Skip to main content
Anna Centenary Library
Lists
Public lists
கணினி1
View all
Your cookies
Search history
Search the Library Catalogue
Library catalog
Title
Author
Subject
ISBN
ISSN
Series
Call number
Accession No.
Go
Advanced search
Search
Library catalog
Title
Author
Subject
ISBN
ISSN
Series
Call number
Go
Advanced search
Authority search
Tag cloud
Library
Log in to your account
Card number or username:
Password:
Home
Advanced search
Results of search for 'su:"computer networks Security measures"'
Refine your search
Availability
Limit to records with available items
Authors
Minoli ,Daniel
Bock, Lisa
Calles A, Miguel
Campbell, Stuart
Deal, Richard A.
Ferrone, Sharon
Hassan, Nihad A.
Johnson Rob
Karl fosaaen
Lewis, William
Meredith, Dale
Michael Solomon
Mitnick, Kevin D
Mustafa Toroman, Tom...
Oriyano, Sean-Philip
Peter T. Davis
Sabih, Zaid
Selamat, Siti Rahayu
Thompson, C Eric
Xiao, Yang
Show more
Show less
Item types
English Books
Reference
Locations
3RD FLOOR, A WING
4TH FLOOR, A WING
6TH FLOOR, A WING
Topics
Computer crimes; Co...
Computer networks S...
Computer networks S...
Computer networks S...
Computer Networks S...
Computer networks S...
Computer Security
COMPUTERS / Securit...
Cyber intelligence ...
Omputer Security
Ad hoc networks (Com...
Computer networks Se...
Computer Networks Se...
Computer networks Se...
Computer networks Se...
Computer networks--S...
Computer security
Computer Security
Computer Security; C...
Open source software
Show more
Show less
Your search returned 44 results.
Sort
Sort by:
Relevance
Popularity (most to least)
Popularity (least to most)
Author (A-Z)
Author (Z-A)
Call number (0-9 to A-Z)
Call number (Z-A to 9-0)
Publication/Copyright date: Newest to oldest
Publication/Copyright date: Oldest to newest
Acquisition date: Newest to oldest
Acquisition date: Oldest to newest
Title (A-Z)
Title (Z-A)
Unhighlight
Highlight
Select all
Clear all
Results
1.
Image from Google Jackets
Windows forensic analysis DVD toolkit 2E
Harlan Carvey ; Eoghan Casey, technical editor
by
Carvey, Harlan
Publication details:
Burlington
Syngress Publishing, Inc
c2009
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
363.25968364 CAR
.
2.
Image from Google Jackets
Enemy at the water cooler : real-life stories of insider threats and enterprise security management countermeasures
Brian T Contos
by
Contos, Brian T
Publication details:
Rockland, MA
Syngress
2006
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
364.168 CON
.
3.
Image from Google Jackets
Information security risk analysis
Contributed by Joseph Elias Mbowe and Irina Zlotnikova et al
by
Mbowe, Joseph Elias
Publication details:
London
Koros Press Limited
2016
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 MBO
.
4.
Image from Google Jackets
Scene of the cybercrime :Computer Forensics
by Siti Rahayu Selamat ,Shahrin Sahib et al.
by
Selamat, Siti Rahayu
Language:
English
Publication details:
United kingdom
Koros Press Limited
2015
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
364.168 SEL
.
5.
Image from Google Jackets
Open Source Intelligence Methods and tools: A Practical Guide to online Intelligence
/ Nihad A. Hassan
by
Hassan, Nihad A
Language:
English
Publication details:
United States :
Apress,
c2018
Availability:
Items available for reference:
Anna Centenary Library: Not for loan
(1)
Call number:
004.678 HAS;1
.
6.
Image from Google Jackets
Cyber Operations: Building, Defending, and Attacking Modern Computer Networks
/ Mike O'Leary
by
O'Leary, Mike
Edition:
1st edition
Language:
English
Publication details:
[Berkeley, CA]
Apress
2022
Availability:
Items available for reference:
Anna Centenary Library: Not for loan
(1)
Call number:
005.8 OLE
.
7.
Image from Google Jackets
Modern cybersecurity strategies for enterprises
/ Ashish Mishra
Protect and Secure Your Enterprise Networks, Digital Business Assets, and Endpoint Security with tested and proven methods
by
Mishra, Ashish
Language:
English
Publication details:
London
Bpb Publications
c2023
Availability:
Items available for loan:
Anna Centenary Library
(2)
Call number:
005.8 MIS, ..
.
8.
Image from Google Jackets
Learn penetration testing with python 3.x
/ Yehia Elghaly
perform offensive pentesting and prepare red teaming to prevent network attacks and web vulnerabilities
by
Elghaly, Yehia
Edition:
1st ed.
Language:
English
Publication details:
New Delhi :
Bpb Publications
c2022
Availability:
Items available for loan:
Anna Centenary Library
(2)
Call number:
005.133P ELG, ..
.
9.
Image from Google Jackets
Ethically Hacking An industrial Control Systemnew
/ Sharon Ferrone
by
Ferrone, Sharon
Language:
English
Publication details:
New Delhi
Bpb Publications
2022
Availability:
Items available for loan:
Anna Centenary Library
(2)
Call number:
005.8 FER, ..
.
10.
Image from Google Jackets
AD HOC Mobile Wireless Networks Protocols and systems
/ C.-K. Toh
by
Toh. C-K
Edition:
5th edition
Language:
eng
Publication details:
Uttar Pradesh
Pearson India Education Services
2019
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
4.65 TOH
.
11.
Image from Google Jackets
Cryptography and Network Security: Principles and Practices
/ William Stallings
by
William Stallings
Edition:
1st edition
Language:
English
Publication details:
Uttar pradesh
Pearson
2023
Availability:
Not available:
Anna Centenary Library: Checked out
(1).
12.
Image from Google Jackets
Certified ethical hacker (CEH) v12 312-50 exam guide Keep up to date with ethical hacking trends and hone your skills with hands-on activities
by
Meredith, Dale
Language:
English
Publication details:
UK :
Packt
c2022
Availability:
Items available for reference:
Anna Centenary Library: Not for loan
(2)
Call number:
005.8 MER, ..
.
13.
Image from Google Jackets
Learn ethical hacking from scratch your stepping stone to penetration testing
by
Sabih, Zaid
Language:
English
Publication details:
Birmingham, UK :
Packt
c2018
Availability:
Items available for reference:
Anna Centenary Library: Not for loan
(2)
Call number:
005.8 SAB, ..
.
14.
Image from Google Jackets
Learn wireshark confidently navigate the wireshark interface and solve real-world networking problems
by
Bock, Lisa
Language:
English
Publication details:
Birmingham, UK :
Packt
c2019
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 BOC
.
Items available for reference:
Anna Centenary Library: Not for loan
(1)
Call number:
005.8 BOC;1
.
15.
Image from Google Jackets
Practical cloud security : a guide for secure design and deployment
/ Chris Dotson
by
Dotson, Chris
Edition:
1st edition
Language:
English
Publication details:
Sebastopol, CA,
O'Reilly Media, Inc.,
2021
Availability:
Items available for loan:
Anna Centenary Library
(2)
Call number:
004.6782 DOT, ..
.
16.
Image from Google Jackets
Web application security
/Andrew Hoffman
exploitation and countermeasures for modern web applications
by
Hoffman, Andrew
Edition:
1st ed.
Language:
English
Publication details:
Sebastopol, CA
O'Reilly Media
c2020
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
006.76 HOF;1
.
Not available:
Anna Centenary Library: Checked out
(1).
17.
Image from Google Jackets
Build Your Own Cybersecurity Testing Lab
/ Ric Messier
Low-cost Solutions for Testing in Virtual and Cloud-based Environments
by
Messier, Ric
Edition:
1st ed.
Language:
English
Publication details:
Chennai
McGraw-Hill
c2020
Availability:
Items available for loan:
Anna Centenary Library
(2)
Call number:
005.8 MES, ..
.
18.
Image from Google Jackets
97 Things Every Information Security Professional Should Know Collective Wisdom From The Experts
/Christina Morillo
by
Morillo,Christina
Edition:
1st edition
Language:
English
Publication details:
, Sebastopol, California,
O'Reilly Media, Inc.
2021
Availability:
Not available:
Anna Centenary Library: Checked out
(2).
19.
Image from Google Jackets
Pro Spring Security: Securing Spring Framework 5 and Boot 2-based Java Applications
/ Carlo Scarioni, and Massimo Nardone
by
Scarioni, Carlo
Nardone, Massimo
Edition:
2nd ed.
Language:
English
Publication details:
: India
Apress,
c2019
Availability:
Items available for reference:
Anna Centenary Library: Not for loan
(2)
Call number:
005.8 SCA, ..
.
20.
Image from Google Jackets
Serverless security
/Miguel A. Calles
: understand, assess, and implement secure and reliable applications in AWS, microsoft azure, and google cloud
by
Calles A, Miguel
Language:
English
Publication details:
New York :
Apress
c2020
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 CAL
.
Items available for reference:
Anna Centenary Library: Not for loan
(1)
Call number:
005.8 CAL;1
.
21.
Image from Google Jackets
Understand, manage, and measure cyber risk
/Ryan Leirvik
practical solutions for creating a sustainable cyber program
by
Leirvik, Ryan
Language:
English
Publication details:
New York :
Apress,
c2022
Availability:
Items available for loan:
Anna Centenary Library
(2)
Call number:
005.8 LEI, ..
.
22.
Image from Google Jackets
Cybersecurity incident response
/Eric C. Thompson
by
Thompson, C Eric
Language:
English
Publication details:
Apress
c2018
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 THO
.
Items available for reference:
Anna Centenary Library: Not for loan
(1)
Call number:
005.8 THO;1
.
23.
Image from Google Jackets
Open Source Intelligence Methods and Tools: a Practical Guide to Online Intelligence
Nihad A. Hassan (Author), Rami Hijazi, Rami Hijazi
by
Hassan, Nihad A
Rami Hijazi
Language:
English
Publication details:
[United States] :
Apress,
c2018
Availability:
Items available for reference:
Anna Centenary Library: Not for loan
(1)
Call number:
004.678 HAS
.
24.
Image from Google Jackets
Mastering Azure Security
/ Toroman, Mustafa ,Tom Janetscheck
by
Mustafa Toroman, Tom Janetscheck
Edition:
2nd edition
Language:
English
Publication details:
UK
Packt
2022
Availability:
Items available for reference:
Anna Centenary Library: Not for loan
(1)
Call number:
005.8 MUS
.
25.
Image from Google Jackets
Penetration testing azure for ethical hackers
/ Okeyode, David
develop practical skills to perform pentesting and risk assessment of Microsoft Azure environments
by
Okeyode, David
Karl fosaaen
Language:
English
Publication details:
Birmingham, UK :
Packt
c2021
Availability:
Items available for reference:
Anna Centenary Library: Not for loan
(1)
Call number:
005.8 OKE
.
26.
Image from Google Jackets
The art of intrusion the real stories behind the exploits of hackers, intruders and deceivers
by
Mitnick, Kevin D
William L. Simon
Language:
English
Publication details:
Canada :
Wiley publishing
c2006
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 MIT
.
27.
Image from Google Jackets
Hacker techniques, tools, and incident handling
by
Oriyano, Sean-Philip
Michael Solomon
Edition:
3rd ed.
Language:
English
Publication details:
Burlington, MA :
Jones & Bartlett Learning,
c2020
Availability:
Items available for reference:
Anna Centenary Library: Not for loan
(1)
Call number:
005.82 ORI
.
28.
Image from Google Jackets
Network security, firewalls, and VPNs
by
Stewart, J. Michael
Edition:
2nd ed.
Language:
English
Publication details:
Burlington, Mass :
Jones & Bartlett Learning,
c2014
Availability:
Items available for reference:
Anna Centenary Library: Not for loan
(1)
Call number:
005.82 STE
.
29.
Image from Google Jackets
Security transformation : digital defense strategies to protect your company's reputation and market share
/ Mary Pat McCarthy, Stuart Campbell ; with Rob Brownstein.
by
McCarthy, Mary Pat
Campbell, Stuart
Brownstein, Rob
Edition:
1st ed.
Language:
English
Publication details:
New York
: McGraw-Hill
, c2001
Availability:
Items available for reference:
Anna Centenary Library: Not for loan
(1)
Call number:
658 MCC
.
30.
Image from Google Jackets
Securing And Controlling Cisco Routers
Peter T. Davis
by
Peter T. Davis
Language:
English
Publication details:
Boca Raton
Auerbach Publications,
2002
Availability:
Items available for reference:
Anna Centenary Library: Not for loan
(1)
Call number:
004.6 DAV
.
31.
Image from Google Jackets
Seven Deadliest Web Application Attacks
Mike Shema
by
Mike Shema
Language:
English
Publication details:
Amsterdam
Syngress/elsevier Science
2010
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
004.678
.
32.
Image from Google Jackets
Security Policies And Implementation Issues
Rob Johnson
by
Johnson Rob
Language:
English
Publication details:
Sudbury, Mass.,
Jones & Bartlett Learning
,©2011
Availability:
Items available for reference:
Anna Centenary Library: Not for loan
(1)
Call number:
005 JOH
.
33.
Image from Google Jackets
Selinux By Example : using security enhanced linux
Frank Mayer, Karl MacMillan, David Caplan
by
Mayer Frank
Language:
English
Publication details:
Upper Saddle River, Nj,
Prentice Hall,
©2007
Availability:
Items available for reference:
Anna Centenary Library: Not for loan
(1)
Call number:
005.8 MAY
.
34.
Image from Google Jackets
Software Testing And Continuous Quality Improvement, 3rd Edition
/William Lewis
by
Lewis, William
Edition:
3rd ed
Language:
English
Publication details:
Auerbach Publications,
2017
Availability:
Items available for reference:
Anna Centenary Library: Not for loan
(1)
Call number:
005.4 LEW
.
35.
Image from Google Jackets
The Art Of Software Security Assessment : Identifying And Preventing Software Vulnerabilities
/Mark Dowd
by
Dowd, Mark
Language:
English
Publication details:
Addison-wesley, Indianapolis, Ind.,
©2007
Availability:
Items available for reference:
Anna Centenary Library: Not for loan
(1)
Call number:
005.8 DOW
.
36.
Image from Google Jackets
Security+ Guide To Network Security Fundamentals
/Mark D. Ciampa
by
Ciampa, Mark D
Edition:
3rd ed
Language:
English
Publication details:
Course Technology/ Cengage Learning, Boston, Ma.,
©2009
Availability:
Items available for reference:
Anna Centenary Library: Not for loan
(1)
Call number:
005.8 CIA
.
37.
Image from Google Jackets
Security Administrator Street Smarts A Real World Guide To Comptia Security+ Skills
/David Miller, Michael C. Gregg
by
Miller, David
Edition:
2nd ed.
Language:
English
Publication details:
Wiley Pub, Indianapolis, Ind,
©2009
Availability:
Items available for reference:
Anna Centenary Library: Not for loan
(1)
Call number:
005.8 MIL
.
38.
Image from Google Jackets
Techno Security's Guide To Managing Risks: For It Managers, Auditors, And Investigators
/Jack Wiles
by
Wiles, Jack
Language:
English
Publication details:
Elsevier, Burlington, Mass.,
2007
Availability:
Items available for reference:
Anna Centenary Library: Not for loan
(1)
Call number:
005.8 WIL
.
39.
Image from Google Jackets
Rethinking Public Key Infrastructures And Digital Certificates : Building In Privacy
/Stefan A. Brands
by
Brands, Stefan A
Language:
English
Availability:
Items available for reference:
Anna Centenary Library: Not for loan
(1)
Call number:
005.8 BRA
.
40.
Image from Google Jackets
The Complete Cisco Vpn Configuration Guide
/Richard A. Deal
by
Deal, Richard A
Language:
English
Publication details:
Indianapolis
Cisco Press
2006
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 DEA
.
41.
Image from Google Jackets
Security In An Ipv6 Environment
/Daniel Minoli, Jake Kouns
by
Minoli ,Daniel
Language:
English
Publication details:
Auerbach Publications,
2016
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 MIN
.
42.
Image from Google Jackets
Secure Internet Practices: Best Practices For Securing Systems In The Internet And E-business Age
Patrick McBride
by
Mcbride, Patrick
Language:
English
Publication details:
New York
Auerbach
2002
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 MCB
.
43.
Image from Google Jackets
Security In Distributed, Grid, Mobile, And Pervasive Computing
Yang Xiao
by
Xiao, Yang
Language:
English
Publication details:
Boca Raton
Auerbach Publications
2007
Availability:
Items available for reference:
Anna Centenary Library: Not for loan
(1)
Call number:
005.8 XIA
.
44.
Image from Google Jackets
Security And Cooperation In Wireless Networks : thwarting malicious and selfish behavior in the age of ubiquitous computing
Levente Buttyán, Jean-Pierre Hubaux
by
Buttyán, Levente
Hubaux, Jean-pierre
Language:
English
Publication details:
Cambridge
Cambridge University Press
2008
Availability:
Items available for reference:
Anna Centenary Library: Not for loan
(1)
Call number:
005.8 BUT
.
Find us on the map