Your search returned 13 results.

Sort
Results
1. Books
Data communications and network security / Houston H. Carr and Charles A. Snyder by
Edition: McGraw-Hill International Edition.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Boston, Massachusetts : McGraw Hill Education, c2007
Availability: Items available for loan: LRC - Main (2)Collection, call number: Mobile and Web Applications GC TK 5109.59 .C37 2007 c.1, ...

2. Books
Guide to computer network security / Joseph Migga Kizza by
Edition: Second Edition
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: London, United Kingdom : Springer, c2013
Availability: Items available for loan: LRC - Graduate Studies (1)Collection, call number: Gen. Ed. - CCIT GC TK 5105.59 .K59 2013.

3. Books
Applied network security monitoring : collection, detection, and analysis / Chris Sanders and Jason Smith by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Waltham, MA : Syngress ; Elsevier, c2014
Availability: Items available for loan: LRC - Graduate Studies (1)Collection, call number: Gen. Ed. - CCIT GC QA 76.9.A25 .S36 2014.

4. Books
Network security through data analysis : building situational awareness / Michael Collins by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Sebastopol, California : O'Reilly Media, Incorporated, c2014
Availability: Items available for loan: LRC - Main (1)Collection, call number: Mobile and Web Applications GC TK 5105.59 .C65 2014 c.1.

5. Books
Threat modeling : designing for security / Adam Shostack by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Indianapolis, Indiana : John Wiley & Son, Inc., c2014
Availability: Items available for loan: LRC - Graduate Studies (1)Collection, call number: Gen. Ed. - CCIT GC QA 76.9.A25 .S567 2014.

6. Books
Hacking exposed : mobile security secrets and solutions / Neil Bergman [and three others] by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New York : McGraw Hill Education, c2013
Availability: Items available for loan: LRC - Main (1)Collection, call number: Digital Forensic GC TK 5105.59 .B47 2013.

7. Books
The basics of information security : understanding the fundamentals of InfoSec in theory and practice / Jason Andress by
Edition: Second edition.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Waltham, MA : Elsevier/Syngress, c2014
Availability: Items available for loan: LRC - Main (1)Collection, call number: Mobile and Web Applications GC QA 76.9 .A53 2014.

8. Books
The network security test lab: a step-by-step guide / Michael Gregg by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Indianapolis, Indiana : Wiley, c2015
Availability: Items available for loan: LRC - Main (1)Collection, call number: Mobile and Web Applications GC QA 76.9.A25 .G74 2015.

9. Books - Reference
Defensive security handbook : best practices for securing infrastructure / Lee Brotherston and Amanda Berlin by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Beijing, China : O'Reilly Media, Incorporated, c2017
Availability: Items available for loan: LRC - Main (1)Collection, call number: Mobile and Web Applications REF QA 76.9.A25 .B47 2017.

10. Books
Network security through data analysis : building situational awareness / Michael Collins by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Sebastopol, California : O'Reilly Media, Incorporated, c2014
Availability: Items available for loan: LRC - Graduate Studies (1)Collection, call number: Gen. Ed. - CCIT GC TK 5105.59 .C65 2014 c.2.

11. Books
Hacking for dummies / Kevin Beaver by
Edition: 7th Edition
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Hoboken, New Jersey : John Wiley & Son, Inc., c2022
Availability: Items available for loan: LRC - Annex (1)Collection, call number: Political Science GC QA 76.9.A25 .B43 2022.

12. Books
Cybersecurity for dummies / Joseph Steinberg by
Edition: 2nd Edition.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Hoboken, New Jersey : John Wiley & Son, Inc., c2022
Availability: Items available for loan: LRC - Annex (1)Collection, call number: Political Science GC TK 5105.5 .S74 2022.

13. Books
The five technological forces disrupting security : how cloud, social, mobile, big data and IoT are transforming physical security in the digital age / Steve Van Till by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: United Kingdom : Butterworth Heinemann ; c2018
Availability: Items available for loan: LRC - Main (1)Collection, call number: Gen. Ed. - CCIT GC TK 5105.59 .T55 2018.

Pages