gogogo

Your search returned 71 results.

Sort
Results
Computer forensics : principles and practices / Linda Volonino, Reynaldo Anzaldua, Jana Godwin ; contributing author, Gary C. Kessler. by Series: Security series (Upper Saddle River, N.J.)
Edition: 1st ed.
Material type: Text Text; Format: print
Publication details: Upper Saddle River, N.J. : Pearson/Prentice Hall, c2007
Availability: Items available for loan: Thurles Library (1)Location, call number: Main Collection 005.8 VOL.
Endpoint security / Mark S. Kadrich. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Upper Saddle River, N.J. ; London : Addison Wesley, c2007
Availability: Items available for loan: Thurles Library (1)Location, call number: Main Collection 005.8 KAD.
The unofficial guide to ethical hacking / Ankit Fadia. by
Edition: 2nd ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Boston, MA : Thomson Course Technology, c2006
Other title:
  • Ethical hacking
Availability: No items available.
Cryptography and network security : principles and practices / William Stallings. by
Edition: 4th ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Upper Saddle River, N.J. : Pearson/Prentice Hall, c2006
Online access:
Availability: Items available for loan: Moylish Library (4)Location, call number: Main Collection 005.8 STA , ...
Computer security / Dieter Gollmann. by
Edition: 2nd ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Chichester, England ; Hoboken, NJ : Wiley, c2006
Availability: Items available for loan: Moylish Library (2)Location, call number: Main Collection 005.8 GOL , ...
Software security : building security in / Gary McGraw. by
Material type: Text Text; Format: print
Publication details: Upper Saddle River, N.J : Addison-Wesley, 2006
Availability: Items available for loan: Thurles Library (3)Location, call number: Main Collection 005.8 MCG, ...
Core security patterns : best practices and strategies for J2EE, Web services, and identity management / Christopher Steel, Ramesh Nagappan, Ray Lai. by Series: Prentice Hall PTR core series
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Upper Saddle River, N.J. : London : Prentice Hall PTR ; Pearson Education [distributor], 2006
Online access:
Availability: Items available for loan: Thurles Library (1)Location, call number: Main Collection 005.8 STE.
Trojans, worms, and spyware : a computer security professional\'s guide to malicious code / Michael Erbschloe. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Amsterdam ; Boston : Elsevier Butterworth Heinemann, c2005
Availability: Items available for loan: Moylish Library (1)Location, call number: Main Collection 005.8 ERB.
Internet forensics / Robert Jones. by
Edition: 1st ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Beijing ; Cambridge [Mass.] : O\'Reilly, c2006
Online access:
Availability: Items available for loan: Moylish Library (1)Location, call number: Main Collection 005.8 JON.
Risk management for computer security : Protecting your network and information assets / by Andy Jones & Debi Ashenden. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Amsterdam, Netherlands ; Boston : Elsevier Butterworth-Heinemann, c2005
Availability: No items available.
Stealing the network : how to own an identity / Raven Alder ... [et al.] ; Timothy Mullen (Thor), contributing author and technical editor; Johnny Long, contributing author and technical editor. by Series: Stealing the network
Material type: Text Text; Format: print ; Literary form: Fiction ; Audience: Specialized;
Publication details: Rockland, MA : [Sebastopol, CA] : Syngress ; Distributed by O\'Reilly Media, c2005
Other title:
  • You are who the computer says you are
  • How to own an identity
Availability: Items available for loan: Moylish Library (1)Location, call number: Fiction Collection 813 SYN.
Hacking exposed : network security secrets & solutions / Stuart McClure, Joel Scambray, George Kurtz. by
Edition: 5th ed.
Material type: Text Text; Format: print
Publication details: Emeryville, Calif. : McGraw-Hill/Osborne, c2005
Availability: Items available for loan: Thurles Library (2)Location, call number: Main Collection 005.8 MCC, ...
The database hacker's handbook : defending database servers / David Litchfield ... [et al.]. by
Material type: Text Text; Format: print
Publication details: Indianapolis, IN : Wiley Pub., c2005
Availability: Items available for loan: Thurles Library (3)Location, call number: Main Collection 005.8 LIT, ...
Sockets, shellcode, porting & coding : reverse engineering exploits and tool coding for security professionals / James C. Foster with Mike Price ; foreword by Stuart McClure. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Rockland, MA : [Sebastopol, CA] : Syngress Pub. Inc., ; Distributed by O'Reilly Media in the United States and Canada, 2005
Availability: Items available for loan: Thurles Library (1)Location, call number: Main Collection 005.8 FOS.
Stealing the network : how to own a continent / 131ah ... [et al.] ; Ryan Russell, technical editor ; Kevin D. Mitnick, technical reviewer. by Series: Stealing the network
Material type: Text Text; Format: print ; Literary form: Fiction
Publication details: Rockland, Mass. : Syngress , 2004
Other title:
  • How to own a continent
Availability: Items available for loan: Moylish Library (1)Location, call number: Fiction Collection 813 SYN.
Practical UNIX and Internet security / Simson Garfinkel, Gene Spafford, and Alan Schwartz. by
Edition: 3rd ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Beijing ; Sebastopol, CA : O\'Reilly, c2003
Availability: No items available.
Using the common criteria for IT security evaluation / Debra S. Herrmann. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Boca Raton, Fla. : Auerbach Publications, c2003
Availability: No items available.
Malware : fighting malicious code / Ed Skoudis. by Series: Prentice Hall series in computer networking and distributed systems
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Upper Saddle River, N.J. : London : Prentice Hall PTR, 2003
Availability: Items available for loan: Moylish Library (1)Location, call number: Main Collection 005.8 SKO.
Stealing the network : how to own the box / Ryan Russell ... [et al.] ... by Series: Stealing the network
Material type: Text Text; Format: print ; Literary form: Short stories ; Audience: Specialized;
Publication details: Rockland, MA. : Syngress Pub. : Distributed by Publishers Group West, 2003
Other title:
  • How to own the box
Availability: Items available for loan: Moylish Library (1)Location, call number: Fiction Collection 813 SYN.
Information security management handbook / Harold F. Tipton & Micki Krause, editors. by
Edition: 4th edition.
Material type: Text Text; Format: print
Publication details: Boca Raton, FL : Auerbach, c2000
Availability: Items available for loan: Moylish Library (1)Location, call number: Main Collection 005.8 TIP.
Pages

Powered by Koha