Your search returned 38 results.

Sort
Results
1.
Guide to vulnerability analysis for computer networks and systems : an artifical intelligence approach / Simon Parkinson, Andrew Crampton, Richard Hill, editors. by Series: Computer communications and networks
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Cham, Switzerland : Springer Berlin Heidelberg, 2018
Availability: Items available for loan: The Knowledge Hub Library (1)Call number: 005.8 PA.G 2018.

2.
Hacking : the art of exploitation / Jon Erickson. by
Edition: Second edition.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: California : William Pollock, 2008
Availability: Items available for loan: The Knowledge Hub Library (2)Call number: 005.8 / ER.H 2008, ...

3.
Cryptography and network security : principles and practice / William Stallings. by
Edition: Seventh edition, Global edition.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Boston : Pearson, 2017
Online resources:
Availability: Items available for reference: The Knowledge Hub Library : Not For Loan (1)Call number: 005.82 ST.C 2017.

4.
Serious cryptography : a practical introduction to modern encryption / Jean-Philippe Aumasson ; foreword by Matthew D. Green. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: San Francisco : No Starch Press, 2018
Availability: Items available for loan: The Knowledge Hub Library (1)Call number: 005.824 AU.S 2018.

5.
The Mobile application hacker's handbook / Dominic Chell, Tyrone Erasmus, Shaun Colley, Ollie Whitehouse. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Indianapolis, IN : Wiley, 2015
Online resources:
Availability: Items available for loan: The Knowledge Hub Library (1)Call number: 005.8 / CH.M 2015.

6.
Threat modeling : designing for security / Adam Shostack. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Indianapolis, IN : Wiley, 2014
Online resources:
Availability: Items available for loan: The Knowledge Hub Library (1)Call number: 005.8 SH.T 2014.

7.
Hands-on ethical hacking and network defense / Michael T. Simpson, Nicholas Antill. by
Edition: Third edition.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Australia ; Boston, MA : Cengage Learning, 2017
Online resources:
Availability: Items available for loan: The Knowledge Hub Library (2)Call number: 005.8 SI.H 2017, ...

8.
Network security essentials : applications and standards / William Stallings. by
Edition: Sixth edition, Global edition.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Boston : Pearson, 2017
Availability: Items available for loan: The Knowledge Hub Library (1)Call number: 005.8 ST.N 2014.

9.
Cyber security management : a governance, risk and compliance framework / Peter Trim, Yang-Im Lee. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Oxon, England : Routledge, 2016
Availability: Items available for reference: The Knowledge Hub Library : Not For Loan (1)Call number: 658.478 TR.C 2016.

10.
Fundamentals of information systems security / David Kim, Michael G. Solomon. by Series: Jones & Bartlett Learning information systems security & assurance series
Edition: Third edition.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Burlington, MA : Jones & Bartlett Learning, 2018
Availability: Items available for loan: The Knowledge Hub Library (1)Call number: 005.8 KI.F 2018.

11.
Applied cryptography : protocols, algorithms, and source code in C / Bruce Schneier. by
Edition: Second edition.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: New York : Wiley, 1996
Availability: Items available for loan: The Knowledge Hub Library (1)Call number: 005.82 SC.A 1996 G.C.

12.
Cryptography for dummies / by Chey Cobb. by Series: --For dummies | --For dummies
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Hoboken, NJ : Wiley Pub., 2004
Availability: Items available for loan: The Knowledge Hub Library (1)Call number: 005.8 CO.C 2004 G.C.

13.
Computer security : protecting digital resources / Robert C. Newman. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Sudbury, Massachusetts : Jones and Bartlett Publishers, 2010
Availability: Items available for loan: The Knowledge Hub Library (1)Call number: 005.8 NE.C 2010 G.C.

14.
Invasion of privacy : big brother and the company hackers / Michael J. Weber by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Boston : Premier Press, 2004
Availability: Items available for loan: The Knowledge Hub Library (1)Call number: 323.4483 WE.I 2004 G.C.

15.
Mapping security : the corporate security sourcebook for today's global economy / Tom Patterson with Scott Gleeson Blue. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Upper Saddle River, NJ : Addison-Wesley, 2005
Availability: Items available for loan: The Knowledge Hub Library (1)Call number: 658.478 PA.M 2005 G.C.

16.
Computer security assurance using the common criteria / Mark S. Merkow and Jim Breithaupt. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Clifton Park, NY : Thompson Delmar Learning, 2005
Availability: Items available for loan: The Knowledge Hub Library (1)Call number: 005.8 ME.C 2005 G.C.

17.
Network security for dummies / by Chey Cobb. by Series: --For dummies | --For dummies
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Indianapolis, IN : Wiley , 2003
Availability: Items available for loan: The Knowledge Hub Library (1)Call number: 005.8 CO.N 2003 G.C.

18.
Network access control for dummies / by Jay Kelley, Rich Campagna, Denzil Wessels. by Series: --For dummies
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Hoboken, N.J. : Wiley, 2009
Availability: Items available for loan: The Knowledge Hub Library (1)Call number: 005.8 KE.N 2009 G.C.

19.
Crimeware : understanding new attacks and defenses / Markus Jakobsson, Zulfikar Ramzan. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Upper Saddle River, NJ : Addison-Wesley, 2008
Availability: Items available for loan: The Knowledge Hub Library (1)Call number: 005.8 JA.C 2008 G.C.

20.
Applied security visualization / Raffael Marty. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Upper Saddle River, NJ : Addison-Wesley, 2009
Availability: Items available for loan: The Knowledge Hub Library (1)Call number: 005.8 MA.A 2009 G.C.

Pages