Limit search to available items
Save marked records Save all on page
SUBJECTS (1-29 of 29)
Computer Networks Remote Access
1
Mark
  Attracting, educating and serving remote users through the web : a how-to-do-it manual for librarian

London : Facet Pub., 2002.  
2002
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL 3rd Floor  q TK 5103.7 A8  8 WEEK LOAN  AVAILABLE
2
Mark
  Microsoft .NET remoting.
McLean, Scott.
Redmon, Wash. : Microsoft Press, 2002.  
2002
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL 3rd Floor  QA 76.9 D5 M1  8 WEEK LOAN  AVAILABLE
 BJL 3rd Floor  QA 76.9 D5 M1  8 WEEK LOAN  AVAILABLE
 BJL 3rd Floor  QA 76.9 D5 M1  8 WEEK LOAN  AVAILABLE
Click to view copies/volumes at all libraries
Computer Networks Security Measures
3
Mark
  Advances in cyber security : technology, operations, and experiences

New York : Fordham University Press, 2013. -Access this resource online
2013
EBOOKS
4
Mark
  Building open source network security tools : components and techniques.
Schiffman, Mike D.
New York : Wiley Publishing, Inc., 2002.  
2002
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL Reading Room Mezzanine  005.8 SCH  4 WEEK LOAN  AVAILABLE
5
Mark
  Computer forensics : computer crime scene investigation
Vacca, John R.
Hingham, Mass. : Charles River Media, 2002.  
2002
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL Reading Room 1st floor HDC  QA 76.9 A25 V1  4 WEEK LOAN  AVAILABLE
6
Mark
  Computer forensics : incident response essentials
Kruse, Warren G.
Boston, Mass. : Addison-Wesley, 2002.  
2002
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL Reading Room Mezzanine  363.2502854 KRU  4 WEEK LOAN  AVAILABLE
7
Mark
  Computer security : a hands-on approach
Du, Wenliang, author.
[Atascadero, California] : CreateSpace, [2017]  
2017
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL 3rd Floor  QA76.9.A25 D8 2017  8 WEEK LOAN  AVAILABLE
8
Mark
  Computer security : principles and practice
Stallings, William.
Harlow, Essex, England : Pearson, [2015]  
2015
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL Reading Room 1st floor HDC  QA76.9.A25 S73 2015  4 WEEK LOAN  AVAILABLE
9
Mark
  Computer security : protecting digital resources
Newman, Robert C., author.
Sudbury, Mass. : Jones and Bartlett Publishers, c2010.  
c2010
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL Reading Room 1st floor HDC  QA 76.9 D314 N5  4 WEEK LOAN  AVAILABLE
10
Mark
  Cryptography and network security : principles and practice
Stallings, William.
Upper Saddle River, N.J. : Pearson/Prentice Hall, c2006.  
c2006
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL 3rd Floor  TK 5105.59 S7  8 WEEK LOAN  AVAILABLE
11
Mark
  Current security management & ethical issues of information technology

Hershey, Pa : IRM Press, c2003.  
c2003
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL 3rd Floor  QA 76.9 A25 C9  8 WEEK LOAN  AVAILABLE
12
Mark
  Current security management & ethical issues of information technology

Hershey, Pa : IRM, c2003. -Access this resource online
c2003
EBOOKS
13
Mark
  Cybersecurity, attack and defense strategies : infrastructure security with Red Team and Blue Team t
Diogenes, Yuri.
Birmingham : Packt Publishing, 2018. -Access this resource online
2018
EBOOKS
14
Mark
  Cyberterrorism : the use of the Internet for terrorist purposes.

Strasbourg : Council of Europe Publishing, c2007.  
c2007
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL Reading Room 1st floor HDC  HV 6773.15 C97 C9  4 WEEK LOAN  AVAILABLE
15
Mark
  Digital cash : commerce on the Net.
Wayner, Peter, 1964-
Boston, Mass. : AP Professional, 1996.  
1996
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL 5th Floor  HG 1710 W3  8 WEEK LOAN  AVAILABLE
16
Mark
  Disappearing cryptography : being and nothingness on the Net.
Wayner, Peter, 1964-
Boston, Mass. : AP Professional, 1996.  
1996
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL 3rd Floor  TK 5105.59 W3  8 WEEK LOAN  AVAILABLE
17
Mark
  Elementary information security
Smith, Richard E., 1952- author.
Burlington, Massachusetts : Jones & Bartlett Learning, 2016. -Access this resource online
2016
EBOOKS
18
Mark
  Google hacking for penetration testers. Volume 2
Long, Johnny.
Burlington, MA : Syngress Pub., c2008.  
c2008
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL Reading Room Mezzanine  025.04 LON  4 WEEK LOAN  AVAILABLE
19
Mark
  Hack attacks revealed : a complete reference with custom security hacking toolkit.
Chirillo, John, 1970-
New York ; Chichester : Wiley, 2002.  
2002
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL Reading Room Mezzanine  005.8 CHI  4 WEEK LOAN  AVAILABLE
20
Mark
  Hacking exposed : network security secrets and solutions
McClure, Stuart.
Berkeley, Calif. : Osborne, 1999.  
1999
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL Reading Room Mezzanine  005.8 MCC  4 WEEK LOAN  AVAILABLE
21
Mark
  Hacking : the art of exploitation
Erickson, Jon, 1977-
San Francisco, Calif. : No Starch, 2007.  
2007
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL Reading Room 1st floor HDC  QA 76.9 A25 E6  4 WEEK LOAN  DUE 18-04-24
22
Mark
  High noon on the electronic frontier : conceptual issues in cyberspace.
Ludlow, Peter, 1957-
London : MIT Press, 1996.  
1996
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL Reading Room Mezzanine  302.23 LUD  4 WEEK LOAN  AVAILABLE
23
Mark
  How to break web software : functional and security testing of web applications and web services
Andrews, Mike.
Harlow : Addison-Wesley, 2006.  
2006
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL 3rd Floor  QA 76.76 T48 A5  8 WEEK LOAN  AVAILABLE
24
Mark
  Implementing intrusion detection systems : a hands-on guide for securing the network
Crothers, Tim.
Indianapolis, IN : Wiley Publishing, 2003.  
2003
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL Reading Room 1st floor HDC  TK 5105.59 C9  4 WEEK LOAN  AVAILABLE
25
Mark
  Information security risk analysis
Peltier, Thomas R.
London : Auerbach, c2001.  
c2001
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL Reading Room 1st floor HDC  QA 76.9 A25 P3  4 WEEK LOAN  AVAILABLE
26
Mark
  Innocent code a security wake-up call for Web programmers
Huseby, Sverre H.
Chichester : Wiley, c2004. -Access this resource online
c2004
EBOOKS
27
Mark
  Insider threat : protecting the enterprise from sabotage, spying, and theft
Cole, Eric.
Rockland, Mass. : Syngress, 2006.  
2006
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL 3rd Floor  TK 5105.59 C6  8 WEEK LOAN  AVAILABLE
28
Mark
  The internet security guidebook : from planning to deployment
Ellis, Juanita.
San Diego : Academic Press, 2001.  
2001
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL 3rd Floor  TK 5105.59 E4  8 WEEK LOAN  AVAILABLE
29
Mark
  Internet security protocols : protecting IP traffic.
Black, Uyless.
Upper Saddle River, NJ : Prentice Hall, 2000.  
2000
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL Reading Room Mezzanine  005.8 BLA  4 WEEK LOAN  AVAILABLE
Save marked records Save all on page
Locate in results