SearchType
KEYWORD
AUTHOR
TITLE
SUBJECT
CALL NO
Search
Search Scope
View Entire Collection
Letterkenny Institute of Technology Main Campus
Tourism College Killybegs Campus
Limit search to available items
Result Page
1
2
Next
CALL NOS (1-50 of 76)
005.8
1
Request
Active defense : a comprehensive guide to network security
Brenton, Chris.
San Francisco : SYBEX, c2001.
c2001
LOCATION
CALL #
LOAN PER.
STATUS
Bay 2
005.8
NORMAL LOAN
CHECK SHELF
2
Request
Active defense : a comprehensive guide to network security Computer file
Brenton, Chris.
San Francisco : SYBEX, c2001.
c2001
LOCATION
CALL #
LOAN PER.
STATUS
CDs at Issue Desk
005.8
NORMAL LOAN
CHECK SHELF
3
Request
The art of software security assessment : identifying and preventing software vulnerabilities
Dowd, Mark.
Indianapolis, Ind. : Addison-Wesley, c2007.
Website
c2007
LOCATION
CALL #
LOAN PER.
STATUS
Bay 2
005.8
NORMAL LOAN
CHECK SHELF
4
Request
Assessing network security
Lam, Kevin.
Redmond, Wash. : Microsoft Press, c2004.
c2004
LOCATION
CALL #
LOAN PER.
STATUS
Bay 2
005.8
NORMAL LOAN
CHECK SHELF
5
Request
Assessing network security
LOCATION
CALL #
LOAN PER.
STATUS
CDs at Issue Desk
005.8
NORMAL LOAN
CHECK SHELF
6
Request
Broadway Regional Broadband Programme
Department of Communications, Marine and Natural Resources
Dublin : DCMNR : 2005
2005
LOCATION
CALL #
LOAN PER.
STATUS
Bay 11
005.8
REFERENCE ONLY
CHECK SHELF
7
Request
Building Internet firewalls
Chapman, D. Brent.
Sebastopol, CA : O'Reilly & Associates,, 1995.
1995
LOCATION
CALL #
LOAN PER.
STATUS
Bay 2
005.8
NORMAL LOAN
CHECK SHELF
8
Request
Casp : comptia advanced security practitioner study guide (exam cas-001)
Gregg, Michael H.
Indianapolis, IN : Wiley Pub., Inc., 2012.
2012
LOCATION
CALL #
LOAN PER.
STATUS
Main Shelf Downstairs
005.8
NORMAL LOAN
CHECK SHELF
9
Request
Certification and security in E-services : from E-government to E-business : IFIP 17th World Compute
IFIP World Computer Congress (17th : 2002 : Montrâeal, Quâebec)
Boston : Kluwer Academic Publishers, c2003.
Website
c2003
LOCATION
CALL #
LOAN PER.
STATUS
Bay 2
005.8
REFERENCE ONLY
CHECK SHELF
Bay 2
005.8
NORMAL LOAN
CHECK SHELF
10
Request
Compute!'s Computer viruses
Roberts, Ralph.
Greensboro, NC : Compute! Books, c1988.
c1988
LOCATION
CALL #
LOAN PER.
STATUS
Bay 2
005.8
REFERENCE ONLY
CHECK SHELF
11
Request
Computer forensics : incident response essentials
Kruse, Warren G.
Boston, MA : Addison-Wesley : Lucent Technologies, 2002.
2002
LOCATION
CALL #
LOAN PER.
STATUS
Bay 2
005.8
NORMAL LOAN
CHECK SHELF
12
Request
Computer network security and cyber ethics
Kizza, Joseph Migga.
Jefferson, N.C. : McFarland : c2006.
c2006
LOCATION
CALL #
LOAN PER.
STATUS
Bay 2
005.8
NORMAL LOAN
CHECK SHELF
13
Request
The COMPUTER PRIVACY Handbook:A practical guide to E-Mail encryption,Data Protection,and PGP Privacy
Bacard, André.
Berkeley,CA : Beachpit Presss, 1995.
1995
LOCATION
CALL #
LOAN PER.
STATUS
Bay 2
005.8
NORMAL LOAN
CHECK SHELF
14
Request
Computer security basics
Russell, Deborah.
Sebastopol, CA : O'Reilly & Associates, c1991 (1992 printing with minor corrections)
c1991
LOCATION
CALL #
LOAN PER.
STATUS
Bay 2
005.8
NORMAL LOAN
CHECK SHELF
15
Request
Computer security basics
Lehtinen, Rick.
Sebastopol, CA : O'Reilly & Associates, c2006.
Website
More...
c2006
LOCATION
CALL #
LOAN PER.
STATUS
Bay 2
005.8
NORMAL LOAN
DUE 08-11-17
16
Request
Computer security basics
Lehtinen, Rick.
Beijing ; Farnham : O'Reilly, 2006.
Website
2006
17
Request
Computer security basics
Lehtinen, Rick.
Sebastopol, CA : O'Reilly & Associates, c2006.
Website
More...
c2006
18
Request
Computer security : principles and practice
Stallings, William.
Harlow : Pearson Education, c2012.
c2012
LOCATION
CALL #
LOAN PER.
STATUS
Bay 2
005.8
NORMAL LOAN
CHECK SHELF
19
Request
The computer virus crisis
Fites, Philip E.
New York : Van Nostrand Reinhold, c1989.
c1989
LOCATION
CALL #
LOAN PER.
STATUS
Bay 2
005.8
NORMAL LOAN
CHECK SHELF
20
Request
Computer viruses : a high-tech disease
Burger, Ralf.
Grand Rapids, MI : Abacus, c1988 (1989 printing)
c1988
LOCATION
CALL #
LOAN PER.
STATUS
Bay 2
005.8
NORMAL LOAN
CHECK SHELF
21
Request
Computers at risk : safe computing in the information age
Washington, D.C. : National Academy Press, 1991.
1991
LOCATION
CALL #
LOAN PER.
STATUS
Bay 2
005.8
NORMAL LOAN
CHECK SHELF
22
Request
Counter hack reloaded : a step-by-step guide to computer attacks and effective defenses
Skoudis, Ed.
Upper Saddle River, NJ : Prentice Hall Professional Technical Reference, c2006.
Website
c2006
LOCATION
CALL #
LOAN PER.
STATUS
Bay 2
005.8
NORMAL LOAN
CHECK SHELF
23
Request
Cryptography and network security : principles and practice
Stallings, William.
Upper Saddle River, N.J. : Prentice Hall, c1999.
c1999
LOCATION
CALL #
LOAN PER.
STATUS
Bay 2
005.8
NORMAL LOAN
CHECK SHELF
Bay 2
005.8
NORMAL LOAN
CHECK SHELF
Bay 2
005.8
c.2
NORMAL LOAN
CHECK SHELF
There are additional copies/volumes of this item
24
Request
Cryptography and network security : principles and practice
Stallings, William.
Upper Saddle River, N.J. : Prentice Hall, c2003.
c2003
LOCATION
CALL #
LOAN PER.
STATUS
Bay 2
005.8
NORMAL LOAN
CHECK SHELF
25
Request
Cryptography and secure communications
Rhee, Man Young.
Singapore ; New York : McGraw-Hill, c1994.
c1994
LOCATION
CALL #
LOAN PER.
STATUS
Bay 2
005.8
NORMAL LOAN
CHECK SHELF
26
Request
The database hacker's handbook : defending database servers
Indianapolis, IN : Wiley Pub., c2005.
Website
More...
c2005
LOCATION
CALL #
LOAN PER.
STATUS
Bay 2
005.8
NORMAL LOAN
CHECK SHELF
Bay 2
005.8
NORMAL LOAN
CHECK SHELF
27
Request
Database security
Basta, Alfred.
Clifton Park, NY : Course Technology, Cengage Learning, 2012.
2012
LOCATION
CALL #
LOAN PER.
STATUS
Bay 2
005.8
NORMAL LOAN
CHECK SHELF
Bay 2
005.8
NORMAL LOAN
CHECK SHELF
Bay 2
005.8
REFERENCE ONLY
LIB USE ONLY
28
Request
Designing network security
Kaeo, Merike.
Indianapolis, IN : Cisco Press : Macmillan Technical Pub., c1999.
c1999
LOCATION
CALL #
LOAN PER.
STATUS
Bay 2
005.8
REFERENCE ONLY
CHECK SHELF
Bay 2
005.8
NORMAL LOAN
CHECK SHELF
29
Request
Digital watermarking
Cox, I. J. (Ingemar J.)
San Francisco, Calif. : Morgan Kaufmann, 2002.
2002
LOCATION
CALL #
LOAN PER.
STATUS
Bay 2
005.8
NORMAL LOAN
CHECK SHELF
30
Request
FIREWALLS and INTERNET SECURITY:Repelling the Wily Hacker.
Cheswick, William R.
Reading,MA : ADDISON WESLEY, 1994.
1994
LOCATION
CALL #
LOAN PER.
STATUS
Bay 2
005.8
NORMAL LOAN
CHECK SHELF
Bay 2
005.8
NORMAL LOAN
CHECK SHELF
Bay 2
005.8
NORMAL LOAN
CHECK SHELF
There are additional copies/volumes of this item
31
Request
Foundations of security
Daswani, Neil
United States : Apress : 2007
2007
LOCATION
CALL #
LOAN PER.
STATUS
Bay 2
005.8
NORMAL LOAN
CHECK SHELF
Bay 2
005.8
NORMAL LOAN
CHECK SHELF
32
Request
Fundamentals of computer security
Pieprzyk, Josef, 1949-
Berlin ; London : Springer, 2003.
2003
LOCATION
CALL #
LOAN PER.
STATUS
Bay 2
005.8
NORMAL LOAN
CHECK SHELF
33
Request
Google hacks: tips & tools for smarter searching.
Calishain, Tara & Dornfest, Rael
Sebastopol; CA : O'Reilly : 2003, 2004
2004
LOCATION
CALL #
LOAN PER.
STATUS
Bay 2
005.8
NORMAL LOAN
CHECK SHELF
Bay 2
005.8
NORMAL LOAN
CHECK SHELF
34
Request
Guide to computer forensics and investigations
Philips, Amelia.
Boston, MA : Cengage Learning, 2010.
2010
LOCATION
CALL #
LOAN PER.
STATUS
Bay 2
005.8
NORMAL LOAN
CHECK SHELF
CDs at Issue Desk
005.8
NORMAL LOAN
CHECK SHELF
Bay 2
005.8
NORMAL LOAN
CHECK SHELF
There are additional copies/volumes of this item
35
Request
Hacking exposed 6 : network security secrets & solutions
McClure, Stuart.
New York : McGraw-Hill, c2009.
c2009
LOCATION
CALL #
LOAN PER.
STATUS
Bay 2
005.8
NORMAL LOAN
CHECK SHELF
Bay 2
005.8
NORMAL LOAN
CHECK SHELF
Bay 2
005.8
REFERENCE ONLY
LIB USE ONLY
36
Request
Incident response and computer forensics
Prosise, Chris.
New York, New York : McGraw-Hill/Osborne, c2003.
Website
More...
c2003
LOCATION
CALL #
LOAN PER.
STATUS
Bay 2
005.8
NORMAL LOAN
CHECK SHELF
37
Request
Information hiding : steganography and watermarking : attacks and countermeasures
Johnson, Neil F.
Boston : Kluwer Academic, c2001.
c2001
LOCATION
CALL #
LOAN PER.
STATUS
Bay 2
005.8
NORMAL LOAN
CHECK SHELF
38
Request
Information security and privacy / Third Australasian conference, ACISP' 98, Brisbane, Australia, Ju
Boyd, Colin ; Dawson, Ed
Berlin : Heidelberg : Springer : 1998
1998
LOCATION
CALL #
LOAN PER.
STATUS
Bay 2
005.8
REFERENCE ONLY
CHECK SHELF
Bay 2
005.8
NORMAL LOAN
CHECK SHELF
39
Request
The information systems security officer's guide : establishing and managing an information protecti
Kovacich, Gerald L.
Amsterdam ; Boston : Butterworth-Heinemann, c2003.
Website
More...
c2003
LOCATION
CALL #
LOAN PER.
STATUS
Bay 2
005.8
NORMAL LOAN
CHECK SHELF
40
Request
Internet and TCP/IP network security : securing protocols and applications
Pabrai, Uday O.
New York : McGraw-Hill, c1996.
c1996
LOCATION
CALL #
LOAN PER.
STATUS
Bay 2
005.8
NORMAL LOAN
CHECK SHELF
41
Request
Internet Security & Acceleration Server 2004 EVALUATION SOFTWARE 120-DAY LIMIT ON USE CD/ROM (1 of 2
Reimer, Stanley Lewis
42
Request
Internet Security & Acceleration Server 2004 RESOURCES AND INFORMATION CD/ROM (1 of 2 Cd's)
Reimer, Stanley Lewis
43
Request
Internet security for business
New York : Wiley, c1996.
c1996
LOCATION
CALL #
LOAN PER.
STATUS
Bay 2
005.8
NORMAL LOAN
CHECK SHELF
Bay 2
005.8
REFERENCE ONLY
CHECK SHELF
44
Request
Internet security : hacking, counterhacking, and society
Sudbury, Mass. : Jones and Bartlett Publishers : 2007.
2007
LOCATION
CALL #
LOAN PER.
STATUS
Bay 2
005.8
NORMAL LOAN
CHECK SHELF
Bay 2
005.8
NORMAL LOAN
CHECK SHELF
45
Request
Introduction to cryptolology and PC security
Beckett, Brian.
New York : McGraw-Hill Pub., c1997.
c1997
LOCATION
CALL #
LOAN PER.
STATUS
Bay 2
005.8
NORMAL LOAN
MISSING
46
Request
Intrusion detection
Bace, Rebecca Gurley.
Indianapolis, IN : Macmillan Technical Publishing, c2000.
c2000
LOCATION
CALL #
LOAN PER.
STATUS
Bay 2
005.8
NORMAL LOAN
CHECK SHELF
47
Request
J2EE security for servlets, EJBs and Web services : applying theory and standards to practice
Kumar, Pankaj.
Upper Saddle River, N.J. : Prentice Hall PTR, c2004.
c2004
LOCATION
CALL #
LOAN PER.
STATUS
Bay 2
005.8
NORMAL LOAN
CHECK SHELF
48
Request
Java cryptography
Knudsen, Jonathan.
Sebastopol, Calif : O'Reilly, c1998.
c1998
LOCATION
CALL #
LOAN PER.
STATUS
Bay 2
005.8
NORMAL LOAN
CHECK SHELF
Bay 2
005.8
NORMAL LOAN
CHECK SHELF
Bay 2
005.8
NORMAL LOAN
CHECK SHELF
49
Request
Java security
McGraw, Gary, 1966-
New York : Wiley, c1997.
c1997
LOCATION
CALL #
LOAN PER.
STATUS
Bay 2
005.8
NORMAL LOAN
CHECK SHELF
50
Request
Malware analyst's cookbook and dvd : tools and techniques for fighting malicious code
Ligh, Michael W.
Indianapolis, IND. : Wiley Publishing Inc : 2011.
2011
LOCATION
CALL #
LOAN PER.
STATUS
Bay 2
005.8
REFERENCE ONLY
LIB USE ONLY
CDs at Issue Desk
005.8
REFERENCE ONLY
LIB USE ONLY
More Resources: Click on the buttons below for more information on the items, for example table of contents and front cover images
Athlone IT
Blanchardstown IT
Carlow IT
Cork IT
IADT Dun Laoghaire
Dundalk IT
GMIT
Sligo IT
Limerick IT
Tallaght IT
Tipperary IT
Tralee IT
Waterford IT
Result Page
1
2
Next
Home
|
Help