Results
|
61.
|
|
|
62.
|
|
|
63.
|
|
|
64.
|
Shellcoder's Handbook: Discovering and Exploiting Security Holes by
Edition: 2nd
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: Indianapolis, IN : : Wiley Pub., , c2007
Availability: Items available for reference: Alliance College of Engineering and Design: Not for loan (1)Call number: 005.8 ANL.
|
|
65.
|
Endpoint Security by
Edition: 1st
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: Indianapolis: : Addison Wesley Professional, , 2007
Availability: Items available for reference: Alliance College of Engineering and Design: Not for loan (1)Call number: 005.8 KAD.
|
|
66.
|
Fuzzing: Brute Force Vulnerabilty Discovery by
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: Upper Saddle River, NJ: : Addison-Wesley, , 2007
Availability: Items available for reference: Alliance College of Engineering and Design: Not for loan (1)Call number: 005.8 SUT.
|
|
67.
|
Own Your Space: Keep Yourself and Your Stuff Safe Online by
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: Upper Saddle River, NJ: : Addison-Wesley, , 2007
Availability: Items available for reference: Alliance College of Engineering and Design: Not for loan (1)Call number: 005.8 MCC.
|
|
68.
|
|
|
69.
|
|
|
70.
|
|
|
71.
|
Extrusion Detection: Security Monitoring for Internal Intrusions by
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: Upper Saddle River, NJ: : Addison-Wesley, , 2006
Availability: Items available for reference: Alliance College of Engineering and Design: Not for loan (1)Call number: 005.8 BEJ.
|
|
72.
|
|
|
73.
|
Cryptography and Network Security: Principles and Practice by
Edition: 4th ed.
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: Upper Saddle River, N.J. : : Pearson/Prentice Hall, , c2006
Availability: Items available for reference: Alliance School of Law: Not for loan (2)Call number: 005.8 STA, ...
|
|
74.
|
|
|
75.
|
RFID: Applications, Security and Privacy by
Material type: Text; Literary form:
Publication details: Boston, : Addison Wesley: , 2006
Availability: Items available for reference: Alliance School of Business: Not for loan (1)Call number: 621.38419 GAR.
|
|
76.
|
|
|
77.
|
Principles of Information Security by
Edition: 2nd ed.
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: Boston, Mass. : : Thomson Course Technology, , c2005
Availability: Items available for loan: Alliance School of Law (1)Call number: 005.8 WHI.
|
|
78.
|
Network security bible by
Material type: Text; Literary form:
Publication details: New Delhi : Wiley Publishing , 2005
Availability: Items available for loan: Alliance School of Business (1)Call number: 005.8 COL.
|
|
79.
|
Security Analysis by
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: Hyderabad : ICFAI University , 2005
Availability: Items available for loan: Alliance Ascent College (1)Call number: 332.632 ICF.
|
|
80.
|
Security Analysis Workbook by
Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: Hyderabad : ICFAI University , 2005
Availability: Items available for loan: Alliance Ascent College (1)Call number: 332.632 ICF.
|