35986841_10216840653711318_1105697261150535680_n

Your search returned 29 results.

Sort
Results
1.
A cryptography primer : secrets and promises / Philip N. Klein by
  • Klein, Philip N
Edition: 1st ed
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publication details: New York : Cambridge University Press, 2014
Availability: Items available for loan: Centeral Library (1)Call number: 005.82 K.P.C 2014.

2.
Advanced persistent threat hacking : the art and science of hacking any organization / Tyler Wrightson. by
  • Wrightson, Tyler [author.]
Edition: 1st ed
Material type: Text Text; Format: print ; Literary form: Not fiction
Copyright date: ©2015
Availability: Items available for loan: Centeral Library (1)Call number: 005.8 W.T.A 2015.

3.
Applied cryptography : protocols, algorithms, and source code in C / Bruce Schneier. by
  • Schneier, Bruce, 1963-
Edition: 2nd ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New York : Wiley, c1996
Availability: Items available for loan: Centeral Library (1)Call number: 005.82 S.B.A 1996.

4.
Building Internet firewalls / D. Brent Chapman and Elizabeth D. Zwicky. by
  • Chapman, D. Brent
  • Zwicky, Elizabeth D
Edition: Minor corrections, Nov. 1995.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Sebastopol, CA : O'Reilly & Associates, c1995
Availability: Items available for loan: Centeral Library (1)Call number: 005.8 C.D.B 1995.

5.
Cisco secure firewall services module (FWSM) / Ray Blair, Arvind Durai by
  • Blair, Ray, 1965-
  • Durai, Arvind
  • Ohio Library and Information Network
Series:
Edition: 1st ed
Material type: Text Text; Format: electronic available online remote; Literary form: Not fiction
Publication details: Indianapolis, Ind. : Cisco Press, c2009
Availability: Items available for loan: Centeral Library (2)Call number: 005.8 B.R.C 2009, ...

6.
Citrix access security for IT administrators by
  • Citrix Product Development Team
  • Citrix Product Development Team
Edition: 1st ed
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New York, NY : McGraw-Hill, c2007
Availability: Items available for loan: Centeral Library (17)Call number: 005.8 C 2007, ...

7.
Collaboration with cloud computing : security, social media, and unified communications / Ric Messier. by
  • Messier, Ric
Edition: 1st ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Amsterdam ; Boston : Syngress, 2014
Availability: Items available for loan: Centeral Library (1)Call number: 004.678 M.R.C 2014.

8.
Computer communications security : principles, standard protocols, and techniques / Warwick Ford. by
  • Ford, Warwick
Edition: 1st ed
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Englewood Cliffs, N.J. : PTR Prentice Hall, c1994
Availability: Items available for loan: Centeral Library (1)Call number: 005.8 F.W.C 1994.

9.
Computer security : principles and practice / William Stallings, Lawrie Brown, UNSW Canberra at the Australian Defence Force Academy by
  • Stallings, William [author]
  • Brown, Lawrie [author]
Edition: Third edition
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Boston : Pearson, 2015
Availability: Items available for loan: Centeral Library (1)Call number: 005.8 S.W.C 2015.

10.
Computer system and network security / Gregory B. White, Eric A. Fisch, Udo W. Pooch. by
  • White, Gregory B
  • Fisch, Eric A
  • Pooch, Udo W, 1944-
Series: CRC Press computer engineering series
Edition: 1st ed
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Boca Raton : CRC Press, c1996
Online access:
Availability: Items available for loan: Centeral Library (1)Call number: 005.8 W.G.C 1995.

11.
Corporate computer security by
  • Boyle, Randall J
  • Panko, Raymond R
Edition: 3rd ed. / Randall J. Boyle, Raymond R. Panko
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Boston : Pearson, c2013
Availability: Items available for loan: Centeral Library (1)Call number: 005.8 B.R.C 2014.

12.
Corporate computer security by
  • Boyle, Randall J
  • Panko, Raymond R
Edition: 4TH ed. / Randall J. Boyle, Raymond R. Panko
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Boston : Pearson, c2015
Availability: Items available for loan: Centeral Library (1)Call number: 005.8 B.R.C 2015.

13.
Cryptography and network security : principles and practice / William Stallings. by
  • Stallings, William
Edition: 4th ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Upper Saddle River, N.J. : Pearson/Prentice Hall, c2006
Online access:
Availability: Items available for loan: Centeral Library (8)Call number: 005.8 S.W.C 2006, ...

14.
Cryptography and network security : principles and practice / William Stallings. by
  • Stallings, William
Edition: 5th ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Boston : Prentice Hall, c2011
Availability: Items available for loan: Centeral Library (7)Call number: 005.82 S.W.C 2011, ...

15.
Cryptography and network security : principles and practice / William Stallings by
  • Stallings, William [author]
Edition: Seventh edition
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Boston : Pearson, [2017]
Availability: Items available for loan: Centeral Library (5)Call number: 005.8 S.W.C 2014, ...

16.
Gray hat hacking : the ethical hacker's handbook / Daniel Regalado [and 7 others]. by
  • Regalado, Daniel [author.]
  • Ohio Library and Information Network
Edition: Fourth edition.
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publication details: New York : McGraw-Hill Education, 2015
Other title:
  • Ethical hacker's handbook.
Availability: Items available for loan: Centeral Library (1)Call number: 005.8 R.D.G 2015.

17.
Hacker proof : the ultimate guide to network security / by Lars Klander. by
  • Klander, Lars
Edition: 1st ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Las Vegas, NV : Jamsa Pres, c1997
Availability: Items available for loan: Centeral Library (1)Call number: 005.8 K.L.H 1997.

18.
Healthcare information security and privacy / Sean P. Murphy. by
  • Murphy, Sean P. (Sean Patrick), 1968- [author.]
Edition: 1st ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: New York : McGraw-Hill Education, [2015]
Availability: Items available for loan: Centeral Library (1)Call number: 362.1068 M.S.H 2015.

19.
Information assurance handbook : effective computer security and risk management strategies / Corey Schou, Steven Hernandez. by
  • Schou, Corey
  • Hernandez, Steven
Edition: 1st ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: New York : McGraw-Hill Education, [2015]
Availability: Items available for loan: Centeral Library (1)Call number: 005.74 S.C.I 2015.

20.
Information security analytics : finding security insights, patterns, and anomalies in big data / Mark Ryan M. Talabis, Robert McPherson, I. Miyamoto, Jason L. Martin ; D. Kaye, technical editor by
  • Talabis, Mark
  • McPherson, Robert [author]
  • Miyamoto, I [author]
  • Martin, Jason L [author]
  • Ohio Library and Information Network
Edition: 1st ed.
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publisher: Massachusetts : Syngress, 2015
Availability: Items available for loan: Centeral Library (1)Call number: 001.64 T.M.I 2015.

Pages