|
|
Hacking exposed : network security secrets and solutions / Stuart McClure, Joel Scambray and George Kurtz
by McClure, Stuart | Kurtz, George [(j.a.)] | Scambray, Joel [(j.a.)]. Edition: 3rd ed.Publisher: New York : Osborne/McGraw-Hill, c2001Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 MAC]
(1).
|
|
|
Intrusion signatures and analysis / Stephen Northcutt ... [et al.]
by Northcutt, Stephen. Edition: 1st ed.Publisher: Indianapolis, Ind. : New Riders, c2001Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 INT]
(1).
|
|
|
Maximum security : [a hacker's guide to protecting your internet site and network] / Anonymous Edition: 3rd ed.Publisher: Indianapolis, Ind. : Sams, c2001Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 MAX]
(2).
|
|
|
Maximum Linux security : [a hacker's guide to protecting your Linux server and workstation] / Anonymous
by Ray, John, 1971-. Edition: 2nd ed. / with revisions by John Ray.Publisher: Indianapolis, Ind. : Sams, c2001Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 MAX]
(1).
|
|
|
The computer incident response planning handbook : executable plans for potecting information at risk / N.K. McCarthy.
by McCarthy, N. K. Publisher: New York : McGraw-Hill, c2012Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 MAC 2012]
(2).
|
|
|
Dealing with difficult people in the library / Mark R. Willis
by Willis, Mark R. Publisher: Chicago, Ill. : American Library Association, c1999Availability: Items available for loan: Taylor's Library-TU
[Call number: 025.5 WIL]
(1).
|
|
|
The disaster recovery handbook : a step-by-step plan to ensure business continuity and protect vital operations, facilities, and assets / Michael Wallace, Lawrence Webber.
by Wallace, Michael, 1960- | Webber, Larry. Edition: 2nd ed.Publisher: New York, N.Y. : American Management Association, c2011Availability: Items available for loan: Taylor's Library-TU
[Call number: 658.477 WAL 2011]
(2).
|
|
|
Countering terrorism : can we meet the threat of global violence? / Michael Chandler and Rohan Gunaratna.
by Chandler, Michael, 1938- | Gunaratna, Rohan, 1961-. Publisher: London : Reaktion, 2007Availability: Items available for loan: Taylor's Library-TU
[Call number: 363.325 CHA]
(1).
|
|
|
NISER ICT security survey for Malaysia 2000/2001.
by ACNielsen | National ICT Security and Emergency Response Centre (NISER). Publisher: [Kuala Lumpur] : NISER, c2002Availability: Items available for loan: Taylor's Library-TC
[Call number: 005.8 NIS 2002]
(1).
|
|
|
Webster's new world hacker dictionary / Bernadette Schell and Clemens Martin.
by Schell, Bernadette H. (Bernadette Hlubik), 1952- | Martin, Clemens. Publisher: Indianapolis, IN : Wiley Pub., c2006Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8003 SCH]
(1).
|
|
|
Multimedia security technologies for digital rights management / edited by Wenjun Zeng, Heather Yu, Ching-Yung Lin.
by Zeng, Wenjun, 1967- | Yu, Hong Heather, 1967- | Lin, Ching-Yung. Publisher: Boston : Academic Press, c2006Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 MUL]
(1).
|
|
|
Developer's guide to web application security / Michael Cross.
by Cross, Michael. Publisher: Rockland, Mass. : Syngress Publishing, c2007Other title: Web application security..Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 CRO]
(1).
|
|
|
Climate change and food security in South Asia / Rattan Lal ... [et al.], editors.
by Lal, R | International Symposium on Climate Change and Food Security in South Asia (2008 : Dhaka, Bangladesh). Publisher: Dordrecht : Springer, c2011Availability: Items available for loan: Taylor's Library-TU
[Call number: 363.8 CLI 2011]
(1).
|
|
|
Malaysian critical issues / Kua Kia Soong.
by Kua, Kia Soong. Publisher: Petaling Jaya : Strategic Information Research Development, c2002Availability: Items available for loan: Taylor's Library-TC
[Call number: 959.5 KUA 2002]
(4).
|
|
|
Internet security : cryptographic principles, algorithms, and protocols / Man Young Rhee
by Rhee, Man Young. Publisher: Chichester, England : John Wiley, c2003Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.82 RHE]
(1).
|