Your search returned 62 results.

Sort
Results
21.
Managing information security / editor John R. Vacca. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Burlington, MA : Elsevier/Syngress, 2010
Availability: Items available for loan: Aklatang Emilio Aguinaldo-Information Resource Center (1)Call number: QA 76.9.A25 .M311 2010.

22.
Security risk management body of knowledge / Julian Talbot and Miles Jakeman. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Hoboken, NJ : Wiley, c2009
Availability: Items available for loan: Aklatang Emilio Aguinaldo-Information Resource Center (1)Call number: HD 61 .T142 2009.

23.
Introduction to network security / Douglas Jacobson. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Boca Raton, FL : CRC Press, c2009
Availability: Items available for loan: Aklatang Emilio Aguinaldo-Information Resource Center (1)Call number: TK 5105.59 .J157 2009.

24.
Profiling hackers : the science of criminal profiling as applied to the world of hacking / Raoul Chiesa, Stefania Ducci, Silvio Ciappi. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Boca Raton : CRC Press, c2009
Availability: Items available for loan: Aklatang Emilio Aguinaldo-Information Resource Center (1)Call number: HV 6773 .C434 2009.

25.
Network security essentials : applications and standards / William Stallings. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Boston : Pearson, c2011
Availability: Items available for loan: Aklatang Emilio Aguinaldo-Information Resource Center (1)Call number: TK 5105.59 .St18 2011.

26.
Introduction to computer security / Michael T. Goodrich & Roberto Tamassia. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Boston : Pearson, c2011
Availability: Items available for loan: Aklatang Emilio Aguinaldo-Information Resource Center (1)Call number: QA 76.9.A25 .G625 2011.

27.
Security strategy : from requirements to reality / Bill Stackpole and Eric Oksendahl. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Boca Raton, FL : CRC Press, 2011
Availability: Items available for loan: Aklatang Emilio Aguinaldo-Information Resource Center (1)Call number: QA 76.9.A25 .St12 2011.

28.
Applied algebra : codes, ciphers, and discrete algorithms / Darel W. Hardy, Fred Richman, Carol L. Walker. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Boca Raton : CRC Press, c2009
Availability: Items available for loan: Aklatang Emilio Aguinaldo-Information Resource Center (1)Call number: QA 268 .H222 2009.

29.
Security strategies in Windows platforms and applications / Michael G. Solomon. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Sudbury, Mass. : Jones & Bartlett Learning, c2011
Availability: Items available for loan: Aklatang Emilio Aguinaldo-Information Resource Center (1)Call number: QA 76.9.A25 .So47 2011.

30.
The security risk assessment handbook : a complete guide for performing security risk assessments / Douglas Landoll. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Boca Raton, FL : CRC Press, c2011
Availability: Items available for loan: Aklatang Emilio Aguinaldo-Information Resource Center (1)Call number: HF 5548.37 .L235 2011.

31.
Cybersecurity for industrial control systems : SCADA, DCS, PLC, HMI, and SIS / Tyson Macaulay and Bryan Singer. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Boca Raton, FL : CRC Press, c2012
Availability: Items available for loan: Aklatang Emilio Aguinaldo-Information Resource Center (1)Call number: TS 156.8 .M119 2012.

32.
Computer architecture and security : fundamentals of designing secure computer systems / Shuangbao (Paul) Wang, Robert S. Ledley. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Singapore : Wiley/Higher Education Press, 2013
Availability: Items available for loan: Aklatang Emilio Aguinaldo-Information Resource Center (1)Call number: QA 76.9.A73 .W184 2013.

33.
Virtualization security : protecting virtualized environments / Dave Shackleford. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Hoboken, NJ : Wiley, 2013
Availability: Items available for loan: Aklatang Emilio Aguinaldo-Information Resource Center (1)Call number: QA 76.9.V5 .Sh11 2013.

34.
Introduction to security : operations and management / P.J. Ortmeier. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Boston : Pearson, 2013
Availability: Items available for loan: Aklatang Emilio Aguinaldo-Information Resource Center (1)Call number: HV 8290 .Or88 2013.

35.
Web Application Defender's Cookbook : battling hackers and protecting users / Ryan C Barnett ; foreword by Jeremiah Grossman. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Indianapolis, IN : Wiley Pub., Inc., 2012
Availability: Items available for loan: Aklatang Emilio Aguinaldo-Information Resource Center (1)Call number: QA 76.9.A25 .B264 2013.

36.
Security awareness : applying practical security in your world / Mark Ciampa. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Boston, MA : Course Technology, 2013
Availability: Items available for loan: Aklatang Emilio Aguinaldo-Information Resource Center (1)Call number: TK 5105.59 .C481 2014.

37.
Identity and access management : business performance through connected intelligence / Ertem Osmanoglu. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Amsterdam, MA : Syngress, ©2014
Availability: Items available for loan: Aklatang Emilio Aguinaldo-Information Resource Center (1)Call number: QA 76.9.A25 .Os54 2014.

38.
EnCase computer forensics : the official EnCE : EnCase certified examiner study guide / Steve Bunting. by
Material type: Text Text; Format: print ; Literary form: Not fiction ; Audience: Specialized;
Indianapolis, IN : Wiley, [2012]
Availability: Items available for reference: Aklatang Emilio Aguinaldo-Information Resource Center: Not for loan (1)Call number: QA 76.3 .B886 2012.

39.
Data-driven security : analysis, visualization and dashboards / Jay Jacobs, Bob Rudis. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Indianapolis, IN : John Wiley & Sons, 2014
Availability: Items available for loan: Aklatang Emilio Aguinaldo-Information Resource Center (1)Call number: QA 76.9.D3 .J153 2014.

40.
Android hacker's handbook / by Joshua J. Drake [and five others]. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Indianapolis, IN : John Wiley & Sons, [2014]
Availability: Items available for loan: Aklatang Emilio Aguinaldo-Information Resource Center (1)Call number: QA 76.774.A53 .An29 2014.

Pages