Ramdan Hours:
Sun - Thu
9.30 AM - 2.30 PM
Iftar in --:--:--
🌙 Maghrib: --:--

Refine your search

Your search returned 60 results.

Not what you expected? Check for suggestions
Sort
Results
21.
Computer security : principles and practice / William Stallings, Lawrie Brown ; with contributions by Mick Bauer, Michael Howard. by
Edition: Second Edition.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Boston : Pearson, c2012
Availability: Items available for loan: Main library (1)Call number: 005.8 S.W.C.

22.
Cryptography and network security : principles and practice / William Stallings. by
Edition: Sixth edition.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Upper Saddle River, N.J. : Prentice Hall, [2014]Copyright date: ©2014
Online access:
Availability: Items available for loan: Main library (2)Call number: 005.8 S.W.C, ... Items available for reference: Main library: Not for loan (1)Call number: 005.8 S.W.C.

23.
Securing SQL server : protecting your database from attackers / Denny Cherry ; technical editor, Michael Cross. by
Edition: 2nd edition
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Waltham, MA : Syngress/Elsevier, [2012]
Availability: Items available for loan: Main library (1)Call number: 005.8 C.D.S.

24.
Hacking web apps : detecting and preventing web application security problems / Mike Shema. by
Material type: Text Text; Format: electronic available online remote; Literary form: Not fiction
Publication details: Amsterdam ; Boston : Syngress, c2012
Online access:
Availability: Items available for loan: Main library (1)Call number: 005.8 S.M.H.

25.
Information security management : concepts and practice / Bel G. Raggad. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Boca Raton, FL : CRC Press/Taylor & Francis, c2010
Availability: Items available for loan: Main library (1)Call number: 005.8 R.B.I.

26.
Computer security fundamentals / Chuck Easttom. by
Edition: 2nd ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Indianapolis, Ind. : Pearson, c2012
Online access:
Availability: Items available for loan: Main library (1)Call number: 005.8 E.C.C.

27.
Security automation essentials : streamlined enterprise security management & monitoring with SCAP / Greg Witte, Melanie Cook, Matt Kerr, Shane Shaffer. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: New York : McGraw-Hill, 2012
Availability: Items available for loan: Main library (1)Call number: 005.8 W.G.S.

28.
Embedded systems security : practical methods for safe and secure software and systems development / David Kleidermacher, Mike Kleidermacher. by
Edition: First Edition.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Amsterdam : Elsevier, 2012
Availability: Items available for loan: Main library (1)Call number: 005.8 K.D.E.

29.
Writing secure code for Windows Vista / Michael Howard, David LeBlanc. by Series: Secure software development series | Best practices (Redmond, Wash.)
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Redmond, Wash. : Microsoft, [2007]Copyright date: copyright 2007
Availability: Items available for loan: Main library (1)Call number: 005.8 H.M.W.

30.
Android Malware / Xuxian Jiang, Yajin Zhou. by Series: Springer Brieft in computer science
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: New York : Springer , [2013]Copyright date: c2013
Online access:
Availability: Items available for loan: Main library (1)Call number: 005.84 J.X.A..

31.
Guide to strategic infrastructure security : becoming a security network professional / by Randy Weaver and Dawn Weaver. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Boston, MA : Course Technology, Cengage Learning, [2009]Copyright date: c2009
Availability: Items available for loan: Main library (1)Call number: 005.8 W.R.G.

32.
Hacking exposed : web applications : web application security secrets and solutions / Joel Scambray, Vincent Liu, Caleb Sima. by
Edition: third edition.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: New York : McGraw-Hill, [2011]Copyright date: c2011
Online access:
Availability: Items available for loan: Main library (1)Call number: 005.8 S.J.H.

33.
Embedded multimedia security systems : algorithms and architectures / Amit Pande, Joseph Zambreno. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: London ; New York : Springer, c2013
Other title:
  • Embedded systems for smart appliances and energy management
Online access:
Availability: Items available for loan: Main library (1)Call number: 006.7 P.A.E.

34.
Information security policy development for compliance : ISO/IEC 27001, NIST SP 800-53, HIPAA standard, PCI DSS V2.0, and AUP V5.0 / Barry L. Williams. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Boca Raton, FL : CRC Press, Taylor & Francis Group, [2013]Copyright date: ©2013
Availability: Items available for loan: Main library (1)Call number: 005.8 W.B.I.

35.
Intrusion detection networks : a key to collaborative security / Carol Fung and Raouf Boutaba. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Boca Raton : CRC Press, [2014]
Online access:
Availability: Items available for loan: Main library (1)Call number: 005.8 F.C.I.

36.
Fundamentals of information systems security / David Kim and Michael G. Solomon. by Series: Jones & bartlett Learning information systems & security series
Edition: Second Edition.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Sudbury, MA : Jones & Bartlett Learning, [2011], c2014
Availability: Items available for loan: Main library (1)Call number: 005.8 K.D.F.

37.
Hacker techniques, tools, and incident handling / Sean-Philip Oriyano and Michael Gregg. by Series: Jones & Bartlett Learning information systems security & assurance series
Edition: Second edition
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Burlington, MA : Jones & Bartlett Learning, [2014]Copyright date: ©2014
Availability: Items available for loan: Main library (1)Call number: 005.8 O.S.H.

38.
The basics of hacking and penetration testing : ethical hacking and penetration testing made easy / Dr. Patrick Engebretson, David Kennedy, Technical Editor. by
Edition: Second Edition.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Amsterdam ; Boston : Syngress, an imprint of Elsevier, [2013]
Online access:
Availability: Items available for loan: Main library (1)Call number: 005.8 E.P.B.

39.
Cryptography and network security : principles and practice / William Stallings. by
Edition: Fifth Edition
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Upper Saddle River, N.J. : Pearson/Prentice Hall, 2011
Availability: Items available for loan: Main library (2)Call number: 005.8 S.W.C, ...

40.
The basics of information security : understanding the fundamentals of InfoSec in theory and practice / Jason Andress, Steven Winterfeld, technical editor. by
Edition: Second edition.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Amsterdam ; Boston : Elsevier/Syngress, Syngress is a imprint of Elsevier, [2014]
Online access:
Availability: Items available for loan: Main library (1)Call number: 005.8 A.J.B.

Pages