|
1.
|
information security principles and practice / Seven N. Shah
by Shah, D.N | Mj�lsnes, Stig F. Material type: Book; Literary form:
Not fiction
; Audience:
General;
Publisher: Boca Raton : CRC Press, c2012Availability: Items available for loan: IBB Library-Gidan Kwano [Call number: TK5105.59.S52] (1).
|
|
2.
|
Introduction to network security / Douglas Jacobson.
by Jacobson, Douglas. Material type: Book; Format:
print
regular print
; Literary form:
Not fiction
; Audience:
General;
Publisher: Boca Raton : Chapman & Hall/CRC, c2009Online access: Table of contents only Availability: Items available for loan: IBB Library-Gidan Kwano [Call number: TK5105.5.J32 2009] (1).
|
|
3.
|
How to cheat at securing your network / [Ido Dubrawksy, technical editor].
by Dubrawsky, Ido. Material type: Book; Format:
print
regular print
; Literary form:
Not fiction
Publisher: Burlington, MA : Syngress, c2007Other title: Securing your network.Online access: Publisher description Availability: Items available for loan: IBB Library-Gidan Kwano [Call number: TK5105.59.H684 2007] (1).
|
|
4.
|
Understanding computer security/ by Time Life Books
by Time Life Books. Material type: Book; Literary form:
Not fiction
; Audience:
General;
Publisher: Amsterdam: Tme Life Books, 1986Availability: Items available for loan: IBB Library-Gidan Kwano [Call number: TK5105.59.U63 ] (1).
|
|
5.
|
Metasploit toolkit for penetration testing, exploit development, and vulnerability research / David Maynor, K.K. Mookhey.
by Maynor, David | Mookhey, K. K. Material type: Book; Format:
print
regular print
; Literary form:
Not fiction
Publisher: Burlington, MA : Syngress, c2007Online access: Publisher description Availability: Items available for loan: IBB Library-Gidan Kwano [Call number: QA76.9.A25.M39 2007] (1).
|
|
6.
|
Security engineering : a guide to building dependable distributed systems / by Ross J. Anderson.-
by Anderson, Ross, 1956-. Edition: 2nd ed.Material type: Book; Format:
print
regular print
; Literary form:
Not fiction
Publisher: Indianapolis, IN : Wiley Pub., c2008Online access: Publisher description | Table of contents only Availability: Items available for reference: [Call number: TK5102.85. A52 2008] (1).
|
|
7.
|
Information assurance, security and privacy services / edited by H. Raghav Rao, Shambhu Upadhyaya.
by Rao, H. R | Upadhyaya, S. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Bingley, UK : Emerald, 2009Availability: Items available for reference: [Call number: QA76.9.A35.I54 2009] (1).
|
|
8.
|
Techno security's guide to e-discovery and digital forensics / Jack Wiles, lead author ; Tammy Alexander ... [et al.].
by Wiles, Jack. Material type: Book; Format:
regular print
; Literary form:
Not fiction
; Audience:
General;
Publisher: Burlington, Mass. : Syngress Publishing, c2007Other title: a comprehensive handbook for investigators, examiners, IT security managers, lawyers, and academia.Online access: Publisher description Availability: Items available for reference: [Call number: HV8079.C65. W53] (1).
|
|
9.
|
Techno Security's guide to managing risks : for IT managers, auditors, and investigators / Jack Wiles ; Russ Rogers, technical editor ; foreword by Donald Withers.
by Wiles, Jack. Material type: Book; Format:
regular print
; Literary form:
Not fiction
; Audience:
General;
Publisher: Burlington, Mass. : Elsevier, c2007Online access: Publisher description Availability: Items available for reference: [Call number: QA76.9.A25.W54 2007] (1).
|
|
10.
|
Computer security handbook / Richard H. Baker.
by Baker, Richard H. Edition: 2nd ed.Material type: Book; Format:
regular print
; Literary form:
Not fiction
; Audience:
General;
Publisher: U.S.A TAB Professional and Reference Books, 1991Availability: Items available for reference: [Call number: QA76.9.A25.B34 1991] (1).
|
|
11.
|
Computer security handbook / Richard H. Baker.
by Baker, Richard H. Edition: 2nd ed.Material type: Book; Format:
regular print
; Literary form:
Not fiction
; Audience:
General;
Publisher: U.S.A TAB Professional and Reference Books, 1991Availability: No items available
|
|
12.
|
No tech hacking : a guide to social engineering, dumpster diving, and shoulder surfing/ / by Johnny Long.
by Long, Johnny | Mitnick, Kevin D. (Kevin David), 1963-. Material type: Book; Format:
regular print
; Literary form:
Not fiction
; Audience:
General;
Publisher: Burlington, Mass. : Oxford : Syngress ; Elsevier Science [distributor], c2008Online access: Table of contents Availability: Items available for reference: [Call number: QA76.9.A25. L66] (1).
|
|
13.
|
Introduction to modern cryptography / Jonathan Katz, and Yehuda Lindell.-PRINT RESOURCES
by Katz, Jonathan, 1974- | Lindell, Yehuda. Edition: Second edition.Material type: Book; Literary form:
Not fiction
; Audience:
General;
Publisher: Boca Raton : CRC Press/Taylor & Francis, C 2015Online access: Cover image Availability: Items available for loan: IBB Library-Gidan Kwano [Call number: QA76.9.A25.K38 2015] (5).
|
|
14.
|
Data hiding : exposing concealed data in multimedia, operating systems, mobile devices and network protocols / Michael Raggo, Chet Hosmer ; Wesley McGrew, technical editor.
by Raggo, Michael T | Hosmer, Chet | McGrew, Wesley. Edition: 1st ed.Material type: Book; Literary form:
Not fiction
; Audience:
General;
Publisher: Waltham, MA : Syngress, c2013Availability: Items available for loan: Awwal Ibrahim Library Bosso [Call number: QA76.9.A25.R33] (5).
|
|
15.
|
Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security engineers / by T. J O'ConnorPrint
by O'Connor, T.J. Material type: Book; Format:
regular print
; Literary form:
Not fiction
; Audience:
General;
Publisher: Amsterdam: Elsevier, 2013Availability: Items available for loan: IBB Library-Gidan Kwano [Call number: QA73.76.P98.O36 2013.] (5).
|
|
16.
|
Data hiding : exposing concealed data in multimedia, operating systems, mobile devices and network protocols / Michael Raggo, Chet Hosmer ; Wesley McGrew, technical editor.
by Raggo, Michael T | Hosmer, Chet | McGrew, Wesley. Edition: 1st ed.Material type: Book; Literary form:
Not fiction
; Audience:
General;
Publisher: Waltham, MA : Syngress, c2013Availability: Items available for loan: IBB Library-Gidan Kwano [Call number: QA76.9.A25.R23 2013] (5).
|
|
17.
|
Federal Cloud Computing: The Definitive Guide for Cloud Service Providers/ Mathew MethenyPrint
by Metheny, M. Edition: 2nd. ed.Material type: Book; Format:
regular print
; Literary form:
Not fiction
; Audience:
General;
Publisher: New York: Elsevier, 2013Availability: Items available for loan: IBB Library-Gidan Kwano [Call number: QA76.585.M47 2013] (5).
|
|
18.
|
Security for Service Oriented Architectures / by Walter Williams .-print
by By Williams, W. Material type: Book; Format:
regular print
; Literary form:
Not fiction
; Audience:
General;
Publisher: New York : CRC Press, c2014Availability: Items available for loan: IBB Library-Gidan Kwano [Call number: TK5105.5828.W55 2014] (1).
|
|
19.
|
Network and System Security/ By John Vacca.-Print.
by Vacca, J. Material type: Book; Format:
regular print
; Literary form:
Not fiction
; Audience:
General;
Publisher: Amsterdam: Elsevier, C 2014Availability: Items available for loan: IBB Library-Gidan Kwano [Call number: TK5105.59.V22] (1).
|
|
20.
|
Cyber Weaponry : Issues and Implications of Digital Arms / edited by Henry Prunckun.-
by Prunckun, Henry [editor.]. Edition: 1st ed. 2018.Material type: Book; Format:
regular print
; Literary form:
Not fiction
; Audience:
General;
Publisher: Cham : Springer International Publishing, C 2018Availability: Items available for loan: IBB Library-Gidan Kwano [Call number: U167.5.C92 2018] (5).
|