Your search returned 30 results.

Sort
Results
1.
Mechanics of user identification and authentication : fundamentals of identity management Dobromir Todorov by
Publication details: Boca Raton, FL Auerbach Publications c2007
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 TOD.

2.
Network security : private communication in a public world Charlie Kaufman, Radia Perlman, Mike Speciner by
Edition: 2nd ed
Publication details: Upper Saddle River, NJ Prentice Hall PTR c2002
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 KAU.

3.
Oracle identity management : governance, risk, and compliance architecture Marlin B. Pohlman by
Edition: 3rd ed
Publication details: Boca Raton, FL CRC Press c2008
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.7575 O POH.

4.
Penetration tester's open source toolkit Aaron W. Bayles, technical editor and contributor ... [et al.] by
Publication details: Rockland, MA Syngress Publishing c2007-
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 BAY.

5.
Practical intrusion analysis : prevention and detection for the twenty-first century Ryan Trost by
Publication details: Boston, MA Addison Wesley c2010
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 TRO.

6.
Practical intrusion detection handbook Paul E. Proctor by
Publication details: Upper Saddle River, NJ Prentice Hall PTR c2001
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 PRO.

7.
Professional rootkits Ric Vieler by
Publication details: Indianapolis, IN Wiley/Wrox c2007
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 VIE.

8.
Public-key cryptography Arto Salomaa by
Edition: 2nd, enl. ed
Publication details: Berlin Springer c1996
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.82 SAL.

9.
Public-key cryptography : theory and practice Abhijit Das, C. E. Veni Madhavan by
Publication details: Upper Saddle River, NJ Pearson Education c2009
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 DAS.

10.
The rootkit arsenal : escape and evasion in the dark corners of the system Bill Blunden by
Publication details: Plano, TX Wordware Pub c2009
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 BLU.

11.
Composition of secure multi-party protocols : a comprehensive study Yehuda Lindell by
Publication details: Berlin ; New York Springer 2003
Availability: Items available for loan: Anna Centenary Library (1)Call number: 004.62 LIN.

12.
Cryptography and security services : mechanisms and applications Manuel Mogollon by
Publication details: Hershey, PA Cybertech Pub c2007
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 MOG.

13.
Designing an IAM framework with Oracle identity and access management suite Jeff Scheidel by
Publication details: New York Oracle/McGraw-Hill c2010
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 SCH.

14.
Hack I.T. : security through penetration testing T.J. Klevinsky, Scott Laliberte, and Ajay Gupta by
Publication details: Upper Saddle River, NJ Addison-Wesley c2002
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 KLE.

15.
How secure is your wireless network? : safeguarding your Wi-Fi-LAN Lee Barken by
Publication details: Upper Saddle River, NJ Prentice Hall PTR c2004
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 BAR.

16.
Infosecurity 2008 threat analysis [authors, Champ Clark III ... [et al.]] ; foreword by Richard Ford by
Publication details: Rockland, MA Syngress Publishing c2008
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 SCH.

17.
Integrated security systems design : concepts, specifications, and implementation Thomas Norman by
Publication details: Amsterdam ; Boston, MA Elsevier Butterworth-Heinemann c2007
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 NOR.

18.
Intrusion detection in distributed systems : an abstraction-based approach by Peng Ning, Sushil Jajodia, X. Sean Wang by
Publication details: Dorcrecht ; Boston Kluwer Academic Publishers 2004
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 NIN.

19.
Intrusion detection with snort Jack Koziol by
Publication details: Indianapolis, IN SAMS c2003
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 KOZ.

20.
Intrusion signatures and analysis Stephen Northcutt ... [et al.] by
Edition: 1st ed
Publication details: Indianapolis, IN New Riders c2001
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 NOR.

21.
IT security governance guidebook with security program metrics on CD-ROM Fred Cohen by
Publication details: Boca Raton, FL Auerbach Publications/Taylor & Francis c2007
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 COH.

22.
Linux firewalls Steve Suehring, Robert Ziegler by
Edition: 3rd ed
Publication details: Indianapolis, Ind Novell Press c2006
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 SUE.

23.
802.1X port-based authentication Edwin Lyle Brown by
Publication details: Boca Raton Auerbach c2007
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 BRO.

24.
Cisco NAC appliance : enforcing host security with clean access Jamey Heary ; contributing authors, Jerry Lin, Chad Sullivan, Alok Agrawal by
Publication details: Indianapolis, IN Cisco Press c2008
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 HEA.

25.
Cisco NAC appliance : enforcing host security with clean access Jamey Heary ; contributing authors, Jerry Lin, Chad Sullivan, Alok Agrawal by
Publication details: Indianapolis, IN Cisco Press c2008
Availability: Items available for loan: Anna Centenary Library (1)Call number: TK5105.59 .H42 2008 005.8.

26.
Role-based access control David F. Ferraiolo, D. Richard Kuhn, Ramaswamy Chandramouli by
Publication details: Boston Artech House c2003
Availability: Items available for loan: Anna Centenary Library (2)Call number: 005.8 FER, ...

27.
Access controlled : the shaping of power, rights, and rule in cyberspace Ronald Deibert ... [et al.], editors by
Publication details: Cambridge, Mass MIT Press c2010
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 DEI.

28.
Access denied : the practice and policy of global Internet filtering edited by Ronald Deibert ... [et al.] by
Publication details: Cambridge, Mass MIT Press c2008
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 DEI.

29.
An information security handbook John M.D. Hunter by
Publication details: Berlin Springer c2001
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 HUN.

30.
Pages

Find us on the map

Powered by Koha