Your search returned 11 results.

Sort
Results
Cryptography and network security: principles and practice. (6th ed.) by William Stallings

by Stallings, William.

Edition: 6th ed.Publication details: Edinburgh Pearson Education Limited 2014Availability: Items available for loan: CBU-MAIN LIBRARY, KITWE. (1) . Collection(s): Call number: TK 5105.59 Sta.

Google hacking for penetration testers Johnny Long

by Long, Johnny.

Publication details: Rockland, MA Syngress 2005Availability: Items available for loan: CBU-MAIN LIBRARY, KITWE. (1) . Collection(s): Call number: TK 5105.885 Lon.

Hack proofing: Sun Solaris 8 Wyman Miles...[and others]

by Miles, Wyman.

Publication details: Rockland, MA Syngress 2001Availability: Items available for loan: CBU-MAIN LIBRARY, KITWE. (1) . Collection(s): Call number: QA 76.9.A25 Hac.

How to cheat at managing information security. by Mark Osborne

by Osborne, Mark.

Publication details: Rockland, MA Syngress 2006Availability: Items available for loan: CBU-MAIN LIBRARY, KITWE. (1) . Collection(s): Call number: QA 76.6.A25 Osb.

Protect your privacy on the Internet [cd-rom]

by Pfaffenberger, Bryan.

Publication details: New York John Wiley and Sons 1997Online access: Click here for electornic version Availability: Items available for loan: CBU-MAIN LIBRARY, KITWE. (1) . Collection(s): Call number: CD/TK 5105.875.I57 Pfa.

Protect your privacy on the Internet

by Pfaffenberger, Bryan.

Publication details: New York John Wiley and Sons 1997Online access: Click here for electornic version Availability: Items available for loan: CBU-MAIN LIBRARY, KITWE. (1) . Collection(s): Call number: TK 5105.875.I57 Pfa.

The web application hacker's handbook: discovering and exploiting security flaws Dafydd Stuttard and Marcus Pinto

by Stuttard, Dafydd | Pinto, Marcus.

Publication details: Indianapolis, IN John Wiley and Sons 2008Availability: Items available for loan: CBU-MAIN LIBRARY, KITWE. (1) . Collection(s): Call number: TK 5105.875.I57 Stu.

Windows server 2012 security from end to end to edge and beyond: architecting, designing, and deploying windows server 2012 security solutions by Thomas W Shinder, Yuri Diogenes and Debra L. Shinder

by Diogenes, Yuri | Shinder, Thomas W | Shinder, D.L.

Publication details: Amsterdam Syngress Publications 2013Availability: Items available for loan: CBU-MAIN LIBRARY, KITWE. (1) . Collection(s): Call number: QA 76.774.M434 Shi.

Windows server 2003: security infrastructures Jan De Clercq

by Clercq, Jan De.

Publication details: Elsevier Digital Press 2004Availability: Items available for loan: CBU-MAIN LIBRARY, KITWE. (1) . Collection(s): Call number: QA 76.76.O63 Cle.

Writing security tools and exploits James C. Foster; Vincent Liu

by Foster, James C | Liu, Vincent.

Publication details: Rockland Syngress 2006Availability: Items available for loan: CBU-MAIN LIBRARY, KITWE. (1) . Collection(s): Call number: QA 76.9.A25 Fos.

Foundations of computer security by David Salmon

by Salomon, David.

Publication details: London: Springer 2006Availability: Items available for loan: CBU-MAIN LIBRARY, KITWE. (1) . Collection(s): Call number: QA 76.9.A25 Sal.

Pages
Not finding what you're looking for?