1.
Computer forensics : incident response essentials / [by] Warren G. Kruse II [and] Jay G. Heiser.
by Kruse, Warren G | Heiser, Jay G.
Material type: Book; Format:
print
Publisher: Boston : Addison-Wesley, c2002Availability: No items available
2.
Computer forensics : incident response essentials / [by] Warren G. Kruse II [and] Jay G. Heiser.
by Kruse, Warren G | Heiser, Jay G.
Material type: Book; Format:
print
Publisher: Boston : Addison-Wesley, c2002Availability: Items available for loan: Matheson Library [Call number: 005.8 K94] (3).
3.
Essential computer security : everyone's guide to e-mail, internet, and wireless security / Tony Bradley ; Harlan Carvey (technical editor).
by Bradley, Tony | Carvey, Harlan.
Material type: Book; Format:
print
Publisher: Rockland, MA : Syngress, [c2006]Availability: No items available Lost (1).
4.
Computer security reference book / edited by K.M. Jackson and J. Hruska ; US associate editor, Donn B. Parker.
by Jackson, Keith M | Parker, Donn B | Hruska, Jan, 1957- .
Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton, Fla. : CRC, 1992Availability: No items available Lost (1).
5.
19 deadly sins of software security : programming flaws and how to fix them / Michael Howard, David LeBlanc, John Viega.
by Howard, Michael | LeBlanc, David | Viega, John.
Material type: Book; Format:
print
Publisher: New York : McGraw-Hill/Osborne, c2005Online access: Click here to access online Availability: Items available for reference: Matheson Library [Call number: R 005.8 H851] (1).
6.
The computer security handbook / Richard H. Baker.
by Baker, Richard H.
Publisher: Blue Ridge Summit, PA : TAB Professional and Reference Books, c1985Availability: Items available for loan: Matheson Library [Call number: 005.8 B168c] (1).
7.
PC data recovery and disaster prevention / S. Harris, S. Nugus.
by Harris, Steve | Nugus, S.
Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Oxford : NCC Blackwell, c1992Availability: Items available for loan: Matheson Library [Call number: 005.8 H316p] (1).
8.
Computers under attack : intruders, worms, and viruses / edited by Peter J. Denning.
by Denning, Peter J.
Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York : ACM Press, c1990Availability: Items available for loan: Matheson Library [Call number: 005.8 C738] (2).
9.
Cyberpunk : outlaws and hackers on the computer frontier / Katie Hafner and John Markoff.
by Hafner, Katie | Markoff, John.
Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York : Simon & Schuster, c1991Availability: Items available for loan: Matheson Library [Call number: 364.168 H238c] (1).
10.
Computer security reference book / edited by K.M. Jackson and J. Hruska ; US associate editor, Donn B. Parker.
by Jackson, Keith M | Parker, Donn B | Hruska, Jan, 1957- .
Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton, Fla. : CRC, 1992Availability: No items available
11.
Information management / Michael H. Kay.
by Kay, Michael H.
Material type: Continuing resource; Format:
print
; Type of continuing resource:
periodical
Publisher: London : Prentice Hall, 1993Availability: No items available Lost (1).
12.
Applied cryptography : protocols, algorithms, and source code in C / Bruce Schneier.
by Schneier, Bruce, 1963- .
Edition: 2nd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York : Wiley, c1996Availability: Items available for loan: Matheson Library [Call number: 005.82 S359] (1).
13.
UNIX system security : how to protect your data and prevent intruders / Rik Farrow.
by Farrow, Rik, 1950- .
Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Reading, Mass. : Addison-Wesley, c1991Availability: No items available Lost (1).
14.
Information management / Michael H. Kay.
by Kay, Michael H.
Material type: Continuing resource; Format:
print
; Type of continuing resource:
periodical
Publisher: London : Prentice Hall, 1993Availability: No items available
15.
Applied cryptography : protocols, algorithms, and source code in C / Bruce Schneier.
by Schneier, Bruce, 1963- .
Edition: 2nd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York : Wiley, c1996Availability: No items available