005.8 KAU : Kaufman, Charlie.
Network security : private communication in a public world / Charlie Kaufman, Radia Perlman, Mike Spe
Kaufman, Charlie.;
Main Stack Thurles:AVAILABLE
2002
005.8 KEN
Metasploit : the penetration tester's guide / by David Kennedy ... [et al.].
Main Stack Moylish:AVAILABLE
c2011
005.8 KIP
Investigator's guide to steganography / Gregory Kipper.
Kipper, Gregory.;
Main Stack Moylish:AVAILABLE
c2004
Investigator's guide to steganography / Gregory Kipper.
Kipper, Gregory.;
Main Stack Moylish:AVAILABLE
c2004
005.8 KIZ : Kizza, Joseph Migga.
Computer network security / Joseph Migga Kizza.
Kizza, Joseph Migga.;
Main Stack Moylish:AVAILABLE
2010
005.8 KRU
Computer forensics : incident response essentials / Warren G. Kruse II, Jay G. Heiser.
Kruse, Warren G.;
Main Stack Moylish:AVAILABLE, Main Stack Thurles:AVAILABLE
2001
Computer forensics : incident response essentials / Warren G. Kruse II, Jay G. Heiser.
Kruse, Warren G.;
Main Stack Moylish:AVAILABLE, Main Stack Thurles:AVAILABLE
2001
The CISSP prep guide : mastering the ten domains of computer security / Ronald L. Krutz, Russell Dean
Krutz, Ronald L.,;
Main Stack Moylish:AVAILABLE
c2001
The CISSP prep guide : mastering the ten domains of computer security / Ronald L. Krutz, Russell Dean
Krutz, Ronald L.,;
Main Stack Moylish:AVAILABLE
c2001
Computer forensics : incident response essentials / Warren G. Kruse II, Jay G. Heiser.
Kruse, Warren G.;
Main Stack Moylish:AVAILABLE, Main Stack Thurles:AVAILABLE
2001
005.8 LEH : Lehtinen, Rick.
Computer security basics / Rick Lehtinen, Deborah Russell and G.T. Gangemi, Sr.
Lehtinen, Rick.;
Main Stack Moylish:AVAILABLE
c2006
005.8 MAL : Malin, Cameron H.
Malware forensics field guide for Windows systems : digital forensics field guides / Cameron H. Malin
Malin, Cameron H.;
Main Stack Moylish:AVAILABLE
c2012
005.8 MCC : MCCLURE STUART
HACKING EXPOSED NETWORK SECURITY SECRETS AND SOLUTIONS
MCCLURE STUART;
Main Stack Thurles:AVAILABLE
1999
005.8 MEN
Handbook of applied cryptography / Alfred J. Menezes, Paul C. van Oorschot, Scott A. Vanstone.
Menezes, A. J.;
Main Stack Moylish:AVAILABLE
2001
Handbook of applied cryptography / Alfred J. Menezes, Paul C. van Oorschot, Scott A. Vanstone.
Menezes, A. J.;
Main Stack Moylish:AVAILABLE
2001
005.8 MID
Cyber crime investigator's field guide / Bruce Middleton.
Middleton, Bruce.;
Main Stack Moylish:AVAILABLE
2002
Cyber crime investigator's field guide / Bruce Middleton.
Middleton, Bruce.;
Main Stack Moylish:AVAILABLE
2002
005.8 NEL
Guide to computer forensics and investigation / Bill Nelson and Amelia Phillips.
Nelson, Bill.;
Main Stack Moylish:AVAILABLE
2004
Guide to computer forensics and investigation / Bill Nelson and Amelia Phillips.
Nelson, Bill.;
Main Stack Moylish:AVAILABLE
2004
005.8 NOR
Network intrusion detection / Stephen Northcutt, Judy Novak.
Northcutt, Stephen.;
Main Stack Moylish:AVAILABLE
2002
Network intrusion detection / Stephen Northcutt, Judy Novak.
Northcutt, Stephen.;
Main Stack Moylish:AVAILABLE
2002
005.8 OKU : Okuntseff, Nik.
Windows NT security : programming easy-to-use security options.
Okuntseff, Nik.;
Main Stack Moylish:AVAILABLE
1997
005.8 OPP : Oppliger, Rolf.
Internet and Intranet security Rolf Oppliger
Oppliger, Rolf.;
Main Stack Moylish:AVAILABLE
c1998
005.8 ORI : Oriyano, Sean-Philip,
CEH certified ethical hacker study guide : version 9 / Sean-Philip Oriyano.
Oriyano, Sean-Philip,;
Main Stack Moylish:AVAILABLE
2016
005.8 PEL
Information security policies, procedures, and standards : guidelines for effective information secur
Peltier, Thomas R.;
Main Stack Moylish:AVAILABLE
c2002
Information security policies, procedures, and standards : guidelines for effective information secur
Peltier, Thomas R.;
Main Stack Moylish:AVAILABLE
c2002
005.8 POG : Pogue, Chris.
Unix and Linux forensic analysis DVD toolkit / Chris Pogue, Cory Altheide, Todd Haverkos.
Pogue, Chris.;
Main Stack Moylish:AVAILABLE
c2008
005.8 POW
Tangled web : tales of digital crime from the shadows of cyberspace / Richard Power.
Power, Richard,;
Main Stack Moylish:AVAILABLE
c2000
Tangled web : tales of digital crime from the shadows of cyberspace / Richard Power.
Power, Richard,;
Main Stack Moylish:AVAILABLE
c2000
005.8 PUR : Purser, Michael,
Secure data networking Michael Purser
Purser, Michael,;
Main Stack Moylish:AVAILABLE
c1993
005.8 RAM : Ramachandran, Vivek.
Backtrack 5 wireless penetration testing : beginner's guide / Vivek Ramachandran.
Ramachandran, Vivek.;
Main Stack Moylish:AVAILABLE
2011
005.8 RAV : Raval, Vasant.
Risks, controls, and security : concepts and applications / Vasant Raval; Ashok Fichadia.
Raval, Vasant.;
Main Stack Moylish:AVAILABLE
2007
005.8 RHE : Rhee, Man Young.
Mobile communication systems and security / Man Young Rhee.
Rhee, Man Young.;
Main Stack Moylish:AVAILABLE
c2009
005.8 RUT : RUTSTEIN CHARLES B
WINDOWS NT SECURITY
RUTSTEIN CHARLES B;
Main Stack Thurles:AVAILABLE
1997
005.8 SAM : Sammes, A. J.
Forensic computing / Tony Sammes and Brian Jenkinson.
Sammes, A. J.;
Main Stack Moylish:AVAILABLE
2007
005.8 SCA
Hackers Exposed
Scambray, Joel;
Main Stack Thurles:AVAILABLE
Hackers Exposed
Scambray, Joel;
Main Stack Thurles:AVAILABLE
Hacking exposed : network security secrets & solutions / Joel Scambray, Stuart McClure, George Kurtz.
Scambray, Joel.;
Main Stack Moylish:AVAILABLE
c2001
005.8 SCH
Incident response : a strategic guide to handling system and network security breaches / E. Eugene
Schultz, E. Eugene.;
Main Stack Moylish:AVAILABLE
c2002
Data and Goliath : the hidden battles to collect your data and control your world / Bruce Schneier.
Schneier, Bruce,;
Main Stack Clonmel:AVAILABLE
2015
Applied cryptography : protocols, algorithms and source code in C.
Schneier, Bruce,
c1996
Data and Goliath : the hidden battles to collect your data and control your world / Bruce Schneier.
Schneier, Bruce,;
Main Stack Clonmel:AVAILABLE
2015
Incident response : a strategic guide to handling system and network security breaches / E. Eugene
Schultz, E. Eugene.;
Main Stack Moylish:AVAILABLE
c2002
005.8 SHE : Shema, Mike.
Anti-hacker tool kit / Mike Shema ... [et al.].
Shema, Mike.;
Main Stack Moylish:AVAILABLE
c2006
005.8 SHI
Scene of the cybercrime : computer forensics handbook / Debra Littlejohn Shinder; Ed Tittel, techni
Shinder, Debra Littlejohn.;
Main Stack Moylish:AVAILABLE
c2002
Scene of the cybercrime : computer forensics handbook / Debra Littlejohn Shinder; Ed Tittel, techni
Shinder, Debra Littlejohn.;
Main Stack Moylish:AVAILABLE
c2002
005.8 SKO : Skoudis, Ed.
Malware : fighting malicious code / Ed Skoudis.
Skoudis, Ed.;
Main Stack Moylish:AVAILABLE
2003
005.8 SLA
Information security in financial services
SLATER KEN;
Main Stack Thurles:AVAILABLE
1992
Information security in financial services
SLATER KEN;
Main Stack Thurles:AVAILABLE
1992
005.8 SMI : Smith, Richard E.,
Internet cryptography Richard E. Smith
Smith, Richard E.,;
Main Stack Moylish:AVAILABLE
c1997
005.8 SOL : Solomon, Michael,
Computer forensics jumpstart / Michael G. Solomon, Diane Barrett, Neil Broom.
Solomon, Michael,;
Main Stack Moylish:AVAILABLE
c2005
005.8 SPL
Testing web security : assessing the security of web sites and applications.
Splaine, Steven.;
Main Stack Moylish:AVAILABLE
2002
Testing web security : assessing the security of web sites and applications.
Splaine, Steven.;
Main Stack Moylish:AVAILABLE
2002
005.8 STA
Cryptography and network security principles and practice / William Stallings
Stallings, William.;
Main Stack Moylish:AVAILABLE
c1999
Network security essentials : applications and standards / William Stallings.
Stallings, William.;
Main Stack Moylish:AVAILABLE
c2003
Cryptography and network security : principles and practice / William Stallings.
Stallings, William.;
Main Stack Moylish:AVAILABLE
2002
Cryptology and network security / Principles and practices
STALLINGS WILLIAM;
Main Stack Thurles:AVAILABLE
1998
15 additional entries
005.8 STI : Stinson, Douglas R.
Cryptography : theory and practice / Douglas R. Stinson.
Stinson, Douglas R.;
Main Stack Moylish:AVAILABLE
c1995
005.8 TIT : Tittel, Ed.
CISSP : Certified Information Systems Security Professional : study guide / Ed Tittel, James Michael
Tittel, Ed.
2005
005.8 TUN
Kerberos : a network authentication system.
Tung, Brian.;
Main Stack Moylish:AVAILABLE
1999
Kerberos : a network authentication system.
Tung, Brian.;
Main Stack Moylish:AVAILABLE
1999
005.8 WAY
Disappearing cryptography : information hiding : steganography & watermarking / Peter Wayner.
Wayner, Peter,;
Main Stack Moylish:AVAILABLE
c2002
Disappearing cryptography : information hiding : steganography & watermarking / Peter Wayner.
Wayner, Peter,;
Main Stack Moylish:AVAILABLE
c2002
005.8 ZWI
Building Internet Firewalls : Internet and Web security / Elizabeth D. Zwicky, Simon Cooper & D. Bren
Zwicky, Elizabeth D.;
Main Stack Moylish:AVAILABLE
c2000
Building Internet Firewalls : Internet and Web security / Elizabeth D. Zwicky, Simon Cooper & D. Bren
Zwicky, Elizabeth D.;
Main Stack Moylish:AVAILABLE
c2000
005.82
Writing Secure Code (Howard & LeBlanc) 2nd edit
Microsoft Press;
Main Stack Thurles:AVAILABLE
Applied Cryptography
Schneier, Bruce;
Main Stack Thurles:AVAILABLE
Handbook of Applied Cryptography
Menezes, Alfred J;
Main Stack Thurles:AVAILABLE
005.82 CAR : Carasik, Anne H.
Unix Secure Shell / Anne Carasik.
Carasik, Anne H.;
Main Stack Moylish:AVAILABLE
c1999
005.82 EAS
Modern cryptography : applied mathematics for encryption and information security / Chuck Easttom.
Main Stack Moylish:AVAILABLE
2015
005.84 : Aycock, John.
Computer viruses and malware / John Aycock.
Aycock, John.;
Main Stack Thurles:AVAILABLE
2006
005.84 SYN
E-mail virus protection handbook.
Main Stack Moylish:AVAILABLE
2000
005.84 SZO : Szor, Peter.
The art of computer virus research and defense / Peter Szor.
Szor, Peter.;
Main Stack Moylish:AVAILABLE
2005
005.86 PRE
Backup and recovery / W. Curtis Preston.
Preston, W. Curtis.;
Main Stack Thurles:AVAILABLE, Main Stack Clonmel:AVAILABLE, Main Stack Moylish:AVAILABLE
c2007
Backup and recovery / W. Curtis Preston.
Preston, W. Curtis.;
Main Stack Thurles:AVAILABLE, Main Stack Clonmel:AVAILABLE, Main Stack Moylish:AVAILABLE
c2007
Backup and recovery / W. Curtis Preston.
Preston, W. Curtis.;
Main Stack Thurles:AVAILABLE, Main Stack Clonmel:AVAILABLE, Main Stack Moylish:AVAILABLE
c2007
006
CANopen implementation : applications to industrial networks / Mohammad Farsi and Manuel Bernardo Mar
Farsi, Mohammad,;
Main Stack Moylish:AVAILABLE
c2000
CANopen implementation : applications to industrial networks / Mohammad Farsi and Manuel Bernardo Mar
Farsi, Mohammad,;
Main Stack Moylish:AVAILABLE
c2000
Data acquisition and process control using personal computers Tarik Ozkul
Ozkul, Tarik,;
Main Stack Moylish:AVAILABLE
c1996
Dynamic HTML master the essentials Joseph Schmuller
Schmuller, Joseph.;
Main Stack Moylish:AVAILABLE
1998
Mastering HTML 4.0 Deborah S. Ray, Eric J. Ray
Ray, Deborah S.;
Main Stack Moylish:AVAILABLE
c1997
006. 78 GEO
How to cheat in Adobe Flash CS5 : the art of design and animation / Chris Georgenes.
Georgenes, Chris.;
Main Stack Clonmel:AVAILABLE, Reserve Clonmel:AVAILABLE
2010
How to cheat in Adobe Flash CS5 : the art of design and animation / Chris Georgenes.
Georgenes, Chris.;
Main Stack Clonmel:AVAILABLE, Reserve Clonmel:AVAILABLE
2010
How to cheat in Adobe Flash CS5 : the art of design and animation / Chris Georgenes.
Georgenes, Chris.;
Main Stack Clonmel:AVAILABLE, Reserve Clonmel:AVAILABLE
2010
006.06 : Ahearn, Luke
Designing 3D Games that Sell
Ahearn, Luke;
Main Stack Clonmel:AVAILABLE, Main Stack Thurles:AVAILABLE
2001
006.06 AHE
Designing 3D Games that Sell
Ahearn, Luke;
Main Stack Clonmel:AVAILABLE, Main Stack Thurles:AVAILABLE
2001
Designing 3D Games that Sell
Ahearn, Luke;
Main Stack Clonmel:AVAILABLE, Main Stack Thurles:AVAILABLE
2001
Designing 3D Games that Sell
Ahearn, Luke;
Main Stack Clonmel:AVAILABLE, Main Stack Thurles:AVAILABLE
2001
Add Marked to Bag
Add All On Page