Your search returned 49 results. Subscribe to this search

|
1. Degunking your email, spam, and viruses / Jeff Duntemann.

by Duntemann, Jeff.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Scottsdale, Ariz. : Paraglyph Press, c2004Availability: No items available

2. Hacker cracker : a journey from the mean streets of Brooklyn to the frontiers of cyberspace / Ejovi Nuwere and David Chanoff.

by Nuwere, Ejovi | Chanoff, David.

Edition: 1st ed.Material type: book Book; Format: print ; Nature of contents: biography; Literary form: Not fiction Publisher: New York : W. Morrow, 2002Availability: No items available

3. Security in cyberspace : hearings before the Permanent Subcommittee on Investigations of the Committee on Governmental Affairs, United States Senate, One Hundred Fourth Congress, second session, May 22, June 5, 25, and July 16, 1996.

by United States. Congress. Senate. Committee on Governmental Affairs. Permanent Subcommittee on Investigations.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Washington : U.S. G.P.O. : For sale by the U.S. G.P.O., Supt. of Docs., Congressional Sales Office, 1996Availability: No items available

4. The right of privacy in the computer age Warren Freedman.

by Freedman, Warren.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York : Quorum Books, 1987Availability: No items available

5. Information security : a legal, business, and technical handbook Kimberly Kiefer ... [et al.].

by Kiefer, Kimberly, 1970-.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Chicago, Ill. : Section of Science & Technology Law, American Bar Association, c2004Availability: No items available

6. What every librarian should know about electronic privacy / Jeannette Woodward.

by Woodward, Jeannette A.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Westport, Conn. : Libraries Unlimited, 2007Availability: No items available

7. Network security and management/ Singh B

by Singh, B | Bailey, Bliss N.

Material type: book Book; Format: print regular print ; Literary form: Not fiction ; Audience: General; Publisher: New delhi ; asoke k ghosh phi learning private ltd, c2009Availability: Items available for loan: IBB Library-Gidan Kwano [Call number: TK5105.5 S56 2009] (1).

8. The best damn IT security management book period / by Bryan Cunningham...[et al].

by Cunningham, Bryan, JD.

Material type: book Book; Format: regular print ; Literary form: Not fiction ; Audience: General; Publisher: Burlington, Mass. : Oxford : Syngress ; Elsevier Science [distributor], c2007Availability: Items available for loan: IBB Library-Gidan Kwano [Call number: Tk5105.59.B47 2007] (1).

9. information security principles and practice / Seven N. Shah

by Shah, D.N | Mj�lsnes, Stig F.

Material type: book Book; Literary form: Not fiction ; Audience: General; Publisher: Boca Raton : CRC Press, c2012Availability: Items available for loan: IBB Library-Gidan Kwano [Call number: TK5105.59.S52] (1).

10. Introduction to network security / Douglas Jacobson.

by Jacobson, Douglas.

Material type: book Book; Format: print regular print ; Literary form: Not fiction ; Audience: General; Publisher: Boca Raton : Chapman & Hall/CRC, c2009Online access: Table of contents only Availability: Items available for loan: IBB Library-Gidan Kwano [Call number: TK5105.5.J32 2009] (1).

11. The electronic privacy papers : documents on the battle for privacy in the age of surveillance / [edited by] Bruce Schneier, David Banisar.

by Schneier, Bruce, 1963- | Banisar, David.

Material type: book Book; Literary form: Not fiction ; Audience: General; Publisher: New York : Wiley, c1997Online access: Click here to access online | Click here to access online Availability: Items available for loan: Awwal Ibrahim Library Bosso [Call number: JC596.2.S35] (3).

12. How to cheat at securing your network / [Ido Dubrawksy, technical editor].

by Dubrawsky, Ido.

Material type: book Book; Format: print regular print ; Literary form: Not fiction Publisher: Burlington, MA : Syngress, c2007Other title: Securing your network.Online access: Publisher description Availability: Items available for loan: IBB Library-Gidan Kwano [Call number: TK5105.59.H684 2007] (1).

13. Principles of computer security : CompTIA security+ and beyond / by Wm. Arthur Conklin ... [et al.].

by Conklin, Wm. Arthur (William Arthur).

Edition: 2nd ed.Material type: book Book; Format: print regular print ; Literary form: Not fiction ; Audience: General; Publisher: New York : McGraw-Hill, c2010Availability: No items available

14. IT security metrics : a practical framework for measuring security & protecting data / by Lance Hayden.

by Hayden, Lance.

Material type: book Book; Format: print regular print ; Literary form: Not fiction ; Audience: Specialized; Publisher: New York : McGraw Hill, c2010Availability: Items available for loan: IBB Library-Gidan Kwano [Call number: QA76.9.A25.H392] (1).

15. Writing security tools and exploits / James C. Foster, Vincent Liu.

by Foster, James C | Liu, Vincent.

Material type: book Book; Format: print Publisher: Rockland, MA : Syngress, c2006Other title: Writing security tools & exploits..Availability: Items available for loan: IBB Library-Gidan Kwano [Call number: TK5105.59.F68 2006] (1).

16. Understanding computer security/ by Time Life Books

by Time Life Books.

Material type: book Book; Literary form: Not fiction ; Audience: General; Publisher: Amsterdam: Tme Life Books, 1986Availability: Items available for loan: IBB Library-Gidan Kwano [Call number: TK5105.59.U63 ] (1).

17. Metasploit toolkit for penetration testing, exploit development, and vulnerability research / David Maynor, K.K. Mookhey.

by Maynor, David | Mookhey, K. K.

Material type: book Book; Format: print regular print ; Literary form: Not fiction Publisher: Burlington, MA : Syngress, c2007Online access: Publisher description Availability: Items available for loan: IBB Library-Gidan Kwano [Call number: QA76.9.A25.M39 2007] (1).

18. Encyclopedia of cybercrime / edited by Samuel C. McQuade, III.

by McQuade, Samuel C.

Material type: book Book; Format: print regular print ; Literary form: Not fiction Publisher: Westport, Conn. : Greenwood Press, 2009Online access: Table of contents only Availability: Items available for reference: [Call number: HV6773.E53 2009] (4).

19. Security engineering : a guide to building dependable distributed systems / by Ross J. Anderson.-

by Anderson, Ross, 1956-.

Edition: 2nd ed.Material type: book Book; Format: print regular print ; Literary form: Not fiction Publisher: Indianapolis, IN : Wiley Pub., c2008Online access: Publisher description | Table of contents only Availability: Items available for reference: [Call number: TK5102.85. A52 2008] (1).

20. Information assurance, security and privacy services / edited by H. Raghav Rao, Shambhu Upadhyaya.

by Rao, H. R | Upadhyaya, S.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Bingley, UK : Emerald, 2009Availability: Items available for reference: [Call number: QA76.9.A35.I54 2009] (1).