005.8 BIS : Bishop, David,
Introduction to cryptography with Java applets / David Bishop.
Bishop, David,;
Main Stack Moylish:AVAILABLE
2003
005.8 BRO
Programming Windows security / Keith Brown.
Brown, Keith,;
Main Stack Moylish:AVAILABLE
c2000
Computer evidence : collection & preservation / Christopher L.T. Brown.
Brown, Christopher L. T.;
Main Stack Moylish:AVAILABLE
c2006
Programming Windows security / Keith Brown.
Brown, Keith,;
Main Stack Moylish:AVAILABLE
c2000
005.8 BUN : Bunting, Steve.
EnCase computer forensics : the official EnCE EnCase certified examiner study guide / Steve Bunting.
Bunting, Steve.;
Main Stack Moylish:AVAILABLE
2007
005.8 CAR
Nessus network auditing / Russ Rogers, technical editor ; Mark Carey, Paul Criscuolo, Mike Petruzzi.
Carey, Mark.;
Main Stack Moylish:AVAILABLE
c2008
Windows forensic analysis : DVD toolkit, / Harlan Carvey.
Carvey, Harlan A.;
Main Stack Moylish:AVAILABLE
c2007
Windows forensic analysis DVD toolkit 2E / Harlan Carvey ; Eoghan Casey, technical editor.
Carvey, Harlan A.;
Main Stack Moylish:AVAILABLE
c2009
005.8 CAS
Handbook of computer crime investigation : forensic tools and technology / edited by Eoghan Casey.
Main Stack Moylish:AVAILABLE
c2002
Handbook of computer crime investigation : forensic tools and technology / edited by Eoghan Casey.
Main Stack Moylish:AVAILABLE
c2002
005.8 CHA : Chapman, David
Cisco secure PIX firewalls
Chapman, David;
Main Stack Thurles:AVAILABLE
2002
005.8 CHE : Cheswick, William R.
Firewall and Internet security / Repelling the wily hacker REPELLING THE WILEY HACKER
Cheswick, William R.;
Main Stack Thurles:AVAILABLE
1994
005.8 CHI
Access control, security, and trust : a logical approach / Shiu-Kai Chin, Susan Beth Older.
Chin, Shiu-Kai.;
Main Stack Thurles:AVAILABLE
2011
Access control, security, and trust : a logical approach / Shiu-Kai Chin, Susan Beth Older.
Chin, Shiu-Kai.;
Main Stack Thurles:AVAILABLE
2011
005.8 COH : Cohen, Tyler.
Alternate data storage forensics / Tyler Cohen, Amber Schroader.
Cohen, Tyler.;
Main Stack Moylish:AVAILABLE
c2007
005.8 COL : Cole, Eric.
Network security bible / Eric Cole, Ronald Krutz, James W. Conley.
Cole, Eric.;
Main Stack Moylish:AVAILABLE
c2009
005.8 CRO : Crowley, Paul.
CD and DVD forensics / Paul Crowley ; Dave Kleiman, technical editor.
Crowley, Paul.;
Main Stack Moylish:AVAILABLE
c2007
005.8 CRU
Inside Internet Security
Crume, Jeff;
Main Stack Thurles:AVAILABLE
2000
Inside Internet Security
Crume, Jeff;
Main Stack Thurles:AVAILABLE
2000
Inside Internet Security
Crume, Jeff;
Main Stack Thurles:AVAILABLE
2000
Inside Internet Security
Crume, Jeff;
Main Stack Thurles:AVAILABLE
2000
005.8 EAR : Earle, Aaron E.
Wireless security handbook / Aaron E. Earle.
Earle, Aaron E.;
Main Stack Moylish:AVAILABLE
2005
005.8 ECDL : CiA Training Limited
BCS level 2 : certificate for i t users : unit e - unit i t : using microsoft windows xp : micros
CiA Training Limited;
Short Loan Moylish:AVAILABLE
2003
005.8 ERB
Trojans, worms, and spyware : a computer security professional's guide to malicious code / Michael Er
Erbschloe, Michael,;
Main Stack Moylish:AVAILABLE
c2005
Trojans, worms, and spyware : a computer security professional's guide to malicious code / Michael Er
Erbschloe, Michael,;
Main Stack Moylish:AVAILABLE
c2005
005.8 FAD
Unofficial guide to ethical hacking / Ankit Fadia.
Fadia, Ankit,;
Main Stack Moylish:AVAILABLE
c2002
The unofficial guide to ethical hacking / Ankit Fadia.
Fadia, Ankit,
c2006
005.8 FAR
Forensic discovery / Dan Farmer, Wietse Venema.
Farmer, Dan.;
Main Stack Moylish:AVAILABLE
c2005
LAN times guide to security and data integrity Marc Farley, Tom Stearns, and Jeffrey Hsu
Farley, Marc.;
Main Stack Moylish:AVAILABLE
c1996
005.8 FOR
Cryptography and network security / Behrouz A. Forouzan.
Forouzan, Behrouz A.;
Main Stack Moylish:AVAILABLE
2008
Secure electronic commerce : building the infrastructure for digital signatures and encryption / Warw
Ford, Warwick.;
Main Stack Moylish:AVAILABLE
c2001
005.8 GAR : Garfinkel, Simson.
Practical UNIX and Internet security / Simson Garfinkel, Gene Spafford, and Alan Schwartz.
Garfinkel, Simson.
c2003
005.8 GHO : Ghorbani, Ali,
Network intrusion detection and prevention : concepts and techniques / Ali A. Ghorbani, Wei Lu, Mahbo
Ghorbani, Ali,;
Main Stack Moylish:AVAILABLE
c2010
005.8 GOL
Computer security
Gollman, Dieter;
Main Stack Thurles:AVAILABLE
1998
Computer security
Gollman, Dieter;
Main Stack Thurles:AVAILABLE
1998
Computer security / Dieter Gollmann.
Gollmann, Dieter.;
Main Stack Moylish:AVAILABLE
c2006
005.8 GOR
Practical data security / edited by John Gordon.
Main Stack Moylish:AVAILABLE
c1993
Practical data security / edited by John Gordon.
Main Stack Moylish:AVAILABLE
c1993
005.8 HER
A practical guide to security engineering and information assurance / Debra S. Herrmann.
Herrmann, Debra S.;
Main Stack Moylish:AVAILABLE
c2002
A practical guide to security engineering and information assurance / Debra S. Herrmann.
Herrmann, Debra S.;
Main Stack Moylish:AVAILABLE
c2002
Using the common criteria for IT security evaluation / Debra S. Herrmann.
Herrmann, Debra S.
c2003
005.8 HON
Know your enemy : learning about security threats / The Honeynet Project.
Main Stack Moylish:AVAILABLE
c2004
005.8 JAC : Jackson, Chris,
Network security auditing / Chris Jackson.
Jackson, Chris,;
Main Stack Moylish:AVAILABLE
c2010
005.8 JON
Internet forensics / Robert Jones.
Jones, Robert.;
Main Stack Moylish:AVAILABLE
c2006
Risk management for computer security : Protecting your network and information assets / by Andy Jone
Jones, Andy,
c2005
005.8 KAS
Data recovery : tips & solutions : Windows, Linux, and BSD / Kris Kaspersky.
Kaspersky, Kris.;
Main Stack Moylish:AVAILABLE
c2006
Hacker disassembling uncovered / Kris Kaspersky.
Kaspersky, Kris.;
Main Stack Moylish:AVAILABLE
c2007
005.8 KAU : Kaufman, Charlie.
Network security : private communication in a public world / Charlie Kaufman, Radia Perlman, Mike Spe
Kaufman, Charlie.;
Main Stack Thurles:AVAILABLE
2002
005.8 KEN
Metasploit : the penetration tester's guide / by David Kennedy ... [et al.].
Main Stack Moylish:AVAILABLE
c2011
005.8 KIP
Investigator's guide to steganography / Gregory Kipper.
Kipper, Gregory.;
Main Stack Moylish:AVAILABLE
c2004
Investigator's guide to steganography / Gregory Kipper.
Kipper, Gregory.;
Main Stack Moylish:AVAILABLE
c2004
005.8 KIZ : Kizza, Joseph Migga.
Computer network security / Joseph Migga Kizza.
Kizza, Joseph Migga.;
Main Stack Moylish:AVAILABLE
2010
005.8 KRU
Computer forensics : incident response essentials / Warren G. Kruse II, Jay G. Heiser.
Kruse, Warren G.;
Main Stack Moylish:AVAILABLE, Main Stack Thurles:AVAILABLE
2001
Computer forensics : incident response essentials / Warren G. Kruse II, Jay G. Heiser.
Kruse, Warren G.;
Main Stack Moylish:AVAILABLE, Main Stack Thurles:AVAILABLE
2001
The CISSP prep guide : mastering the ten domains of computer security / Ronald L. Krutz, Russell Dean
Krutz, Ronald L.,;
Main Stack Moylish:AVAILABLE
c2001
The CISSP prep guide : mastering the ten domains of computer security / Ronald L. Krutz, Russell Dean
Krutz, Ronald L.,;
Main Stack Moylish:AVAILABLE
c2001
Computer forensics : incident response essentials / Warren G. Kruse II, Jay G. Heiser.
Kruse, Warren G.;
Main Stack Moylish:AVAILABLE, Main Stack Thurles:AVAILABLE
2001
005.8 LEH : Lehtinen, Rick.
Computer security basics / Rick Lehtinen, Deborah Russell and G.T. Gangemi, Sr.
Lehtinen, Rick.;
Main Stack Moylish:AVAILABLE
c2006
005.8 MAL : Malin, Cameron H.
Malware forensics field guide for Windows systems : digital forensics field guides / Cameron H. Malin
Malin, Cameron H.;
Main Stack Moylish:AVAILABLE
c2012
005.8 MCC : MCCLURE STUART
HACKING EXPOSED NETWORK SECURITY SECRETS AND SOLUTIONS
MCCLURE STUART;
Main Stack Thurles:AVAILABLE
1999
005.8 MEN
Handbook of applied cryptography / Alfred J. Menezes, Paul C. van Oorschot, Scott A. Vanstone.
Menezes, A. J.;
Main Stack Moylish:AVAILABLE
2001
Handbook of applied cryptography / Alfred J. Menezes, Paul C. van Oorschot, Scott A. Vanstone.
Menezes, A. J.;
Main Stack Moylish:AVAILABLE
2001
005.8 MID
Cyber crime investigator's field guide / Bruce Middleton.
Middleton, Bruce.;
Main Stack Moylish:AVAILABLE
2002
Cyber crime investigator's field guide / Bruce Middleton.
Middleton, Bruce.;
Main Stack Moylish:AVAILABLE
2002
005.8 NEL
Guide to computer forensics and investigation / Bill Nelson and Amelia Phillips.
Nelson, Bill.;
Main Stack Moylish:AVAILABLE
2004
Guide to computer forensics and investigation / Bill Nelson and Amelia Phillips.
Nelson, Bill.;
Main Stack Moylish:AVAILABLE
2004
005.8 NOR
Network intrusion detection / Stephen Northcutt, Judy Novak.
Northcutt, Stephen.;
Main Stack Moylish:AVAILABLE
2002
Network intrusion detection / Stephen Northcutt, Judy Novak.
Northcutt, Stephen.;
Main Stack Moylish:AVAILABLE
2002
005.8 OKU : Okuntseff, Nik.
Windows NT security : programming easy-to-use security options.
Okuntseff, Nik.;
Main Stack Moylish:AVAILABLE
1997
005.8 OPP : Oppliger, Rolf.
Internet and Intranet security Rolf Oppliger
Oppliger, Rolf.;
Main Stack Moylish:AVAILABLE
c1998
005.8 ORI : Oriyano, Sean-Philip,
CEH certified ethical hacker study guide : version 9 / Sean-Philip Oriyano.
Oriyano, Sean-Philip,;
Main Stack Moylish:AVAILABLE
2016
005.8 PEL
Information security policies, procedures, and standards : guidelines for effective information secur
Peltier, Thomas R.;
Main Stack Moylish:AVAILABLE
c2002
Information security policies, procedures, and standards : guidelines for effective information secur
Peltier, Thomas R.;
Main Stack Moylish:AVAILABLE
c2002
005.8 POG : Pogue, Chris.
Unix and Linux forensic analysis DVD toolkit / Chris Pogue, Cory Altheide, Todd Haverkos.
Pogue, Chris.;
Main Stack Moylish:AVAILABLE
c2008
005.8 POW
Tangled web : tales of digital crime from the shadows of cyberspace / Richard Power.
Power, Richard,;
Main Stack Moylish:AVAILABLE
c2000
Tangled web : tales of digital crime from the shadows of cyberspace / Richard Power.
Power, Richard,;
Main Stack Moylish:AVAILABLE
c2000
005.8 PUR : Purser, Michael,
Secure data networking Michael Purser
Purser, Michael,;
Main Stack Moylish:AVAILABLE
c1993
005.8 RAM : Ramachandran, Vivek.
Backtrack 5 wireless penetration testing : beginner's guide / Vivek Ramachandran.
Ramachandran, Vivek.;
Main Stack Moylish:AVAILABLE
2011
005.8 RAV : Raval, Vasant.
Risks, controls, and security : concepts and applications / Vasant Raval; Ashok Fichadia.
Raval, Vasant.;
Main Stack Moylish:AVAILABLE
2007
005.8 RHE : Rhee, Man Young.
Mobile communication systems and security / Man Young Rhee.
Rhee, Man Young.;
Main Stack Moylish:AVAILABLE
c2009
005.8 RUT : RUTSTEIN CHARLES B
WINDOWS NT SECURITY
RUTSTEIN CHARLES B;
Main Stack Thurles:AVAILABLE
1997
Add Marked to Bag
Add All On Page