Research Catalog

  • Forensic discovery / Dan Farmer, Wietse Venema.

    • Text
    • Upper Saddle River, NJ : Addison-Wesley, [2005], ©2005.
    • 2005-2005
    • 2 Items
    FormatCall NumberItem Location
    Text Off-site
    Not available - Please for assistance.
    FormatCall NumberItem Location
    Text QA76.9.A25 F34 2005Off-site
  • Computer forensics : incident response essentials / Warren G. Kruse II, Jay G. Heiser.

    • Text
    • Boston, Mass. : Addison-Wesley : Lucent Technologies, c2002.
    • 2002
    • 1 Item
    FormatCall NumberItem Location
    Text QA76.9.A25 K78 2002Off-site
  • Intercept : the secret history of computers and spies / Gordon Corera.

    • Text
    • London : Weidenfeld & Nicolson, 2015.
    • 2015
    • 1 Item
    FormatCall NumberItem Location
    Text JN329.I6 C67 2015Off-site
  • Introduction to network security / Douglas Jacobson.

    • Text
    • Boca Raton : Chapman & Hall/CRC, ©2009.
    • 2009
  • Protection and security on the information superhighway / Frederick B. Cohen.

    • Text
    • New York : Wiley, ©1995.
    • 1995
    • 1 Item
    FormatCall NumberItem Location
    Text QA76.9.A25 C59 1995Off-site
  • Security, accuracy, and privacy in computer systems.

    • Text
    • Englewood Cliffs, N.J., Prentice-Hall [1973]
    • 1973
    • 1 Item
    FormatCall NumberItem Location
    Text HF5548.2.M342Off-site
  • Malicious cryptography : exposing cryptovirology / Adam Young, Moti Yung.

    • Text
    • Hoboken, NJ : Wiley, ©2004.
    • 2004
    • 1 Item
    FormatCall NumberItem Location
    Text QA76.9.A25 Y65 2004Off-site
  • Software security engineering : a guide for project managers / Julia H. Allen [and others].

    • Text
    • Upper Saddle River, NJ : Addison-Wesley, ©2008.
    • 2008
    • 1 Item
    FormatCall NumberItem Location
    Text QA76.9.A25 S654 2008Off-site
  • Host Identity Protocol (HIP) : towards the secure mobile Internet / Andrei Gurtov.

    • Text
    • Chichester, U.K. : Wiley, 2008.
    • 2008
    • 1 Item
    FormatCall NumberItem Location
    Text TK5103.4885 .G87 2008Off-site
  • Open source systems security certification / Ernesto Damiani, Claudio Agostino Ardagna, Nabil El Ioini.

    • Text
    • New York : Springer, ©2009.
    • 2009
    • 1 Item
    FormatCall NumberItem Location
    Text QA76.9.A25 D36 2009Off-site
  • Security in computing systems : challenges, approaches and solutions / Joachim Biskup.

    • Text
    • Berlin : Springer, ©2009.
    • 2009
    • 1 Item
    FormatCall NumberItem Location
    Text QA76.9.A25 B57 2009Off-site
  • Security in wireless ad hoc and sensor networks / Erdal Çayırcı, Chunming Rong.

    • Text
    • Chichester, U.K. : Wiley, ©2009.
    • 2009
    • 1 Item
    FormatCall NumberItem Location
    Text TK5105.59 .C387 2009Off-site
  • Security of information and communication networks / Stamatios V. Kartalopoulos.

    • Text
    • Hoboken, N.J. : Wiley, ©2009.
    • 2009
    • 1 Item
    FormatCall NumberItem Location
    Text TK5105.59 .K377 2009Off-site
  • Security in a Web 2.0+ world : a standards based approach / C. Solari ; and contributors.

    • Text
    • Chichester, West Sussex : Wiley, 2009.
    • 2009
    • 1 Item
    FormatCall NumberItem Location
    Text TK5105.88817 .S65 2009Off-site
  • Mobile communication systems and security / Man Young Rhee.

    • Text
    • Singapore ; Hoboken, NJ : J. Wiley & Sons (Asia) ; [Piscataway, NJ] : IEEE Press, ©2009.
    • 2009
    • 1 Item
    FormatCall NumberItem Location
    Text TK5103.2 .R47 2009Off-site
  • Handbook of electronic security and digital forensics / edited by Hamid Jahankhani [and others].

    • Text
    • Singapore ; Hackensack, NJ : World Scientific, ©2010.
    • 2010
    • 1 Item
    FormatCall NumberItem Location
    Text QA76.9.A25 H355 2010Off-site
  • When gadgets betray us : the dark side of our infatuation with new technologies / Robert Vamosi.

    • Text
    • New York : Basic Books, ©2011.
    • 2011
    • 1 Item
    FormatCall NumberItem Location
    Text QA76.9.C66 V36 2011Off-site
  • Information security for automated speech identification / Fathi E. Abd El-Samie.

    • Text
    • New York : Springer, 2011.
    • 2011
    • 1 Item
    FormatCall NumberItem Location
    Text TK7895.S65 E57 2011Off-site
  • Computer security and industrial cryptography : state of the art and evolution : ESAT course, Leuven, Belgium, May 21-23, 1991 / Bart Preneel, René Govaerts, Joos Vandewalle, (eds.).

    • Text
    • Berlin ; New York : Springer-Verlag, ©1993.
    • 1993
    • 1 Item
    FormatCall NumberItem Location
    Text QA76.9.A25 C6373 1993Off-site

No results found from Digital Research Books Beta

Digital books for research from multiple sources world wide- all free to read, download, and keep. No Library Card is Required. Read more about the project.

digital-research-book
Explore Digital Research Books Beta