Return to home page
     
Limit search to available items
Result Page   1 2 Next  
Save all on page
CALL NOS (1-50 of 76)
005.8
1
Add to Book Cart
Book Cover

Active defense : a comprehensive guide to network security
Brenton, Chris.
San Francisco : SYBEX, c2001.
 
c2001
PRINTED MATL
LOCATION CALL # LOAN PER. STATUS
 Bay 2  005.8    NORMAL LOAN  CHECK SHELF
2
Add to Book Cart
Book Cover

Active defense : a comprehensive guide to network security Computer file
Brenton, Chris.
San Francisco : SYBEX, c2001.
 
c2001
PRINTED MATL
LOCATION CALL # LOAN PER. STATUS
 CDs at Issue Desk  005.8    NORMAL LOAN  CHECK SHELF
3
Add to Book Cart
Book Cover

The art of software security assessment : identifying and preventing software vulnerabilities
Dowd, Mark.
Indianapolis, Ind. : Addison-Wesley, c2007.
c2007
PRINTED MATL
LOCATION CALL # LOAN PER. STATUS
 Bay 2  005.8    NORMAL LOAN  CHECK SHELF
4
Add to Book Cart
Book Cover

Assessing network security
Lam, Kevin.
Redmond, Wash. : Microsoft Press, c2004.
 
c2004
PRINTED MATL
LOCATION CALL # LOAN PER. STATUS
 Bay 2  005.8    NORMAL LOAN  CHECK SHELF
5
Add to Book Cart
 

Assessing network security


 
 
COMPUTER FILE
LOCATION CALL # LOAN PER. STATUS
 CDs at Issue Desk  005.8    NORMAL LOAN  CHECK SHELF
6
Add to Book Cart
 

Broadway Regional Broadband Programme
Department of Communications, Marine and Natural Resources
Dublin : DCMNR : 2005
 
2005
PRINTED MATL
LOCATION CALL # LOAN PER. STATUS
 Bay 11  005.8    REFERENCE ONLY  CHECK SHELF
7
Add to Book Cart
Book Cover

Building Internet firewalls
Chapman, D. Brent.
Sebastopol, CA : O'Reilly & Associates,, 1995.
 
1995
PRINTED MATL
LOCATION CALL # LOAN PER. STATUS
 Bay 2  005.8    NORMAL LOAN  CHECK SHELF
8
Add to Book Cart
Book Cover

Casp : comptia advanced security practitioner study guide (exam cas-001)
Gregg, Michael H.
Indianapolis, IN : Wiley Pub., Inc., 2012.
 
2012
PRINTED MATL
LOCATION CALL # LOAN PER. STATUS
 Main Shelf Downstairs  005.8    NORMAL LOAN  CHECK SHELF
9
Add to Book Cart
Book Cover

Certification and security in E-services : from E-government to E-business : IFIP 17th World Compute
IFIP World Computer Congress (17th : 2002 : Montrâeal, Quâebec)
Boston : Kluwer Academic Publishers, c2003.
c2003
PRINTED MATL
LOCATION CALL # LOAN PER. STATUS
 Bay 2  005.8    REFERENCE ONLY  CHECK SHELF
 Bay 2  005.8    NORMAL LOAN  CHECK SHELF
10
Add to Book Cart
Book Cover

Compute!'s Computer viruses
Roberts, Ralph.
Greensboro, NC : Compute! Books, c1988.
 
c1988
PRINTED MATL
LOCATION CALL # LOAN PER. STATUS
 Bay 2  005.8    REFERENCE ONLY  CHECK SHELF
11
Add to Book Cart
Book Cover

Computer forensics : incident response essentials
Kruse, Warren G.
Boston, MA : Addison-Wesley : Lucent Technologies, 2002.
 
2002
PRINTED MATL
LOCATION CALL # LOAN PER. STATUS
 Bay 2  005.8    NORMAL LOAN  CHECK SHELF
12
Add to Book Cart
Book Cover

Computer network security and cyber ethics
Kizza, Joseph Migga.
Jefferson, N.C. : McFarland : c2006.
 
c2006
PRINTED MATL
LOCATION CALL # LOAN PER. STATUS
 Bay 2  005.8    NORMAL LOAN  CHECK SHELF
13
Add to Book Cart
Book Cover

The COMPUTER PRIVACY Handbook:A practical guide to E-Mail encryption,Data Protection,and PGP Privacy
Bacard, André.
Berkeley,CA : Beachpit Presss, 1995.
 
1995
PRINTED MATL
LOCATION CALL # LOAN PER. STATUS
 Bay 2  005.8    NORMAL LOAN  CHECK SHELF
14
Add to Book Cart
Book Cover

Computer security basics
Russell, Deborah.
Sebastopol, CA : O'Reilly & Associates, c1991 (1992 printing with minor corrections)
 
c1991
PRINTED MATL
LOCATION CALL # LOAN PER. STATUS
 Bay 2  005.8    NORMAL LOAN  CHECK SHELF
15
Add to Book Cart
Book Cover

Computer security basics
Lehtinen, Rick.
Sebastopol, CA : O'Reilly & Associates, c2006.
c2006
PRINTED MATL
LOCATION CALL # LOAN PER. STATUS
 Bay 2  005.8    NORMAL LOAN  DUE 08-11-17
16
Add to Book Cart
Book Cover

Computer security basics
Lehtinen, Rick.
Beijing ; Farnham : O'Reilly, 2006.
2006
EBOOKS
17
Add to Book Cart
Book Cover

Computer security basics
Lehtinen, Rick.
Sebastopol, CA : O'Reilly & Associates, c2006.
c2006
PRINTED MATL
18
Add to Book Cart
Book Cover

Computer security : principles and practice
Stallings, William.
Harlow : Pearson Education, c2012.
 
c2012
PRINTED MATL
LOCATION CALL # LOAN PER. STATUS
 Bay 2  005.8    NORMAL LOAN  CHECK SHELF
19
Add to Book Cart
Book Cover

The computer virus crisis
Fites, Philip E.
New York : Van Nostrand Reinhold, c1989.
 
c1989
PRINTED MATL
LOCATION CALL # LOAN PER. STATUS
 Bay 2  005.8    NORMAL LOAN  CHECK SHELF
20
Add to Book Cart
Book Cover

Computer viruses : a high-tech disease
Burger, Ralf.
Grand Rapids, MI : Abacus, c1988 (1989 printing)
 
c1988
PRINTED MATL
LOCATION CALL # LOAN PER. STATUS
 Bay 2  005.8    NORMAL LOAN  CHECK SHELF
21
Add to Book Cart
Book Cover

Computers at risk : safe computing in the information age

Washington, D.C. : National Academy Press, 1991.
 
1991
PRINTED MATL
LOCATION CALL # LOAN PER. STATUS
 Bay 2  005.8    NORMAL LOAN  CHECK SHELF
22
Add to Book Cart
Book Cover

Counter hack reloaded : a step-by-step guide to computer attacks and effective defenses
Skoudis, Ed.
Upper Saddle River, NJ : Prentice Hall Professional Technical Reference, c2006.
c2006
PRINTED MATL
LOCATION CALL # LOAN PER. STATUS
 Bay 2  005.8    NORMAL LOAN  CHECK SHELF
23
Add to Book Cart
Book Cover

Cryptography and network security : principles and practice
Stallings, William.
Upper Saddle River, N.J. : Prentice Hall, c1999.
 
c1999
PRINTED MATL
LOCATION CALL # LOAN PER. STATUS
 Bay 2  005.8    NORMAL LOAN  CHECK SHELF
 Bay 2  005.8    NORMAL LOAN  CHECK SHELF
 Bay 2  005.8 c.2  NORMAL LOAN  CHECK SHELF
There are additional copies/volumes of this item
24
Add to Book Cart
Book Cover

Cryptography and network security : principles and practice
Stallings, William.
Upper Saddle River, N.J. : Prentice Hall, c2003.
 
c2003
PRINTED MATL
LOCATION CALL # LOAN PER. STATUS
 Bay 2  005.8    NORMAL LOAN  CHECK SHELF
25
Add to Book Cart
Book Cover

Cryptography and secure communications
Rhee, Man Young.
Singapore ; New York : McGraw-Hill, c1994.
 
c1994
PRINTED MATL
LOCATION CALL # LOAN PER. STATUS
 Bay 2  005.8    NORMAL LOAN  CHECK SHELF
26
Add to Book Cart
Book Cover

The database hacker's handbook : defending database servers

Indianapolis, IN : Wiley Pub., c2005.
c2005
PRINTED MATL
LOCATION CALL # LOAN PER. STATUS
 Bay 2  005.8    NORMAL LOAN  CHECK SHELF
 Bay 2  005.8    NORMAL LOAN  CHECK SHELF
27
Add to Book Cart
Book Cover

Database security
Basta, Alfred.
Clifton Park, NY : Course Technology, Cengage Learning, 2012.
 
2012
PRINTED MATL
LOCATION CALL # LOAN PER. STATUS
 Bay 2  005.8    NORMAL LOAN  CHECK SHELF
 Bay 2  005.8    NORMAL LOAN  CHECK SHELF
 Bay 2  005.8    REFERENCE ONLY  LIB USE ONLY
28
Add to Book Cart
Book Cover

Designing network security
Kaeo, Merike.
Indianapolis, IN : Cisco Press : Macmillan Technical Pub., c1999.
 
c1999
PRINTED MATL
LOCATION CALL # LOAN PER. STATUS
 Bay 2  005.8    REFERENCE ONLY  CHECK SHELF
 Bay 2  005.8    NORMAL LOAN  CHECK SHELF
29
Add to Book Cart
Book Cover

Digital watermarking
Cox, I. J. (Ingemar J.)
San Francisco, Calif. : Morgan Kaufmann, 2002.
 
2002
PRINTED MATL
LOCATION CALL # LOAN PER. STATUS
 Bay 2  005.8    NORMAL LOAN  CHECK SHELF
30
Add to Book Cart
Book Cover

FIREWALLS and INTERNET SECURITY:Repelling the Wily Hacker.
Cheswick, William R.
Reading,MA : ADDISON WESLEY, 1994.
 
1994
PRINTED MATL
LOCATION CALL # LOAN PER. STATUS
 Bay 2  005.8    NORMAL LOAN  CHECK SHELF
 Bay 2  005.8    NORMAL LOAN  CHECK SHELF
 Bay 2  005.8    NORMAL LOAN  CHECK SHELF
There are additional copies/volumes of this item
31
Add to Book Cart
Book Cover

Foundations of security
Daswani, Neil
United States : Apress : 2007
 
2007
PRINTED MATL
LOCATION CALL # LOAN PER. STATUS
 Bay 2  005.8    NORMAL LOAN  CHECK SHELF
 Bay 2  005.8    NORMAL LOAN  CHECK SHELF
32
Add to Book Cart
Book Cover

Fundamentals of computer security
Pieprzyk, Josef, 1949-
Berlin ; London : Springer, 2003.
 
2003
PRINTED MATL
LOCATION CALL # LOAN PER. STATUS
 Bay 2  005.8    NORMAL LOAN  CHECK SHELF
33
Add to Book Cart
Book Cover

Google hacks: tips & tools for smarter searching.
Calishain, Tara & Dornfest, Rael
Sebastopol; CA : O'Reilly : 2003, 2004
 
2004
PRINTED MATL
LOCATION CALL # LOAN PER. STATUS
 Bay 2  005.8    NORMAL LOAN  CHECK SHELF
 Bay 2  005.8    NORMAL LOAN  CHECK SHELF
34
Add to Book Cart
Book Cover

Guide to computer forensics and investigations
Philips, Amelia.
Boston, MA : Cengage Learning, 2010.
 
2010
PRINTED MATL
LOCATION CALL # LOAN PER. STATUS
 Bay 2  005.8    NORMAL LOAN  CHECK SHELF
 CDs at Issue Desk  005.8    NORMAL LOAN  CHECK SHELF
 Bay 2  005.8    NORMAL LOAN  CHECK SHELF
There are additional copies/volumes of this item
35
Add to Book Cart
Book Cover

Hacking exposed 6 : network security secrets & solutions
McClure, Stuart.
New York : McGraw-Hill, c2009.
 
c2009
PRINTED MATL
LOCATION CALL # LOAN PER. STATUS
 Bay 2  005.8    NORMAL LOAN  CHECK SHELF
 Bay 2  005.8    NORMAL LOAN  CHECK SHELF
 Bay 2  005.8    REFERENCE ONLY  LIB USE ONLY
36
Add to Book Cart
Book Cover

Incident response and computer forensics
Prosise, Chris.
New York, New York : McGraw-Hill/Osborne, c2003.
c2003
PRINTED MATL
LOCATION CALL # LOAN PER. STATUS
 Bay 2  005.8    NORMAL LOAN  CHECK SHELF
37
Add to Book Cart
Book Cover

Information hiding : steganography and watermarking : attacks and countermeasures
Johnson, Neil F.
Boston : Kluwer Academic, c2001.
 
c2001
PRINTED MATL
LOCATION CALL # LOAN PER. STATUS
 Bay 2  005.8    NORMAL LOAN  CHECK SHELF
38
Add to Book Cart
Book Cover

Information security and privacy / Third Australasian conference, ACISP' 98, Brisbane, Australia, Ju
Boyd, Colin ; Dawson, Ed
Berlin : Heidelberg : Springer : 1998
 
1998
PRINTED MATL
LOCATION CALL # LOAN PER. STATUS
 Bay 2  005.8    REFERENCE ONLY  CHECK SHELF
 Bay 2  005.8    NORMAL LOAN  CHECK SHELF
39
Add to Book Cart
Book Cover

The information systems security officer's guide : establishing and managing an information protecti
Kovacich, Gerald L.
Amsterdam ; Boston : Butterworth-Heinemann, c2003.
c2003
PRINTED MATL
LOCATION CALL # LOAN PER. STATUS
 Bay 2  005.8    NORMAL LOAN  CHECK SHELF
40
Add to Book Cart
Book Cover

Internet and TCP/IP network security : securing protocols and applications
Pabrai, Uday O.
New York : McGraw-Hill, c1996.
 
c1996
PRINTED MATL
LOCATION CALL # LOAN PER. STATUS
 Bay 2  005.8    NORMAL LOAN  CHECK SHELF
41
Add to Book Cart
Book Cover

Internet Security & Acceleration Server 2004 EVALUATION SOFTWARE 120-DAY LIMIT ON USE CD/ROM (1 of 2
Reimer, Stanley Lewis

 
 
COMPUTER FILE
42
Add to Book Cart
Book Cover

Internet Security & Acceleration Server 2004 RESOURCES AND INFORMATION CD/ROM (1 of 2 Cd's)
Reimer, Stanley Lewis

 
 
COMPUTER FILE
43
Add to Book Cart
Book Cover

Internet security for business

New York : Wiley, c1996.
 
c1996
PRINTED MATL
LOCATION CALL # LOAN PER. STATUS
 Bay 2  005.8    NORMAL LOAN  CHECK SHELF
 Bay 2  005.8    REFERENCE ONLY  CHECK SHELF
44
Add to Book Cart
Book Cover

Internet security : hacking, counterhacking, and society

Sudbury, Mass. : Jones and Bartlett Publishers : 2007.
 
2007
PRINTED MATL
LOCATION CALL # LOAN PER. STATUS
 Bay 2  005.8    NORMAL LOAN  CHECK SHELF
 Bay 2  005.8    NORMAL LOAN  CHECK SHELF
45
Add to Book Cart
Book Cover

Introduction to cryptolology and PC security
Beckett, Brian.
New York : McGraw-Hill Pub., c1997.
 
c1997
PRINTED MATL
LOCATION CALL # LOAN PER. STATUS
 Bay 2  005.8    NORMAL LOAN  MISSING
46
Add to Book Cart
Book Cover

Intrusion detection
Bace, Rebecca Gurley.
Indianapolis, IN : Macmillan Technical Publishing, c2000.
 
c2000
PRINTED MATL
LOCATION CALL # LOAN PER. STATUS
 Bay 2  005.8    NORMAL LOAN  CHECK SHELF
47
Add to Book Cart
Book Cover

J2EE security for servlets, EJBs and Web services : applying theory and standards to practice
Kumar, Pankaj.
Upper Saddle River, N.J. : Prentice Hall PTR, c2004.
 
c2004
PRINTED MATL
LOCATION CALL # LOAN PER. STATUS
 Bay 2  005.8    NORMAL LOAN  CHECK SHELF
48
Add to Book Cart
Book Cover

Java cryptography
Knudsen, Jonathan.
Sebastopol, Calif : O'Reilly, c1998.
 
c1998
PRINTED MATL
LOCATION CALL # LOAN PER. STATUS
 Bay 2  005.8    NORMAL LOAN  CHECK SHELF
 Bay 2  005.8    NORMAL LOAN  CHECK SHELF
 Bay 2  005.8    NORMAL LOAN  CHECK SHELF
49
Add to Book Cart
Book Cover

Java security
McGraw, Gary, 1966-
New York : Wiley, c1997.
 
c1997
PRINTED MATL
LOCATION CALL # LOAN PER. STATUS
 Bay 2  005.8    NORMAL LOAN  CHECK SHELF
50
Add to Book Cart
Book Cover

Malware analyst's cookbook and dvd : tools and techniques for fighting malicious code
Ligh, Michael W.
Indianapolis, IND. : Wiley Publishing Inc : 2011.
 
2011
PRINTED MATL
LOCATION CALL # LOAN PER. STATUS
 Bay 2  005.8    REFERENCE ONLY  LIB USE ONLY
 CDs at Issue Desk  005.8    REFERENCE ONLY  LIB USE ONLY
Locate in results
More Resources: Click on the buttons below for more information on the items, for example table of contents and front cover images
More Information
Athlone IT Blanchardstown IT Carlow IT Cork IT IADT Dun Laoghaire Dundalk IT GMIT Sligo IT Limerick IT Tallaght IT Tipperary IT Tralee IT Waterford IT
Result Page   1 2 Next