Refine your search

Your search returned 260 results.

Comprehensive guide to 5G security / edited by Madhusanka Liyanage, Ijaz Ahmad, Ahmed Bux Abro, Andrei Gurtov, Mika Ylianttila.

by Liyanage, Madhusanka [editor.] | Ahmad, Ijaz, 1985- [editor.] | Abro, Ahmed Bux [editor.] | Gurtov, Andrei [editor.] | Ylianttila, Mika [editor.].

Language: English Publisher: Hoboken, NJ : John Wiley & Sons, 2018Online access: Full text is available at Wiley Online Library Click here to view Availability: Items available for loan: COLLEGE LIBRARY [Call number: 005.8 C73884 2018] (1).

Social engineering : the science of human hacking / Christopher Hadnagy.

by Hadnagy, Christopher [author.] | Wozniak, Steve, 1950- [writer of foreword.].

Edition: Second edition.Language: English Publisher: Indianapolis, IN : Wiley, [2018]Online access: Full text is available at Wiley Online Library Click here to view Availability: Items available for loan: COLLEGE LIBRARY [Call number: 005.8 H1179 2018] (1).

Advanced persistent threat hacking : the art and science of hacking any organization / Tyler Wrightson.

by Wrightson, Tyler [author.].

Language: English Publisher: New York : McGraw-Hill Education, [2015]Copyright date: ©2015Online access: Contributor biographical information | Publisher description | Table of contents only Availability: Items available for loan: COLLEGE LIBRARY [Call number: 005.8 W938 2015] (1).

Applied cryptography : protocols, algorithms, and source code in C / Bruce Schneier.

by Schneier, Bruce, 1963- [author.].

Edition: 2nd edition.Publisher: New York, New York : Bruce Schneier, c1996Online access: Full text available at Wiley Online Library Click here to view Availability: Items available for loan: COLLEGE LIBRARY [Call number: 005.82 Sch588 1996] (1).

Asia's emerging regional order : reconciling traditional and human security / edited by William T. Tow, Ramesh Thakur, and In-Taek Hyun.

by Tow, William T | Thakur, Ramesh Chandra, 1948- | Hyŏn, In-tʻaek, 1954-.

Language: English Publisher: Tokyo : United Nations University Press, c2000Availability: Items available for loan: COLLEGE LIBRARY [Call number: 306.095 As41 2000 ] (3).

Hacking exposed J2EE & Java : developing secure applications with Java technology / Brian Buege, Randy Layman, Art Taylor.

by Buege, Brian [author] | Taylor, Art, 1958- | Layman, Randy.

Language: English Publisher: New York : McGraw-Hill/Osborne, c2002Availability: Items available for loan: COLLEGE LIBRARY [Call number: 005.8 B861 2002] (1).

Routledge handbook of international cybersecurity / edited by Eneken Tikk and Mika Kerttunen.

by Tikk, Eneken, 1976- [editor.] | Kerttunen, Mika, 1961- [editor.].

Publisher: New York : Routledge, Taylor & Francis Group, [2020]Online access: Click here to access online Availability: Items available for reference: COLLEGE LIBRARY [Call number: 303.48/34] (1).

Data privacy for the smart grid / Rebecca Herold, Christine Hertzog.

by Herold, Rebecca | Hertzog, Christine.

Publisher: Boca Raton : CRC Press, Taylor & Francis Group, 2015Online access: Click here to access online Availability: Items available for reference: COLLEGE LIBRARY [Call number: 363.60285/58] (1).

ASEAN engagement for peace/ Estrella David Solidum.

by Solidum, Estrella David [author].

Language: English Publisher: Manila: Yuchengco Center for East Asia, De La Salle University, c1999Availability: Items available for loan: COLLEGE LIBRARY [Call number: 341.2473 So44 1999] (1).

Choices in financing health care and old age security : Proceedings of a conference sponsored by the Institute of Policy Studies, Singapore, and the World Bank, November 8, 1997 / edited by Nicholas Prescott.

by Prescott, Nicholas M [editor].

Publisher: Washington, D.C.: The World Bank, c1998Availability: Items available for loan: COLLEGE LIBRARY [Call number: 338.4336219897 C452 1998] (1).

Database principles : fundamentals of design, implementation, and management / Carlos Coronel, Steven Morris, Peter Rob, and Keeley Crockett (editors)

by Coronel, Carlos [author.] | Morris, Steven [author.] | Rob, Peter [author.] | Crockett, Keeley [author.].

Edition: Second edition.Publisher: Andover : Cengage Learning, c2012Availability: Items available for loan: COLLEGE LIBRARY [Call number: 005.74 D262 2012] (2).

Database principles : fundamentals of design, implementation, and management / Carlos Coronel, Steven Morris, and Peter Rob.

by Coronel, Carlos [author.] | Morris, Steven [author.] | Rob, Peter [author.].

Edition: Tenth edition.Language: English Publisher: Andover : Cengage Learning, c2015Copyright date: c2015Availability: Items available for loan: COLLEGE LIBRARY [Call number: 005.74 C816 2015 ] (3).

Agency, sales, bailments and/or credit transactions: law and jurisprudence/ Reynaldo B. Aralar

by Aralar, Reynaldo B [Author].

Edition: 2006 EditionLanguage: English Publisher: Mandaluyong City: National Book Store, 2006Availability: Items available for loan: COLLEGE LIBRARY [Call number: 346.69987 Ar13 2006] (1).

Introduction to computer security / Michael T. Goodrich and Roberto Tamassia.

by Goodrich, Michael T [author.] | Tamassia, Roberto, 1960- [author.].

Publisher: Boston : Pearson, c2011Availability: Items available for loan: COLLEGE LIBRARY [Call number: 005.8 G625 2011] (1).

Digital signature : network security practices / Kailash N. Gupta, Kamlesh N. Agarwala, and Prateek A. Agarwala

by Gupta, Kailash [author.] | Agarwala,Kamlesh N [author.] | Agarwala, Prateek A [author.].

Language: English Publisher: New Delhi : Prentice Hall of India, c2005Availability: Items available for loan: COLLEGE LIBRARY [Call number: 005.8 G959 2005] (1).

Managing risk in information systems / Darril Gibson.

by Gibson, Darril [author.].

Publisher: Sudbury, MA : Jones & Bartlett Learning, c2011Availability: Items available for loan: COLLEGE LIBRARY [Call number: 005.8 G357 2011] (1).

Digital privacy : theory, technologies, and practices / edited by Alessandro Acquisti, Stefanos Gritzalis, Costas Lambrinoudakis, and Sabrina De Capitani di Vimercati

by Acquisti, Alessandro [author.] | Gritzalis, Stefanos [author.] | Lambrinoudakis, Costas [author.] | De Capitani di Vimercati, Sabrina [author.].

Publisher: New York : Auerback Publications, c2008Availability: Items available for loan: COLLEGE LIBRARY [Call number: 005.8 D569 2008] (1).

Data hiding techniques in Windows OS : a practical approach to investigation and defense / Nihad Admad Hassan, Rami Hijazi and Helvi Salminen, technical editor.

by [author.] | Hijazi, Rami [author.] | Salminen, Helvi [technical editor.].

Language: English Publisher: Cambridge, MA : Syngress, [2017]Copyright date: c2017Availability: Items available for loan: COLLEGE LIBRARY [Call number: 005.82 H2758 2017] (1).

Management of information security / Michael Whitman and Herbert Mattord.

by Whitman, Michael E, 1964- [author.] | Mattord, Herbert J [author.].

Edition: Third edition.Publisher: Australia : Course Technology, c2010Availability: Items available for loan: COLLEGE LIBRARY [Call number: 005.8 W593 2010] (1).

Web services security / Mark O'Neill ... [et al.].

by O'Neill, Mark, 1975- [author.].

Language: English Publisher: New York : McGraw-Hill/ Osborne, 2003Availability: Items available for loan: COLLEGE LIBRARY [Call number: 005.8 W38 2003] (1).