Library
Your session will expire automatically in
0
seconds.
Continue session
End session now
SearchType
TITLE
KEYWORD
AUTHOR
SUBJECT
BJL CLASSMARK
KDL CLASSMARK
PERIODICAL TITLE
ISN
RESOURCE NAME
RESOURCE SUBJECT
Search
Search Scope
BJL, Hull
KDL, Scarborough
All Libraries
Limit search to available items
Result Page
1
2
Next
SUBJECTS (1-50 of 51)
Computer Networks Security Measures
1
Mark
Advances in cyber security : technology, operations, and experiences
New York : Fordham University Press, 2013.
Access this resource online
2013
EBOOKS
2
Mark
Building open source network security tools : components and techniques.
Schiffman, Mike D.
New York : Wiley Publishing, Inc., 2002.
2002
BOOK
LOCATION
SHELVED AT
LOAN TYPE
STATUS
BJL Reading Room Mezzanine
005.8 SCH
4 WEEK LOAN
AVAILABLE
3
Mark
Computer forensics : computer crime scene investigation
Vacca, John R.
Hingham, Mass. : Charles River Media, 2002.
2002
BOOK
LOCATION
SHELVED AT
LOAN TYPE
STATUS
BJL Reading Room 1st floor HDC
QA 76.9 A25 V1
4 WEEK LOAN
AVAILABLE
4
Mark
Computer forensics : incident response essentials
Kruse, Warren G.
Boston, Mass. : Addison-Wesley, 2002.
2002
BOOK
LOCATION
SHELVED AT
LOAN TYPE
STATUS
BJL Reading Room Mezzanine
363.2502854 KRU
4 WEEK LOAN
AVAILABLE
5
Mark
Computer security : a hands-on approach
Du, Wenliang, author.
[Atascadero, California] : CreateSpace, [2017]
2017
BOOK
LOCATION
SHELVED AT
LOAN TYPE
STATUS
BJL 3rd Floor
QA76.9.A25 D8 2017
8 WEEK LOAN
AVAILABLE
6
Mark
Computer security : principles and practice
Stallings, William.
Harlow, Essex, England : Pearson, [2015]
2015
BOOK
LOCATION
SHELVED AT
LOAN TYPE
STATUS
BJL Reading Room 1st floor HDC
QA76.9.A25 S73 2015
4 WEEK LOAN
AVAILABLE
7
Mark
Computer security : protecting digital resources
Newman, Robert C., author.
Sudbury, Mass. : Jones and Bartlett Publishers, c2010.
c2010
BOOK
LOCATION
SHELVED AT
LOAN TYPE
STATUS
BJL Reading Room 1st floor HDC
QA 76.9 D314 N5
4 WEEK LOAN
AVAILABLE
8
Mark
Cryptography and network security : principles and practice
Stallings, William.
Upper Saddle River, N.J. : Pearson/Prentice Hall, c2006.
c2006
BOOK
LOCATION
SHELVED AT
LOAN TYPE
STATUS
BJL 3rd Floor
TK 5105.59 S7
8 WEEK LOAN
AVAILABLE
9
Mark
Current security management & ethical issues of information technology
Hershey, Pa : IRM Press, c2003.
c2003
BOOK
LOCATION
SHELVED AT
LOAN TYPE
STATUS
BJL 3rd Floor
QA 76.9 A25 C9
8 WEEK LOAN
AVAILABLE
10
Mark
Current security management & ethical issues of information technology
Hershey, Pa : IRM, c2003.
Access this resource online
c2003
EBOOKS
11
Mark
Cybersecurity, attack and defense strategies : infrastructure security with Red Team and Blue Team t
Diogenes, Yuri.
Birmingham : Packt Publishing, 2018.
Access this resource online
2018
EBOOKS
12
Mark
Cyberterrorism : the use of the Internet for terrorist purposes.
Strasbourg : Council of Europe Publishing, c2007.
c2007
BOOK
LOCATION
SHELVED AT
LOAN TYPE
STATUS
BJL Reading Room 1st floor HDC
HV 6773.15 C97 C9
4 WEEK LOAN
AVAILABLE
13
Mark
Digital cash : commerce on the Net.
Wayner, Peter, 1964-
Boston, Mass. : AP Professional, 1996.
1996
BOOK
LOCATION
SHELVED AT
LOAN TYPE
STATUS
BJL 5th Floor
HG 1710 W3
8 WEEK LOAN
AVAILABLE
14
Mark
Disappearing cryptography : being and nothingness on the Net.
Wayner, Peter, 1964-
Boston, Mass. : AP Professional, 1996.
1996
BOOK
LOCATION
SHELVED AT
LOAN TYPE
STATUS
BJL 3rd Floor
TK 5105.59 W3
8 WEEK LOAN
AVAILABLE
15
Mark
Elementary information security
Smith, Richard E., 1952- author.
Burlington, Massachusetts : Jones & Bartlett Learning, 2016.
Access this resource online
2016
EBOOKS
16
Mark
Google hacking for penetration testers. Volume 2
Long, Johnny.
Burlington, MA : Syngress Pub., c2008.
c2008
BOOK
LOCATION
SHELVED AT
LOAN TYPE
STATUS
BJL Reading Room Mezzanine
025.04 LON
4 WEEK LOAN
AVAILABLE
17
Mark
Hack attacks revealed : a complete reference with custom security hacking toolkit.
Chirillo, John, 1970-
New York ; Chichester : Wiley, 2002.
2002
BOOK
LOCATION
SHELVED AT
LOAN TYPE
STATUS
BJL Reading Room Mezzanine
005.8 CHI
4 WEEK LOAN
AVAILABLE
18
Mark
Hacking exposed : network security secrets and solutions
McClure, Stuart.
Berkeley, Calif. : Osborne, 1999.
1999
BOOK
LOCATION
SHELVED AT
LOAN TYPE
STATUS
BJL Reading Room Mezzanine
005.8 MCC
4 WEEK LOAN
AVAILABLE
19
Mark
Hacking : the art of exploitation
Erickson, Jon, 1977-
San Francisco, Calif. : No Starch, 2007.
2007
BOOK
LOCATION
SHELVED AT
LOAN TYPE
STATUS
BJL Reading Room 1st floor HDC
QA 76.9 A25 E6
4 WEEK LOAN
DUE 13-05-24
20
Mark
High noon on the electronic frontier : conceptual issues in cyberspace.
Ludlow, Peter, 1957-
London : MIT Press, 1996.
1996
BOOK
LOCATION
SHELVED AT
LOAN TYPE
STATUS
BJL Reading Room Mezzanine
302.23 LUD
4 WEEK LOAN
AVAILABLE
21
Mark
How to break web software : functional and security testing of web applications and web services
Andrews, Mike.
Harlow : Addison-Wesley, 2006.
2006
BOOK
LOCATION
SHELVED AT
LOAN TYPE
STATUS
BJL 3rd Floor
QA 76.76 T48 A5
8 WEEK LOAN
AVAILABLE
22
Mark
Implementing intrusion detection systems : a hands-on guide for securing the network
Crothers, Tim.
Indianapolis, IN : Wiley Publishing, 2003.
2003
BOOK
LOCATION
SHELVED AT
LOAN TYPE
STATUS
BJL Reading Room 1st floor HDC
TK 5105.59 C9
4 WEEK LOAN
AVAILABLE
23
Mark
Information security risk analysis
Peltier, Thomas R.
London : Auerbach, c2001.
c2001
BOOK
LOCATION
SHELVED AT
LOAN TYPE
STATUS
BJL Reading Room 1st floor HDC
QA 76.9 A25 P3
4 WEEK LOAN
AVAILABLE
24
Mark
Innocent code a security wake-up call for Web programmers
Huseby, Sverre H.
Chichester : Wiley, c2004.
Access this resource online
c2004
EBOOKS
25
Mark
Insider threat : protecting the enterprise from sabotage, spying, and theft
Cole, Eric.
Rockland, Mass. : Syngress, 2006.
2006
BOOK
LOCATION
SHELVED AT
LOAN TYPE
STATUS
BJL 3rd Floor
TK 5105.59 C6
8 WEEK LOAN
AVAILABLE
26
Mark
The internet security guidebook : from planning to deployment
Ellis, Juanita.
San Diego : Academic Press, 2001.
2001
BOOK
LOCATION
SHELVED AT
LOAN TYPE
STATUS
BJL 3rd Floor
TK 5105.59 E4
8 WEEK LOAN
AVAILABLE
27
Mark
Internet security protocols : protecting IP traffic.
Black, Uyless.
Upper Saddle River, NJ : Prentice Hall, 2000.
2000
BOOK
LOCATION
SHELVED AT
LOAN TYPE
STATUS
BJL Reading Room Mezzanine
005.8 BLA
4 WEEK LOAN
AVAILABLE
28
Mark
Introduction to computer and network security : navigating shades of gray
Brooks, Richard R.
London : CRC Press, 2013.
Access this resource online
2013
EBOOKS
29
Mark
Java cryptography.
Knudsen, Jonathan.
Cambridge : O'Reilly and Associates, 1998.
1998
BOOK
LOCATION
SHELVED AT
LOAN TYPE
STATUS
BJL Reading Room Mezzanine
005.82 KNU
4 WEEK LOAN
AVAILABLE
30
Mark
Network intrusion detection : an analyst's handbook
Northcutt, Stephen.
Indianapolis, Ind. : New Riders, 2000.
2000
BOOK
LOCATION
SHELVED AT
LOAN TYPE
STATUS
BJL 3rd Floor
TK 5105.59 N8
8 WEEK LOAN
AVAILABLE
31
Mark
Network security a decision and game-theoretic approach
Alpcan, Tansu, 1975-
Cambridge : Cambridge University Press, c2011.
Access this resource online
c2011
EBOOKS
32
Mark
Network security assessment
McNab, Chris (Chris R.), 1980-
Sebastopol, Calif. : O'Reilly, c2004.
c2004
BOOK
LOCATION
SHELVED AT
LOAN TYPE
STATUS
BJL Reading Room Mezzanine
005.8 MCN
4 WEEK LOAN
AVAILABLE
33
Mark
The personal internet security guidebook : keeping hackers and crackers out of your home.
Speed, Tim.
San Diego, Calif. : Academic Press, 2002.
2002
BOOK
LOCATION
SHELVED AT
LOAN TYPE
STATUS
BJL Reading Room Mezzanine
005.8 SPE
4 WEEK LOAN
AVAILABLE
34
Mark
Practical computer network security.
Hendry, Mike.
Boston, Mass. : Artech House, 1995.
1995
BOOK
LOCATION
SHELVED AT
LOAN TYPE
STATUS
BJL 3rd Floor
TK 5105.59 H4
8 WEEK LOAN
AVAILABLE
35
Mark
Practical firewalls.
Ogletree, Terry.
Indianapolis, Ind. : Que, 2000.
2000
BOOK
LOCATION
SHELVED AT
LOAN TYPE
STATUS
BJL Reading Room Mezzanine
005.8 OGL
4 WEEK LOAN
AVAILABLE
36
Mark
Protocol : how control exists after decentralization
Galloway, Alexander R., 1974-
Cambridge, Mass. ; London : MIT, c2004.
c2004
BOOK
LOCATION
SHELVED AT
LOAN TYPE
STATUS
BJL 3rd Floor
TK 5105.59 G1
8 WEEK LOAN
AVAILABLE
37
Mark
Risk, complexity and ICT
Cheltenham ; Northampton, Mass. : Edward Elgar, c2007.
c2007
BOOK
LOCATION
SHELVED AT
LOAN TYPE
STATUS
BJL 3rd Floor
T 58.64 R5
8 WEEK LOAN
AVAILABLE
BJL 3rd Floor
T 58.64 R5
8 WEEK LOAN
AVAILABLE
38
Mark
Risk, complexity and ICT
Cheltenham, UK ; Northampton, MA : E. Elgar, c2007.
Access this resource online
c2007
EBOOKS
39
Mark
Scene of the cybercrime : computer forensics handbook
Shinder, Debra Littlejohn.
Rockland, Mass. : Syngress, c2002.
c2002
BOOK
LOCATION
SHELVED AT
LOAN TYPE
STATUS
BJL Reading Room 1st floor HDC
QA 76.9 A25 S5
4 WEEK LOAN
AVAILABLE
40
Mark
Schneier on security
Schneier, Bruce, 1963-
Indianapolis, Ind. : Wiley, c2008.
Access this resource online
c2008
EBOOKS
41
Mark
Secrets and lies : digital security in a networked world.
Schneier, Bruce, 1963-
New York : John Wiley, 2000.
2000
BOOK
LOCATION
SHELVED AT
LOAN TYPE
STATUS
BJL 3rd Floor
QA 76.9 A25 S3
8 WEEK LOAN
AVAILABLE
42
Mark
Secrets and lies digital security in a networked world
Schneier, Bruce, 1963-
Indianapolis, Ind. : Wiley, c2004.
Access this resource online
c2004
EBOOKS
43
Mark
Securing the network from malicious code : a complete guide to defending against viruses, worms and
Schweitzer, Douglas, author.
Indianapolis, Ind. : Wiley Publishing, Inc., 2002.
2002
BOOK
LOCATION
SHELVED AT
LOAN TYPE
STATUS
BJL Reading Room 1st floor HDC
TK 5105.59 S4
4 WEEK LOAN
AVAILABLE
44
Mark
Security monitoring
Fry, Chris.
Farnham : O'Reilly, c2009.
c2009
BOOK
LOCATION
SHELVED AT
LOAN TYPE
STATUS
BJL Reading Room Mezzanine
005.8 FRY
4 WEEK LOAN
AVAILABLE
45
Mark
Security warrior
Peikari, Cyrus.
Sebastopol, Calif. : O'Reilly, c2004.
c2004
BOOK
LOCATION
SHELVED AT
LOAN TYPE
STATUS
BJL 3rd Floor
TK 5105.59 P3
8 WEEK LOAN
AVAILABLE
46
Mark
SSH, the secure shell : the definitive guide.
Barrett, D. J.
Sebastopol : O'Reilly, 2000.
2000
BOOK
LOCATION
SHELVED AT
LOAN TYPE
STATUS
BJL Reading Room Mezzanine
005.8 BAR
4 WEEK LOAN
AVAILABLE
47
Mark
Symbian OS platform security : software developing using the Symbian OS security architecture
Heath, Craig.
Chichester : Wiley, c2006.
c2006
BOOK
LOCATION
SHELVED AT
LOAN TYPE
STATUS
BJL 3rd Floor
TK 5105.59 H4
8 WEEK LOAN
AVAILABLE
48
Mark
TCP/IP network administration.
Hunt, Craig.
Sebastopol, Calif. : O'Reilly, 2002.
2002
BOOK
LOCATION
SHELVED AT
LOAN TYPE
STATUS
BJL 3rd Floor
TK 5105.585 H9
8 WEEK LOAN
AVAILABLE
49
Mark
Wars of disruption and resilience : cybered conflict, power, and national security
Demchak, Chris C., author.
Athens : University of Georgia Press, ©2011.
Access this resource online
2011
EBOOKS
50
Mark
Web security.
Cormack, Andrew.
London : Joint Information Systems Committee, 1997.
1997
BOOK
LOCATION
SHELVED AT
LOAN TYPE
STATUS
BJL Reading Room Mezzanine
OS 005.8 COR
4 WEEK LOAN
AVAILABLE
Result Page
1
2
Next