|
1.
|
Degunking your email, spam, and viruses / Jeff Duntemann.
by Duntemann, Jeff. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Scottsdale, Ariz. : Paraglyph Press, c2004Availability: No items available
|
|
2.
|
Hacker cracker : a journey from the mean streets of Brooklyn to the frontiers of cyberspace / Ejovi Nuwere and David Chanoff.
by Nuwere, Ejovi | Chanoff, David. Edition: 1st ed.Material type: Book; Format:
print
; Nature of contents: ; Literary form:
Not fiction
Publisher: New York : W. Morrow, 2002Availability: No items available
|
|
3.
|
Security in cyberspace : hearings before the Permanent Subcommittee on Investigations of the Committee on Governmental Affairs, United States Senate, One Hundred Fourth Congress, second session, May 22, June 5, 25, and July 16, 1996.
by United States. Congress. Senate. Committee on Governmental Affairs. Permanent Subcommittee on Investigations. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Washington : U.S. G.P.O. : For sale by the U.S. G.P.O., Supt. of Docs., Congressional Sales Office, 1996Availability: No items available
|
|
4.
|
The right of privacy in the computer age Warren Freedman.
by Freedman, Warren. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York : Quorum Books, 1987Availability: No items available
|
|
5.
|
Information security : a legal, business, and technical handbook Kimberly Kiefer ... [et al.].
by Kiefer, Kimberly, 1970-. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Chicago, Ill. : Section of Science & Technology Law, American Bar Association, c2004Availability: No items available
|
|
6.
|
What every librarian should know about electronic privacy / Jeannette Woodward.
by Woodward, Jeannette A. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Westport, Conn. : Libraries Unlimited, 2007Availability: No items available
|
|
7.
|
Network security and management/ Singh B
by Singh, B | Bailey, Bliss N. Material type: Book; Format:
print
regular print
; Literary form:
Not fiction
; Audience:
General;
Publisher: New delhi ; asoke k ghosh phi learning private ltd, c2009Availability: Items available for loan: IBB Library-Gidan Kwano [Call number: TK5105.5 S56 2009] (1).
|
|
8.
|
The best damn IT security management book period / by Bryan Cunningham...[et al].
by Cunningham, Bryan, JD. Material type: Book; Format:
regular print
; Literary form:
Not fiction
; Audience:
General;
Publisher: Burlington, Mass. : Oxford : Syngress ; Elsevier Science [distributor], c2007Availability: Items available for loan: IBB Library-Gidan Kwano [Call number: Tk5105.59.B47 2007] (1).
|
|
9.
|
information security principles and practice / Seven N. Shah
by Shah, D.N | Mj�lsnes, Stig F. Material type: Book; Literary form:
Not fiction
; Audience:
General;
Publisher: Boca Raton : CRC Press, c2012Availability: Items available for loan: IBB Library-Gidan Kwano [Call number: TK5105.59.S52] (1).
|
|
10.
|
Introduction to network security / Douglas Jacobson.
by Jacobson, Douglas. Material type: Book; Format:
print
regular print
; Literary form:
Not fiction
; Audience:
General;
Publisher: Boca Raton : Chapman & Hall/CRC, c2009Online access: Table of contents only Availability: Items available for loan: IBB Library-Gidan Kwano [Call number: TK5105.5.J32 2009] (1).
|
|
11.
|
The electronic privacy papers : documents on the battle for privacy in the age of surveillance / [edited by] Bruce Schneier, David Banisar.
by Schneier, Bruce, 1963- | Banisar, David. Material type: Book; Literary form:
Not fiction
; Audience:
General;
Publisher: New York : Wiley, c1997Online access: Click here to access online | Click here to access online Availability: Items available for loan: Awwal Ibrahim Library Bosso [Call number: JC596.2.S35] (3).
|
|
12.
|
How to cheat at securing your network / [Ido Dubrawksy, technical editor].
by Dubrawsky, Ido. Material type: Book; Format:
print
regular print
; Literary form:
Not fiction
Publisher: Burlington, MA : Syngress, c2007Other title: Securing your network.Online access: Publisher description Availability: Items available for loan: IBB Library-Gidan Kwano [Call number: TK5105.59.H684 2007] (1).
|
|
13.
|
Principles of computer security : CompTIA security+ and beyond / by Wm. Arthur Conklin ... [et al.].
by Conklin, Wm. Arthur (William Arthur). Edition: 2nd ed.Material type: Book; Format:
print
regular print
; Literary form:
Not fiction
; Audience:
General;
Publisher: New York : McGraw-Hill, c2010Availability: No items available
|
|
14.
|
IT security metrics : a practical framework for measuring security & protecting data / by Lance Hayden.
by Hayden, Lance. Material type: Book; Format:
print
regular print
; Literary form:
Not fiction
; Audience:
Specialized;
Publisher: New York : McGraw Hill, c2010Availability: Items available for loan: IBB Library-Gidan Kwano [Call number: QA76.9.A25.H392] (1).
|
|
15.
|
Writing security tools and exploits / James C. Foster, Vincent Liu.
by Foster, James C | Liu, Vincent. Material type: Book; Format:
print
Publisher: Rockland, MA : Syngress, c2006Other title: Writing security tools & exploits..Availability: Items available for loan: IBB Library-Gidan Kwano [Call number: TK5105.59.F68 2006] (1).
|
|
16.
|
Understanding computer security/ by Time Life Books
by Time Life Books. Material type: Book; Literary form:
Not fiction
; Audience:
General;
Publisher: Amsterdam: Tme Life Books, 1986Availability: Items available for loan: IBB Library-Gidan Kwano [Call number: TK5105.59.U63 ] (1).
|
|
17.
|
Metasploit toolkit for penetration testing, exploit development, and vulnerability research / David Maynor, K.K. Mookhey.
by Maynor, David | Mookhey, K. K. Material type: Book; Format:
print
regular print
; Literary form:
Not fiction
Publisher: Burlington, MA : Syngress, c2007Online access: Publisher description Availability: Items available for loan: IBB Library-Gidan Kwano [Call number: QA76.9.A25.M39 2007] (1).
|
|
18.
|
Encyclopedia of cybercrime / edited by Samuel C. McQuade, III.
by McQuade, Samuel C. Material type: Book; Format:
print
regular print
; Literary form:
Not fiction
Publisher: Westport, Conn. : Greenwood Press, 2009Online access: Table of contents only Availability: Items available for reference: [Call number: HV6773.E53 2009] (4).
|
|
19.
|
Security engineering : a guide to building dependable distributed systems / by Ross J. Anderson.-
by Anderson, Ross, 1956-. Edition: 2nd ed.Material type: Book; Format:
print
regular print
; Literary form:
Not fiction
Publisher: Indianapolis, IN : Wiley Pub., c2008Online access: Publisher description | Table of contents only Availability: Items available for reference: [Call number: TK5102.85. A52 2008] (1).
|
|
20.
|
Information assurance, security and privacy services / edited by H. Raghav Rao, Shambhu Upadhyaya.
by Rao, H. R | Upadhyaya, S. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Bingley, UK : Emerald, 2009Availability: Items available for reference: [Call number: QA76.9.A35.I54 2009] (1).
|