Your search returned 39 results.

Not what you expected? Check for suggestions
Sort
Results
1. Books
Information assurance for the enterprise : a roadmap to information security / Corey Schou, Dan Shoemaker. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Boston : McGraw-Hill Irwin, c2007
Availability: Items available for loan: Judith Thomas Library (3)Call number: QA 76.9 .A25 S3523 2007, ...
2. Books
Secrets and lies : digital security in a networked world / Bruce Schneier. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New York : John Wiley, 2000
Availability: Items available for loan: Judith Thomas Library (2)Call number: QA 76.9 .A25 S352 2000, ...
3. Books
IT auditing : using controls to protect information assets / Chris Davis, Mike Schiller ; with Kevin Wheeler. by
Edition: 2nd ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New York : McGraw-Hill, c2011
Availability: Items available for loan: Judith Thomas Library (3)Call number: QA 76.9 .A93 D38 2011, ...
4. Books
Linux system security : an administrator's guide to open source security tools / Scott Mann, Ellen L. Mitchell, and Mitchell Krell. by Series: Prentice Hall series in computer networking and distributed systems
Edition: 2nd ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Upper Saddle, NJ : Prentice Hall, 2003
Availability: Items available for loan: Judith Thomas Library (1)Call number: QA 76.9 .A25 M32 2003.
5. Books
Wireless operational security / John W. Rittinghouse, James F. Ransome. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Amsterdam ; Boston : Elsevier Digital Press, c2004
Online access:
Availability: Items available for loan: Judith Thomas Library (1)Call number: TK 5105.59 .R58 2004.
6. Books
Best damn firewall book period / T.W. Shinder ... [et al.]. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Burlington, Mass. : Oxford : Syngress ; Elsevier Science [distributor], c2003
Availability: Items available for loan: Judith Thomas Library (1)Call number: TK 5105.59 .B466 2003.
7. Books
Writing secure code / Michael Howard and David LeBlanc. by
Edition: 2nd ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Redmond, Wash. : Microsoft Press, c2003
Availability: Items available for loan: Judith Thomas Library (1)Call number: QA 76.9 .A25 H698 2003.
8. Books
Network security : private communication in a public world / Charlie Kaufman, Radia Perlman, Mike Speciner. by Series: Prentice Hall series in computer networking and distributed systems
Edition: 2nd ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Upper Saddle River, NJ : Prentice Hall PTR, c2002
Availability: Items available for loan: Judith Thomas Library (1)Call number: QA 76.9 .A25 K39 2002.
9. Books
Cryptography and network security : principles and practice / William Stallings. by
Edition: 3rd ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Upper Saddle River, N.J. : Prentice Hall, c2003
Availability: Items available for loan: Judith Thomas Library (1)Call number: TK 5105.59 .S713 2003.
10. Books
Linux firewalls / Robert L. Ziegler, Carl B. Constantine. by
Edition: 2nd ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Indianapolis, IN : New Riders, 2002
Availability: Items available for loan: Judith Thomas Library (1)Call number: QA 76.9 .A25 Z54 2002.
11. Books
Building secure software how to avoid security problems the right way / John Viega, Gary McGraw. by Series: Addison-Wesley professional computing series
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Boston : Addison-Wesley, c2002
Availability: Items available for loan: Judith Thomas Library (1)Call number: QA 76.76 .D47 V857 2001.
12. Books
Linux Firewalls / Robert L. Ziegler. by Series: New Riders professional library
Edition: 2nd ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Indianapolis, Ind. : New Riders, 2001
Availability: Items available for loan: Judith Thomas Library (1)Call number: QA 76.9 .A25 Z54 2001.
13. Books
Security engineering : a guide to building dependable distributed systems / Ross J. Anderson. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New York : Wiley, 2001
Availability: Items available for loan: Judith Thomas Library (2)Call number: QA 76.9 .A25 A54 2001, ...
14. Books
The art of intrusion : the real stories behind the exploits of hackers, intruders, & deceivers / Kevin D. Mitnick, William L. Simon. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Indianapolis, IN : Wiley, c2005
Availability: Items available for loan: Judith Thomas Library (1)Call number: QA 76.9 .A25 M587 2005.
15. Books
Honeypots : tracking hackers / Lance Spitzner. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Boston : Addison-Wesley, c2003
Availability: Items available for loan: Judith Thomas Library (1)Call number: QA 76.9 .A25 S67 2003.
16. Books
Cryptography and network security : principles and practice / William Stallings. by
Edition: 5th ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Boston : Prentice Hall, c2011
Availability: Items available for loan: Judith Thomas Library (1)Call number: TK 5105.59 .S713 2011.
17. Books
Network security : a hacker's perspective / Ankit Fadia. by
Edition: 2nd ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Boston, MA : Thompson Course Technology, c2006
Availability: Items available for loan: Judith Thomas Library (1)Call number: QA 76.9 .A25 F32 2006.
18. Books
Applied cryptography : protocols, algorithms, and source code in C / Bruce Schneier. by
Edition: 2nd ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New York : John Wiley and sons, c1996
Availability: Items available for loan: Judith Thomas Library (1)Call number: QA 76.9 .A25 S35 1996.
19. Books
Firewalls and VPNs : principles and practices / Richard W. Tibbs, Edward B. Oakes. by Series: Security series (Upper Saddle River, N.J.)
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Upper Saddle River, N.J : Pearson/Prentice Hall, c2006
Online access:
Availability: Items available for loan: Judith Thomas Library (1)Call number: QA 76.9 .A25 T525 2006.
20. Books
Exploiting software : how to break code / Greg Hoglund, Gary McGraw. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Boston : Addison-Wesley, c2004
Online access:
Availability: Items available for loan: Judith Thomas Library (1)Call number: QA 76.9 .A25 H635 2004.
Pages