Your search returned 53 results.

Sort
Results
1.
Cryptography engineering : design principles and practical applications / Niels Ferguson, Bruce Schneier, Tadayoshi Kohno. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Indianapolis, IN : Wiley Publishing, Inc, 2010
Availability: Items available for loan: The Knowledge Hub Library (1)Call number: 005.824 FE.C 2010.

2.
Guide to vulnerability analysis for computer networks and systems : an artifical intelligence approach / Simon Parkinson, Andrew Crampton, Richard Hill, editors. by Series: Computer communications and networks
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Cham, Switzerland : Springer Berlin Heidelberg, 2018
Availability: Items available for loan: The Knowledge Hub Library (1)Call number: 005.8 PA.G 2018.

3.
Digital forensics and investigations : people, processes, and technologies to defend the enterprise / Jason Sachowski. by
Material type: Text Text; Literary form: Not fiction
Publisher: Boca Raton, FL : CRC Press, Taylor and Francis Group, 2018
Availability: Items available for reference: The Knowledge Hub Library : Not For Loan (1)Call number: 363.25968 SA.D 2018.

4.
Black hat Python : Python programming for hackers and pentesters / by Justin Seitz. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: San Francisco : No Starch Press, 2015
Other title:
  • Python programming for hackers and pentesters
Online resources:
Availability: Items available for loan: The Knowledge Hub Library (1)Call number: 005.8 SE.B 2015.

5.
Hacking : the art of exploitation / Jon Erickson. by
Edition: Second edition.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: California : William Pollock, 2008
Availability: Items available for loan: The Knowledge Hub Library (2)Call number: 005.8 / ER.H 2008, ...

6.
Information security management principles / Andy Taylor ; David Alexander, Amanda Finch and David Sutton. by
Edition: Second edition.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Swindon, UK : BCS, the Chartered Institute for IT, 2013
Online resources:
Availability: Items available for reference: The Knowledge Hub Library : Not For Loan (1)Call number: 658.478 TA.I 2013.
Lists:

7.
Cryptography and network security : principles and practice / William Stallings. by
Edition: Seventh edition, Global edition.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Boston : Pearson, 2017
Online resources:
Availability: Items available for reference: The Knowledge Hub Library : Not For Loan (1)Call number: 005.82 ST.C 2017.

8.
Gray hat hacking : the ethical hacker's handbook / Dr. Allen Harper, Daniel Regalado, Ryan Linn, Stephen Sims, Branko Spasojevic, Linda Martinez, Michael Baucom, Chris Eagle, Shon Harris. by
Edition: Fifth edition.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: New York : McGraw-Hill Education, [2018]
Availability: Not available: The Knowledge Hub Library : Checked out (1).

9.
Serious cryptography : a practical introduction to modern encryption / Jean-Philippe Aumasson ; foreword by Matthew D. Green. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: San Francisco : No Starch Press, 2018
Availability: Items available for loan: The Knowledge Hub Library (1)Call number: 005.824 AU.S 2018.

10.
Reversing : secrets of reverse engineering / Eldad Eilam. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Indianapolis, IN : Wiley Publishing, Inc, 2005
Online resources:
Availability: Items available for reference: The Knowledge Hub Library : Not For Loan (5)Call number: 005.1 EI.R 2005, ...

11.
Guide to computer forensics and investigations / Bill Nelson, Amelia Phillips, Chris Steuart. by
Edition: Sixth edition.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Boston, MA : Cengage, 2019
Availability: Items available for loan: The Knowledge Hub Library (2)Call number: 005.8 NE.G 2019, ...

12.
Threat modeling : designing for security / Adam Shostack. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Indianapolis, IN : Wiley, 2014
Online resources:
Availability: Items available for loan: The Knowledge Hub Library (1)Call number: 005.8 SH.T 2014.

13.
Hands-on ethical hacking and network defense / Michael T. Simpson, Nicholas Antill. by
Edition: Third edition.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Australia ; Boston, MA : Cengage Learning, 2017
Online resources:
Availability: Items available for loan: The Knowledge Hub Library (2)Call number: 005.8 SI.H 2017, ...

14.
Introduction to modern cryptography / Jonathan Katz, Yehuda Lindell, by Series: Chapman & Hall/CRC cryptography and network security | Chapman & Hall/CRC cryptography and network security
Edition: Second edition.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Boca Raton : CRC Press, Taylor & Francis, 2015
Online resources:
Availability: Items available for reference: The Knowledge Hub Library : Not For Loan (1)Call number: 005.82 KA.I 2015.

15.
Network security essentials : applications and standards / William Stallings. by
Edition: Sixth edition, Global edition.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Boston : Pearson, 2017
Availability: Items available for loan: The Knowledge Hub Library (1)Call number: 005.8 ST.N 2014.

16.
Computer security : art and science / Matt Bishop ; with contributions from Elisabeth Sullivan and Michelle Ruppel. by
Edition: Second edition.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Boston : Addison-Wesley, 2019
Availability: Items available for loan: The Knowledge Hub Library (1)Call number: 005.8 / BI.C 2019.

17.
Cyber security management : a governance, risk and compliance framework / Peter Trim, Yang-Im Lee. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Oxon, England : Routledge, 2016
Availability: Items available for reference: The Knowledge Hub Library : Not For Loan (1)Call number: 658.478 TR.C 2016.

18.
Fundamentals of information systems security / David Kim, Michael G. Solomon. by Series: Jones & Bartlett Learning information systems security & assurance series
Edition: Third edition.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Burlington, MA : Jones & Bartlett Learning, 2018
Availability: Items available for loan: The Knowledge Hub Library (1)Call number: 005.8 KI.F 2018.

19.
Cyber security : law and guidance / Helen Wong. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: London : Bloomsbury Professional, 2018
Online resources:
Availability: Items available for loan: The Knowledge Hub Library (8)Call number: 005.8 MB.C 2018, ...
Lists:

20.
Computer security / Dieter Gollmann. by
Edition: Third edition.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Chichester, West Sussex : Wiley, 2011
Online resources:
Availability: Items available for loan: The Knowledge Hub Library (11)Call number: 005.8 GO.C 2011, ...

Pages