Your search returned 15 results. Subscribe to this search

|
1. Computer forensics : incident response essentials / [by] Warren G. Kruse II [and] Jay G. Heiser.

by Kruse, Warren G | Heiser, Jay G.

Material type: book Book; Format: print Publisher: Boston : Addison-Wesley, c2002Availability: No items available

2. Computer forensics : incident response essentials / [by] Warren G. Kruse II [and] Jay G. Heiser.

by Kruse, Warren G | Heiser, Jay G.

Material type: book Book; Format: print Publisher: Boston : Addison-Wesley, c2002Availability: Items available for loan: Matheson Library [Call number: 005.8 K94] (3).
Lists:

3. Essential computer security : everyone's guide to e-mail, internet, and wireless security / Tony Bradley ; Harlan Carvey (technical editor).

by Bradley, Tony | Carvey, Harlan.

Material type: book Book; Format: print Publisher: Rockland, MA : Syngress, [c2006]Availability: No items available Lost (1).

4. Computer security reference book / edited by K.M. Jackson and J. Hruska ; US associate editor, Donn B. Parker.

by Jackson, Keith M | Parker, Donn B | Hruska, Jan, 1957-.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton, Fla. : CRC, 1992Availability: No items available Lost (1).

5. 19 deadly sins of software security : programming flaws and how to fix them / Michael Howard, David LeBlanc, John Viega.

by Howard, Michael | LeBlanc, David | Viega, John.

Material type: book Book; Format: print Publisher: New York : McGraw-Hill/Osborne, c2005Online access: Click here to access online Availability: Items available for reference: Matheson Library [Call number: R 005.8 H851] (1).

6. The computer security handbook / Richard H. Baker.

by Baker, Richard H.

Publisher: Blue Ridge Summit, PA : TAB Professional and Reference Books, c1985Availability: Items available for loan: Matheson Library [Call number: 005.8 B168c] (1).

7. PC data recovery and disaster prevention / S. Harris, S. Nugus.

by Harris, Steve | Nugus, S.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Oxford : NCC Blackwell, c1992Availability: Items available for loan: Matheson Library [Call number: 005.8 H316p] (1).

8. Computers under attack : intruders, worms, and viruses / edited by Peter J. Denning.

by Denning, Peter J.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York : ACM Press, c1990Availability: Items available for loan: Matheson Library [Call number: 005.8 C738] (2).

9. Cyberpunk : outlaws and hackers on the computer frontier / Katie Hafner and John Markoff.

by Hafner, Katie | Markoff, John.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York : Simon & Schuster, c1991Availability: Items available for loan: Matheson Library [Call number: 364.168 H238c] (1).

10. Computer security reference book / edited by K.M. Jackson and J. Hruska ; US associate editor, Donn B. Parker.

by Jackson, Keith M | Parker, Donn B | Hruska, Jan, 1957-.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton, Fla. : CRC, 1992Availability: No items available

11. Information management / Michael H. Kay.

by Kay, Michael H.

Material type: serial Continuing resource; Format: print ; Type of continuing resource: periodical Publisher: London : Prentice Hall, 1993Availability: No items available Lost (1).

12. Applied cryptography : protocols, algorithms, and source code in C / Bruce Schneier.

by Schneier, Bruce, 1963-.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York : Wiley, c1996Availability: Items available for loan: Matheson Library [Call number: 005.82 S359] (1).

13. UNIX system security : how to protect your data and prevent intruders / Rik Farrow.

by Farrow, Rik, 1950-.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Reading, Mass. : Addison-Wesley, c1991Availability: No items available Lost (1).

14. Information management / Michael H. Kay.

by Kay, Michael H.

Material type: serial Continuing resource; Format: print ; Type of continuing resource: periodical Publisher: London : Prentice Hall, 1993Availability: No items available

15. Applied cryptography : protocols, algorithms, and source code in C / Bruce Schneier.

by Schneier, Bruce, 1963-.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York : Wiley, c1996Availability: No items available

About Us

The Matheson Library of Papua New Guinea University of Technology consists of a Bulolo University College Library, TFTC Library, Lae School of Nursing Library and SUSU campus in Chimbu.

Quick Links

 

Copyright © 2024 All Rights Reserved by Matheson Library.