Click Here for Subscribed Journals

Your search returned 19 results.

Sort
Results
1. Monographs
Applied cryptography : protocols, algorithms, and source code in C / Bruce Schneier. by
Edition: 2nd ed.
Publication details: New York : Wiley, c1996
Availability: Items available for loan: Technology (N) Library (11)Location, call number: QA76.9.A25 S35 1996, ...
2.
Security in computing / Charles P. Pfleeger. by
Edition: 2nd ed.
Publication details: Upper Saddle River, NJ : Prentice Hall PTR, c1997
Availability: Items available for loan: Science Library (2)Location, call number: QA76.9.A25 P45 1997, ...
3.
LAN times guide to security and data integrity / Marc Farley, Tom Stearns, and Jeffrey Hsu. by
Publication details: Berkeley, Calif. : Osborne McGraw-Hill, c1996
Other title:
  • Guide to security and data integrity
Availability: Items available for loan: Science Library (1)Location, call number: Book Cart TK5105.59. F37.
4.
Wireless security : models, threats, and solutions / Randall K. Nichols, Panos C. Lekkas. by Series: McGraw-Hill telecom professional
Publication details: New York ; London : McGraw-Hill, c2002
Availability: Items available for loan: Technology North Library (7)Location, call number: TK5102.85.N53, ...
5. Monographs
Network security : private communication in a public world / Charlie Kaufman, Radia Perlman, Mike Speciner. by Series: Prentice Hall series in computer networking and distributed systems
Edition: [2nd ed.].
Publication details: Upper Saddle River, NJ : Prentice Hall PTR, c2002
Availability: Items available for loan: Technology North Library (5).
6. Monographs
Network security essentials : applications and standards / William Stallings. by
Edition: 3rd ed.
Publication details: Upper Saddle River, NJ : Pearson Education, c2007
Availability: Items available for loan: John F. Kennedy Memorial Library (1). Not available: John F. Kennedy Memorial Library: In transit (1).
7. Monographs
Computer security basics / Rick Lehtinen, Deborah Russell and G.T. Gangemi, Sr. by
Edition: 2nd ed.
Publication details: Sebastopol, CA : O'Reilly & Associates, c2006.
Availability: Items available for loan: Science Library (4)Location, call number: Book Cart QA76.9.A25R87 2006, ...
8. Monographs
Contemporary cryptology : the science of information integrity / edited by Gustavus J. Simmons. by
Publication details: Piscataway, NJ : IEEE Press, c1992
Availability: Items available for loan: Technology North Library (2)Location, call number: QA76.9.A25C6678, ...
9. Monographs
Foundations of computer security / David Salomon. by
Publication details: London : Springer, c2006
Online resources:
Availability: Items available for loan: Science Library (4)Location, call number: QA76.9.A25 S266, ...
10. Monographs
The shellcoder's handbook : discovering and exploiting security holes / Chris Anley ... [et al.]. by
Edition: 2nd ed.
Publication details: Indianapolis, IN : Wiley Technology Pub., 2007
Availability: Items available for loan: Technology North Library (2)Location, call number: Book Cart QA76.9.A25 S464 2007, ...
Pages