availability: Items available for loan: Military College of Signals (MCS)Call number: 005.8,KAB (1).
Secrets of computer espionage : tactics and countermeasures / Joel McNamara.

by McNamara, Joel.

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: New York : Wiley, 2003Online access: Contributor biographical information | Table of contents | Publisher description Availability: No items available : Checked out (1).
Anti-hacker tool kit / Mike Shema.

by Shema, Mike [author.].

Edition: 4th ed.Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: New York : McGraw-Hill Education, [2014]Availability: Items available for loan: Military College of Signals (MCS)Call number: 005.8,SHE (1).
Auditing IT infrastructures for compliance / Marty M. Weiss and Michael G. Solomon.

by Weiss, Martin (Martin M.) [author.].

Edition: Second edition.Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: Burlington, MA : Jones & Bartlett Learning, [2016]Availability: Items available for reference: Military College of Signals (MCS) Not for loanCall number: 005.8,WEI (1). :
Hacker techniques, tools, and incident handling / Sean-Philip Oriyano, Michael G. Solomon.

by Oriyano, Sean-Philip [author.] | Solomon, Michael (Michael G.), 1963- [author.].

Edition: Third edition.Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: Burlington, MA : Jones & Bartlett Learning, [2020]Availability: No items available : Checked out (1).
Fundamentals of information systems security / David Kim, Michael G. Solomon.

by Kim, David (Information technology security consultant) | Solomon, Michael (Michael G.), 1963- [author.].

Edition: Fourth edition.Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: Burlington, Massachusetts : Jones & Bartlett Learning, [2023]Availability: Items available for loan: Military College of Signals (MCS)Call number: 005.8,KIM (1).
Foundations of information security : a straightforward introduction / by Jason Andress.

by Andress, Jason [author.].

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: San Francisco : No Starch Press, [2019]Availability: Items available for loan: Central Library (CL)Call number: 280 SCB (1).
Computer security : principles and practice / William Stallings, Lawrie Brown, UNSW Canberra at the Australian Defence Force Academy.

by Stallings, William [author.] | Brown, Lawrie [author.].

Edition: Fifth edition.Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: Hoboken, NJ : Pearson Education, Inc., [2024]Online access: Click here to access online Availability: Items available for loan: Central Library (CL)Call number: 280 SCB (1).
© 2023 Central Library, National University of Sciences and Technology. All Rights Reserved.