Your search returned 31 results. Subscribe to this search

|
1. information security principles and practice / Seven N. Shah

by Shah, D.N | Mj�lsnes, Stig F.

Material type: book Book; Literary form: Not fiction ; Audience: General; Publisher: Boca Raton : CRC Press, c2012Availability: Items available for loan: IBB Library-Gidan Kwano [Call number: TK5105.59.S52] (1).

2. Introduction to network security / Douglas Jacobson.

by Jacobson, Douglas.

Material type: book Book; Format: print regular print ; Literary form: Not fiction ; Audience: General; Publisher: Boca Raton : Chapman & Hall/CRC, c2009Online access: Table of contents only Availability: Items available for loan: IBB Library-Gidan Kwano [Call number: TK5105.5.J32 2009] (1).

3. How to cheat at securing your network / [Ido Dubrawksy, technical editor].

by Dubrawsky, Ido.

Material type: book Book; Format: print regular print ; Literary form: Not fiction Publisher: Burlington, MA : Syngress, c2007Other title: Securing your network.Online access: Publisher description Availability: Items available for loan: IBB Library-Gidan Kwano [Call number: TK5105.59.H684 2007] (1).

4. Understanding computer security/ by Time Life Books

by Time Life Books.

Material type: book Book; Literary form: Not fiction ; Audience: General; Publisher: Amsterdam: Tme Life Books, 1986Availability: Items available for loan: IBB Library-Gidan Kwano [Call number: TK5105.59.U63 ] (1).

5. Metasploit toolkit for penetration testing, exploit development, and vulnerability research / David Maynor, K.K. Mookhey.

by Maynor, David | Mookhey, K. K.

Material type: book Book; Format: print regular print ; Literary form: Not fiction Publisher: Burlington, MA : Syngress, c2007Online access: Publisher description Availability: Items available for loan: IBB Library-Gidan Kwano [Call number: QA76.9.A25.M39 2007] (1).

6. Security engineering : a guide to building dependable distributed systems / by Ross J. Anderson.-

by Anderson, Ross, 1956-.

Edition: 2nd ed.Material type: book Book; Format: print regular print ; Literary form: Not fiction Publisher: Indianapolis, IN : Wiley Pub., c2008Online access: Publisher description | Table of contents only Availability: Items available for reference: [Call number: TK5102.85. A52 2008] (1).

7. Information assurance, security and privacy services / edited by H. Raghav Rao, Shambhu Upadhyaya.

by Rao, H. R | Upadhyaya, S.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Bingley, UK : Emerald, 2009Availability: Items available for reference: [Call number: QA76.9.A35.I54 2009] (1).

8. Techno security's guide to e-discovery and digital forensics / Jack Wiles, lead author ; Tammy Alexander ... [et al.].

by Wiles, Jack.

Material type: book Book; Format: regular print ; Literary form: Not fiction ; Audience: General; Publisher: Burlington, Mass. : Syngress Publishing, c2007Other title: a comprehensive handbook for investigators, examiners, IT security managers, lawyers, and academia.Online access: Publisher description Availability: Items available for reference: [Call number: HV8079.C65. W53] (1).

9. Techno Security's guide to managing risks : for IT managers, auditors, and investigators / Jack Wiles ; Russ Rogers, technical editor ; foreword by Donald Withers.

by Wiles, Jack.

Material type: book Book; Format: regular print ; Literary form: Not fiction ; Audience: General; Publisher: Burlington, Mass. : Elsevier, c2007Online access: Publisher description Availability: Items available for reference: [Call number: QA76.9.A25.W54 2007] (1).

10. Computer security handbook / Richard H. Baker.

by Baker, Richard H.

Edition: 2nd ed.Material type: book Book; Format: regular print ; Literary form: Not fiction ; Audience: General; Publisher: U.S.A TAB Professional and Reference Books, 1991Availability: Items available for reference: [Call number: QA76.9.A25.B34 1991] (1).

11. Computer security handbook / Richard H. Baker.

by Baker, Richard H.

Edition: 2nd ed.Material type: book Book; Format: regular print ; Literary form: Not fiction ; Audience: General; Publisher: U.S.A TAB Professional and Reference Books, 1991Availability: No items available

12. No tech hacking : a guide to social engineering, dumpster diving, and shoulder surfing/ / by Johnny Long.

by Long, Johnny | Mitnick, Kevin D. (Kevin David), 1963-.

Material type: book Book; Format: regular print ; Literary form: Not fiction ; Audience: General; Publisher: Burlington, Mass. : Oxford : Syngress ; Elsevier Science [distributor], c2008Online access: Table of contents Availability: Items available for reference: [Call number: QA76.9.A25. L66] (1).

13. Introduction to modern cryptography / Jonathan Katz, and Yehuda Lindell.-PRINT RESOURCES

by Katz, Jonathan, 1974- | Lindell, Yehuda.

Edition: Second edition.Material type: book Book; Literary form: Not fiction ; Audience: General; Publisher: Boca Raton : CRC Press/Taylor & Francis, C 2015Online access: Cover image Availability: Items available for loan: IBB Library-Gidan Kwano [Call number: QA76.9.A25.K38 2015] (5).

14. Data hiding : exposing concealed data in multimedia, operating systems, mobile devices and network protocols / Michael Raggo, Chet Hosmer ; Wesley McGrew, technical editor.

by Raggo, Michael T | Hosmer, Chet | McGrew, Wesley.

Edition: 1st ed.Material type: book Book; Literary form: Not fiction ; Audience: General; Publisher: Waltham, MA : Syngress, c2013Availability: Items available for loan: Awwal Ibrahim Library Bosso [Call number: QA76.9.A25.R33] (5).

15. Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security engineers / by T. J O'ConnorPrint

by O'Connor, T.J.

Material type: book Book; Format: regular print ; Literary form: Not fiction ; Audience: General; Publisher: Amsterdam: Elsevier, 2013Availability: Items available for loan: IBB Library-Gidan Kwano [Call number: QA73.76.P98.O36 2013.] (5).

16. Data hiding : exposing concealed data in multimedia, operating systems, mobile devices and network protocols / Michael Raggo, Chet Hosmer ; Wesley McGrew, technical editor.

by Raggo, Michael T | Hosmer, Chet | McGrew, Wesley.

Edition: 1st ed.Material type: book Book; Literary form: Not fiction ; Audience: General; Publisher: Waltham, MA : Syngress, c2013Availability: Items available for loan: IBB Library-Gidan Kwano [Call number: QA76.9.A25.R23 2013] (5).

17. Federal Cloud Computing: The Definitive Guide for Cloud Service Providers/ Mathew MethenyPrint

by Metheny, M.

Edition: 2nd. ed.Material type: book Book; Format: regular print ; Literary form: Not fiction ; Audience: General; Publisher: New York: Elsevier, 2013Availability: Items available for loan: IBB Library-Gidan Kwano [Call number: QA76.585.M47 2013] (5).

18. Security for Service Oriented Architectures / by Walter Williams .-print

by By Williams, W.

Material type: book Book; Format: regular print ; Literary form: Not fiction ; Audience: General; Publisher: New York : CRC Press, c2014Availability: Items available for loan: IBB Library-Gidan Kwano [Call number: TK5105.5828.W55 2014] (1).

19. Network and System Security/ By John Vacca.-Print.

by Vacca, J.

Material type: book Book; Format: regular print ; Literary form: Not fiction ; Audience: General; Publisher: Amsterdam: Elsevier, C 2014Availability: Items available for loan: IBB Library-Gidan Kwano [Call number: TK5105.59.V22] (1).

20. Cyber Weaponry : Issues and Implications of Digital Arms / edited by Henry Prunckun.-

by Prunckun, Henry [editor.].

Edition: 1st ed. 2018.Material type: book Book; Format: regular print ; Literary form: Not fiction ; Audience: General; Publisher: Cham : Springer International Publishing, C 2018Availability: Items available for loan: IBB Library-Gidan Kwano [Call number: U167.5.C92 2018] (5).