Your search returned 56 results.

1.
Computer security handbook / by R. A. Elbra.

by Elbra, R. A.

Publication details: NCC Blackwell 1992Availability: Items available for loan: HELP UNIVERSITY (HU)Call number: QA76.9 A25Elb. (1).

2.
Protection and security on the information superhighway / Frederick B. Cohen.

by Cohen, Frederick B.

Publication details: J. Wiley 1995Availability: Items available for loan: HELP UNIVERSITY (HU)Call number: QA76.9 A25Coh. (1).

3.
Computer security management / Karen A. Forcht.

by Forcht, Karen A.

Publication details: Boyd & Fraser 1994Availability: Items available for loan: HELP UNIVERSITY (HU)Call number: QA76.9 A25For. (1).

4.
Cryptography and network security : principles and practice / William Stallings.

by Stallings, William.

Edition: 2nd ed.Publication details: Prentice Hall International 1999Availability: Items available for loan: FOUNDERS LIBRARY (S2)Call number: TK5105.59 Sta. (1).

6.
Digital certificates : applied Internet security / Jalal Feghhi, Jalil Feghhi, Peter Williams.

by Feghhi, Jalal | Feghhi, Jalil; Williams, Peter.

Publication details: Addison-Wesley 1999Availability: Items available for loan: FOUNDERS LIBRARY (S2)Call number: TK5105.875 I57Feg. (1).

7.
Basic methods of crytography / Jan C. A. van der Lubbe.

by Lubbe, Jan C. A. van der.

Publication details: Cambridge University Press 1998Availability: Items available for loan: HELP UNIVERSITY (HU)Call number: QA76.9 A25Lub. (1).

9.
E-policy : how to develop computer, e-mail, and Internet guidelines to protect your company and its assets / Michael R. Overly.

by Overly, Michael R.

Publication details: AMACOM 1999Availability: Items available for loan: HELP UNIVERSITY (HU)Call number: HD30.38 Ove. (1).

10.
Hacking exposed : network security secrets and solutions / Stuart McClure, Joel Scambray, George Kurtz.

by McClure, Stuart | Scambray, Joel; Kurtz, George.

Publication details: Osborne/McGraw-Hill 1999Availability: Items available for loan: HELP UNIVERSITY (HU)Call number: QA76.9 A25Mac. (1).

11.
Hacking exposed : network security secrets & solutions / Joel Scambray, Stuart McClure, George Kurtz.

by Scambray, Joel | McClure, Stuart; Kurtz, George.

Edition: 2nd ed.Publication details: Osborne/McGraw-Hill 2001Availability: Items available for loan: HELP UNIVERSITY (HU)Call number: QA76.9 A25Sca. (1).

15.
Crytography for dummies / by Chey Cobb.

by Cobb, Chey.

Publication details: J. Wiley 2004Availability: Items available for loan: FOUNDERS LIBRARY (S2)Call number: TK5105.59 Cob. (1).

16.
Cryptography and network security : principles and practice / William Stallings.

by Stallings, William.

Edition: 3rd ed.Publication details: Prentice Hall/Pearson Education 2003Availability: Items available for loan: FOUNDERS LIBRARY (S2)Call number: TK5105.59 Sta. (1).

17.
Corporate computer and network security / Raymond R. Panko.

by Panko, Raymond R.

Publication details: Pearson/Prentice Hall 2004Availability: Items available for loan: HELP UNIVERSITY (HU)Call number: QA76.9 A25Pan. (1).

18.
(The) art of intrusion : the real stories behind the exploits of hackers, intruders and deceivers / Kevin D. Mitnick, William L. Simon.

by Mitnick, Kevin D | Simon, William L.

Publication details: J. Wiley 2005Availability: Items available for loan: HELP UNIVERSITY (HU)Call number: QA76.9 A25Mit. (1).

19.
Computer security fundamentals / Chuck Easttom.

by Easttom, Chuck.

Publication details: Pearson/Prentice Hall 2006Availability: Items available for loan: HELP UNIVERSITY (HU)Call number: QA76.9 A25Eas. (1).

20.
(The) Database hacker's handbook : defending database servers / David Litchfield..... [ et al. ].

by Litchfield, David.

Publication details: Wiley Publishing 2005Availability: Items available for loan: HELP UNIVERSITY (HU)Call number: TK5105.59 Dat. (1).

Copyright © 2023 HELP Learning Resource Centre. All Rights Reserved.

Powered by Koha