|
|
Protecting business information : a manager's guide / James A. Schweitzer.
by Schweitzer, James A, 1929-. Material type: Book; Format:
print
; Literary form:
not fiction
Copyright date: Boston : Butterworth-Heinemann, ©1996Online access: Publisher description | Table of contents Availability: Items available for loan: Graduate School Library [Call number: HD 38.7 .S388 1996] (1).
|
|
|
Cyber security and IT infrastructure protection / edited by John R. Vacca
by Vacca, John R []. Edition: First edition.Material type: Book; Format:
print
; Literary form:
not fiction
Publisher: Waltham, MA : Syngress, 2014Copyright date: ©2014Availability: No items available Checked out (1).
|
|
|
Elementary information security / Richard E. Smith.a
by Smith, Richard E. Edition: First edition.Material type: Book; Format:
print
; Literary form:
not fiction
Publisher: Burlington, MA : Jones & Bartlett Learning, 2013Copyright date: ©2013Availability: Items available for loan: Main Library: Reference Section [Call number: QA 76.9 A25S652 2013] (1).
|
|
|
Information security risk assessment toolkit : practical assessments through data collections and data analysis / Mark Ryan M. Talabis, Jason L. Martin, and Evan Wheeler, Technical Editor.
by Talabis, Mark Ryan M | Martin, Jason L | Wheeler, Evan []. Edition: First edition.Material type: Book; Format:
print
; Literary form:
not fiction
Publisher: Waltham, MA : Syngress, 2013Copyright date: ©2013Availability: Items available for loan: Main Library: Reference Section [Call number: QA 76.9 A25T336 2013] (1).
|
|
|
Cryptography and network security / Atul Kahate.
by Kahate, Atul. Edition: Third edition.Material type: Book; Format:
print
; Literary form:
not fiction
Publisher: New Delhi: McGraw-Hill, Education [2013]Copyright date: ©2013Availability: Items available for loan: Main Library: Reference Section [Call number: TK 5105.59 K34 2013] (1).
|
|
|
Hacking exposed Windows : Windows security secrets and solutions / Joel Scambray, Stuart McClure.
by Scambray, Joel | McClure,Stuart. Edition: Third edition.Material type: Book; Format:
print
; Literary form:
not fiction
Publisher: New York: McGraw- Hill, [2008]Copyright date: ©2008Availability: Items available for loan: Main Library: Reference Section [Call number: QA 76.9A25 S3 2008] (1).
|
|
|
Network security / Neha Ghai.
by Ghai, Neha B. Tech. Edition: Second edition.Material type: Book Publisher: New Delhi : S.K. Kataria & Sons, 2015Availability: Items available for loan: Main Library: Circulation Section [Call number: TK 5015.59 .G53 2015] (1), PUP Maragondon [Call number: TK 5015.59 .G53 2015] (1).
|
|
|
Business data networks and security / Raymond R. Panko, University of Hawai'i at Mānoa, Julia L. Panko, Weber State University.
by Panko, Raymond R | Panko, Julia L. Edition: Tenth edition.Material type: Book; Format:
print
; Literary form:
not fiction
Copyright date: Boston : Pearson, ©2015Availability: Items available for loan: Main Library: Circulation Section [Call number: HD 30.37 .P36 2015] (2), PUP Bataan Library [Call number: HD30.37 .P36 2015] (1).
|
|
|
Operating system forensics / Ric Messier ; Kevin Mackay, technical editor.
by Messier, Ric | Mackay, Kevin []. Material type: Book; Format:
print
; Literary form:
not fiction
Publisher: Waltham, MA : Syngress is an imprint of Elsevier, ©2016Availability: Items available for loan: Main Library: Circulation Section [Call number: HV 8079 .M47 2016] (1), PUP Ragay Library [Call number: HV 8079 .M47 2016] (1).
|
|
|
Encyclopedia of cyber law and computer security : measures, controls, and practices / edited by Paul Moore.
by Moore, Paul [editor]. Material type: Book; Format:
print
; Literary form:
not fiction
Copyright date: Birmingham, UK : Koros Press Limited., ©2014Availability: Items available for loan: Main Library: Reference Section [Call number: QA 76.9.A25 .E53 2014 v.1] (2).
|
|
|
Principles of information security / Michael E. Whitman, Herbert J. Mattord.
by Whitman, Michael E | Mattord, Herbert J. Edition: Sixth edition.Material type: Book; Format:
print
; Literary form:
not fiction
Publisher: Boston : Cengage Learning, ©2018Availability: Items available for loan: Main Library: Circulation Section [Call number: TK 5105.59 .W45 2018] (5).
|
|
|
Computer forensics / 3G E-learning LLC.
by 3G E-learning LLC. Material type: Book; Format:
print
; Literary form:
not fiction
[Place of publication not identified] : 3G E-learning LLC, ©2017Availability: Items available for loan: Main Library: Circulation Section [Call number: HV 8079 .C66 2017] (5).
|
|
|
Network security / authored and edited by 3G E-learning LLC.
by 3G E-learning LLC. Material type: Book; Format:
print
; Literary form:
not fiction
Publisher: [Place of publication not identified] : 3G E-learning LLC, ©2017Availability: Items available for loan: Main Library: Circulation Section [Call number: TK 5015.59 .N48 2017] (5).
|
|
|
Cryptography and network security : principles and practice / William Stallings.
by Stallings, William. Edition: Seventh edition Global editionMaterial type: Book; Format:
print
; Literary form:
not fiction
Publisher: Harlow, Essex : Pearson Education Limited, ©2017Dissertation note: Include index. Availability: Items available for loan: Institute of Technology Library [Call number: TK 5105.59 .S73 2017] (1), Main Library: Circulation Section [Call number: TK 5105.59 .S73 2017] (4).
|
|
|
Network security essentials : applications and standards / William Stallings.
by Stallings, William. Edition: Sixth edition.Material type: Book; Format:
print
; Literary form:
not fiction
Publisher: Boston : Pearson, [2017]Availability: Items available for loan: Institute of Technology Library [Call number: TK 5105.59 .S735 2017] (1), Main Library: Circulation Section [Call number: TK 5105.59 .S735 2017] (4), PUP Commonwealth Library [Call number: TK 5105.59 .S735 2017] (5).
|
|
|
Investigative computer forensics : the practical guide for lawyers, accountants, investigators, and business executives / Erik Laykin.
by Laykin, Erik. Material type: Book; Format:
print
; Literary form:
not fiction
Publisher: Hoboken, New Jersey : John Wiley, ©2013Availability: Items available for loan: Main Library: Circulation Section [Call number: HV 8079 .L39 2013] (1).
|
|
|
Cybersecurity essentials / Charles J. Brooks, Christopher Grow, Philip Craig, Donald Short.
by Brooks, Charles J [author] | Grow, Christopher [author] | Craig, Philip (Engineer) [author] | Short, Donald [author]. Material type: Book; Format:
print
; Literary form:
not fiction
Publisher: Indianapolis, Indiana : John Wiley & Sons Inc., [2018]Copyright date: ©2018Other title: Cyber security essentials.Availability: Items available for loan: Main Library: Circulation Section [Call number: TK 5105.59 .B766 2018] (1).
|
|
|
User privacy : practical guide for librarians / Matthew Connolly.
by Connolly, Matthew, 1977- [author]. Material type: Book; Format:
print
; Literary form:
not fiction
Copyright date: Lanham : Rowman & Littlefield, ©2018Availability: Items available for loan: Main Library: Reference Section [Call number: Z 678.93 .C66 2018] (1).
|
|
|
Digital forensics : an academic introduction / edited by Andre Arnes.
by Årnes, André, 1976- [editor]. Material type: Book; Format:
print
; Literary form:
not fiction
Copyright date: Hoboken, NJ : John Wiley & Sons Inc., ©2018Availability: Items available for loan: Main Library: Circulation Section [Call number: HV 8079.C65 .D54 2018] (1).
|
|
|
Hacker techniques, tools, and incident handling / Sean-Philip Oriyano, Michael G. Solomon.
by Oriyano, Sean-Philip [author] | Solomon, Michael G [author]. Edition: Third edition.Material type: Book; Format:
print
; Literary form:
not fiction
Publisher: Boston, MA : Pearson Custom Pub., 2005Copyright date: ©2020Availability: Items available for loan: Main Library: Circulation Section [Call number: QA 76.9 .A25 .O75 2020] (1).
|