Limit search to available items
Result Page   
Save marked records Save all on page
SUBJECTS (1-50 of 124)
Computer Security
1
Mark
  Advanced persistent threat hacking : the art and science of hacking any organization
Wrightson, Tyler.
New York : McGraw-Hill Education, [2015] -Access this resource online
2015
EBOOKS
2
Mark
  Applied cryptography : protocols, algorithms, and source code in C.
Schneier, Bruce, 1963-
New York : Wiley, 1996.  
1996
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL 3rd Floor  QA 76.9 A25 S3  8 WEEK LOAN  AVAILABLE
 BJL 3rd Floor  QA 76.9 A25 S3  8 WEEK LOAN  AVAILABLE
3
Mark
  The art of computer virus research and defense.
Szor, Peter.
Upper Saddle River, N.J. : Addison-Wesley, 2005.  
2005
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL 3rd Floor  QA 76.76 C68 S9  8 WEEK LOAN  AVAILABLE
4
Mark
  The art of deception : controlling the human element of security
Mitnick, Kevin D. (Kevin David), 1963- author.
Indianapolis, Ind. : Wiley, 2003.  
2003
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL Reading Room 1st floor HDC  QA 76.9 A25 M6  4 WEEK LOAN  AVAILABLE
 BJL Reading Room 1st floor HDC  QA 76.9 A25 M6  4 WEEK LOAN  AVAILABLE
5
Mark
  The art of deception : controlling the human element of security
Mitnick, Kevin D. (Kevin David), 1963-
Indianapolis, Ind. : Wiley, c2002. -Access this resource online
c2002
EBOOKS
6
Mark
  B2B and beyond : new business models built on trust
DeMaio, Harry B.
New York : John Wiley and Sobs, Inc., 2001.  
2001
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL Teaching Reserve  658.0558 DEM  UNTIL CLOSING  ASK at the Reading Room
7
Mark
  Bandits on the information superhighway.
Barrett, Daniel J.
Bonn : O'Reilly and Associates, 1996.  
1996
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL Reading Room Mezzanine  005.8 BAR  4 WEEK LOAN  AVAILABLE
8
Mark
  Best truth : intelligence in the Information Age
Berkowitz, Bruce D., 1956-
New Haven, Conn. : Yale University Press, c2000.  
c2000
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL 3rd Floor  QA 76.9 A25 B5  8 WEEK LOAN  AVAILABLE
9
Mark
  Big book of IPsec RFCs
Loshin, Peter.
San Diego, Calif. : Academic Press, 2000.  
2000
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL 3rd Floor  QA 76.9 A25 L8  8 WEEK LOAN  AVAILABLE
10
Mark
  Computer crime : a crimefighter's handbook
Icove, David J., 1949-
Sebastopol, Calif. : O'Reilly and Associates, 1995.  
1995
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL Reading Room 1st floor HDC  HV 6773 I1  4 WEEK LOAN  AVAILABLE
11
Mark
  Computer forensics and privacy
Caloyannides, Michael A.
Boston, Mass. ; London : Artech House, 2001.  
2001
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL Reading Room Mezzanine  363.2502854 CAL  4 WEEK LOAN  AVAILABLE
12
Mark
  Computer forensics : computer crime scene investigation
Vacca, John R.
Hingham, Mass. : Charles River Media, 2002.  
2002
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL Reading Room 1st floor HDC  QA 76.9 A25 V1  4 WEEK LOAN  AVAILABLE
13
Mark
  Computer forensics : incident response essentials
Kruse, Warren G.
Boston, Mass. : Addison-Wesley, 2002.  
2002
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL Reading Room Mezzanine  363.2502854 KRU  4 WEEK LOAN  AVAILABLE
14
Mark
  Computer security
Gollmann, Dieter.
Chichester : Wiley, 2011.  
2011
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL 3rd Floor  QA 76.9 A25 G6  8 WEEK LOAN  AVAILABLE
15
Mark
  Computer security : a hands-on approach
Du, Wenliang, author.
[Atascadero, California] : CreateSpace, [2017]  
2017
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL 3rd Floor  QA76.9.A25 D8 2017  8 WEEK LOAN  AVAILABLE
16
Mark
  Computer security basics
Russell, Deborah.
Sebastopol, CA : O'Reilly & Associates, 1991.  
1991
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL Reading Room Mezzanine  005.8 RUS  4 WEEK LOAN  AVAILABLE
17
Mark
  Computer security : principles and practice
Stallings, William.
Boston : Pearson, [2015] -Access this resource online
2015
EBOOKS
18
Mark
  Computer security : principles and practice
Stallings, William.
Harlow, Essex, England : Pearson, [2015]  
2015
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL Reading Room 1st floor HDC  QA76.9.A25 S73 2015  4 WEEK LOAN  AVAILABLE
19
Mark
  Computer security : protecting digital resources
Newman, Robert C., author.
Sudbury, Mass. : Jones and Bartlett Publishers, c2010.  
c2010
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL Reading Room 1st floor HDC  QA 76.9 D314 N5  4 WEEK LOAN  AVAILABLE
20
Mark
  Computers, ethics & social values

London : Prentice Hall, 1995.  
1995
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL Reading Room Mezzanine  174.90904 JOH  4 WEEK LOAN  AVAILABLE
21
Mark
  Computers, ethics and society.

New York ; Oxford : Oxford University Press, 2003.  
2003
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL Reading Room Mezzanine  303.4834 ERM  4 WEEK LOAN  AVAILABLE
22
Mark
  The crypto controversy : a key conflict in the Information Society.
Koops, Bert-Jaap.
The Hague : Kluwer Law International, 1999.  
1999
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL 3rd Floor  QA 76.9 A25 K8  8 WEEK LOAN  AVAILABLE
23
Mark
  Crypto : secrecy and privacy in the new code war
Levy, Steven.
London : Penguin, c2000.  
c2000
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL Reading Room Mezzanine  005.8 LEV  4 WEEK LOAN  AVAILABLE
24
Mark
  Cryptography and network security : principles and practice
Stallings, William.
Upper Saddle River, N.J. : Pearson/Prentice Hall, c2006.  
c2006
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL 3rd Floor  TK 5105.59 S7  8 WEEK LOAN  AVAILABLE
25
Mark
  Cryptography decrypted
Mel, H. X., 1948- author.
Boston, Mass. : Addison-Wesley, 2001.  
2001
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL Reading Room 1st floor HDC  QA 76.9 A25 M5  4 WEEK LOAN  AVAILABLE
26
Mark
  Cryptography engineering : design principles and practical applications.
Ferguson, Niels.
Indianapolis, Ind. : Wiley, 2010.  
2010
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL 3rd Floor  QA 76.9 A25 F3  8 WEEK LOAN  AVAILABLE
27
Mark
  Current security management & ethical issues of information technology

Hershey, Pa : IRM Press, c2003.  
c2003
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL 3rd Floor  QA 76.9 A25 C9  8 WEEK LOAN  AVAILABLE
28
Mark
  Current security management & ethical issues of information technology

Hershey, Pa : IRM, c2003. -Access this resource online
c2003
EBOOKS
29
Mark
  Cyber blockades
Russell, Alison Lawlor.
Washington DC : Georgetown University Press, [2014] -Access this resource online
2014
EBOOKS
30
Mark
  Cyber security for educational leaders : a guide to understanding and implementing technology polici
Phillips, Richard, 1958-
New York : Routledge, 2013.  
2013
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL 5th Floor  LB 1028.3 P5  8 WEEK LOAN  AVAILABLE
31
Mark
  Cyberpunk : outlaws and hackers on the computer frontier
Hafner, Katie.
London : Corgi, 1993.  
1993
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL 3rd Floor  QA 76.9 A25 H1  8 WEEK LOAN  AVAILABLE
 BJL 3rd Floor  QA 76.9 A25 H1  8 WEEK LOAN  AVAILABLE
32
Mark
  Cybersecurity and cyberwar : what everyone needs to know
Singer, Peter, 1946-
New York ; Oxford : Oxford University Press, 2013. -Access this resource online
2013
EBOOKS
33
Mark
  Cybersecurity - attack and defence strategies : infrastructure security with red team and blue team
Diogenes, Yuri, author.
Birmingham : Packt, 2018.  
2018
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL Reading Room 1st floor HDC  QA76.9.A25 D5 2018  4 WEEK LOAN  AVAILABLE
 BJL Reading Room 1st floor HDC  QA76.9.A25 D5 2018  4 WEEK LOAN  AVAILABLE
 BJL Reading Room 1st floor HDC  QA76.9.A25 D5 2018  4 WEEK LOAN  AVAILABLE
34
Mark
  Cybersecurity, attack and defense strategies : infrastructure security with Red Team and Blue Team t
Diogenes, Yuri.
Birmingham : Packt Publishing, 2018. -Access this resource online
2018
EBOOKS
35
Mark
  CyberWar, CyberTerror, CyberCrime and CyberActivism : an in-depth guide to the role of standards in
Mehan, Julie E.
Ely, Cambridge, UK : IT Governance Pub., 2014. -Access this resource online
2014
EBOOKS
36
Mark
  Data and computer security : dictionary of standards concepts and terms
Longley, Dennis.
Basingstoke : Macmillan, 1989.  
1989
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL 3rd Floor  QA 76.9 A25 L8  NOT FOR LOAN  LIB USE ONLY
37
Mark
  Digital copyright protection.
Wayner, Peter, 1964-
Boston, Mass. : AP Professional, 1997.  
1997
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL 3rd Floor  QA 76.9 A25 W3  8 WEEK LOAN  AVAILABLE
38
Mark
  Digital identity
Windley, Phillip J., 1958-
Sebastopol, Calif. : O'Reilly, 2005.  
2005
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL 3rd Floor  TK 5105.59 W7  8 WEEK LOAN  AVAILABLE
39
Mark
  Elementary information security
Smith, Richard E., 1952- author.
Burlington, Massachusetts : Jones & Bartlett Learning, 2016. -Access this resource online
2016
EBOOKS
40
Mark
  Elementary information security
Smith, Richard E., 1952- author.
Burlington, MA : Jones & Bartlett Learning, [2016]  
2016
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL Reading Room 1st floor HDC  QA76.9.A25 S652 2016  4 WEEK LOAN  AVAILABLE
41
Mark
  Enterprise security : IT security solutions : concepts, practical experiences, technologies

Erlangen : Publicis Corporate, 2006.  
2006
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL Teaching Reserve  658.4038011 FUM  UNTIL CLOSING  ASK at the Reading Room
42
Mark
  Fighting computer crime : a new framework for protecting information.
Parker, Donn B.
Chichester : J. Wiley, 1998.  
1998
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL Teaching Reserve  658.478 PAR  UNTIL CLOSING  ASK at the Reading Room
43
Mark
  Fundamentals of information systems security
Kim, David (Information technology security consultant)
Burlington, Mass. : Jones & Bartlett Learning, c2014.  
c2014
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL Reading Room 1st floor HDC  QA76.9.A25 K536 2014  4 WEEK LOAN  AVAILABLE
44
Mark
  Google hacking for penetration testers. Volume 2
Long, Johnny.
Burlington, MA : Syngress Pub., c2008.  
c2008
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL Reading Room Mezzanine  025.04 LON  4 WEEK LOAN  AVAILABLE
45
Mark
  Hackers
Levy, Steven.
Farnham : O'Reilly, c2010.  
c2010
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL Reading Room Mezzanine  364.168 LEV  4 WEEK LOAN  AVAILABLE
46
Mark
  Hacking exposed. Web applications : web application security secrets and solutions
Scambray, Joel.
London : McGraw-Hill, c2011.  
c2011
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL Reading Room Mezzanine  005.8 SCA  4 WEEK LOAN  AVAILABLE
47
Mark
  Hacking exposed. Web applications : web application security secrets and solutions
Scambray, Joel.
New York ; London : McGraw-Hill, c2011. -Access this resource online
c2011
EBOOKS
48
Mark
  Hacking : the art of exploitation
Erickson, Jon, 1977-
San Francisco, Calif. : No Starch, 2007.  
2007
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL Reading Room 1st floor HDC  QA 76.9 A25 E6  4 WEEK LOAN  DUE 13-05-24
49
Mark
  Implementing biometric security
Chirillo, John, 1970-
New York : Wiley, 2003.  
2003
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL Reading Room Mezzanine  005.8 CHI  4 WEEK LOAN  AVAILABLE
50
Mark
  Implementing SSH : strategies for optimizing the secure shell
Dwivedi, Himanshu.
New York : Wiley, c2004.  
c2004
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL Reading Room Mezzanine  005.8 DWI  4 WEEK LOAN  AVAILABLE
Save marked records Save all on page
Locate in results
Result Page