Asia Pacific University Library catalogue


Refine your search

Your search returned 126 results.

|
101.
Endpoint security / Mark Kadrich.

by Kadrich, Mark S.

Series: Endpoint securityEdition: 1st ed.Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Indianapolis : Addison Wesley Professional, c2007Availability: Items available for loan: APU LibraryCall number: QA76.9.A25 K33 2007 c.1 (1).

102.
Network security : a beginner's guide / Eric Maiwald.

by Maiwald, Eric.

Series: Essential skills made easyEdition: 2nd ed.Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: New York : McGraw-Hill / Osborne, c2003Online access: Publisher description | Contributor biographical information | Table of contents Availability: Items available for loan: APU LibraryCall number: TK5105.59 .M35 2003 c.1 (1).

103.
Windows Server 2008 networking and network access protection (NAP) / by Joseph Davies and Tony Northrup with the Microsoft Networking Team.

by Davies, Joseph, 1962- | Northrup, Tony, 1974-.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Redmond, WA : Microsoft Press, c2008Online access: Contributor biographical information | Publisher description | Table of contents only Availability: Items available for loan: APU LibraryCall number: TK5105.59 .D38 2008 c.1 (1).

104.
Wireshark 101 : essential skills for network analysis / Laura Chappell ; foreword by Gerald Combs.

by Chappell, Laura | Combs, Gerald.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: San Jose, CA : Protocol Analysis Institute, c2013Availability: Items available for loan: APU LibraryCall number: TK5105.5956 .C43 2013 c.1 (2).

105.
Information system audit and assurance / D.P. Dube, V. P. Gulati.

by Dube, D. P | Gulati, V. P. (Ved Prakash).

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: New Delhi : Tata McGraw-Hill Pub. Co., c2005Availability: Items available for loan: APU LibraryCall number: T58.64 .D83 2005 c.1 (2).

106.
Communications and networking an introduction / John Cowley.

by Cowley, John, 1947 August 17- | Ohio Library and Information Network.

Series: Undergraduate topics in computer scienceEdition: 2nd ed.Source: SpringerLinkSource: OhioLINK electronic book center (Online)Material type: Text Text; Format: available online remote; Literary form: Not fiction Publication details: London ; New York : Springer, c2012Availability: Items available for loan: APU LibraryCall number: TK5105.5 .C69 2012 c.1 (2). Items available for reference: APU Library ProcessingCall number: TK5105.5 .C69 2012 c.3 (1).

107.
Security policies and procedures : principles and practices / Sari Stern Greene.

by Greene, Sari Stern, 1957-.

Series: Security seriesMaterial type: Text Text; Format: print ; Literary form: Not fiction Publication details: Upper Saddle River, N.J. : Pearson Prentice Hall, c2006Online access: Table of contents Availability: Items available for loan: APU LibraryCall number: HV8290 .G74 2006 c.1 (2).

108.
Unauthorised access : physical penetration testing for IT security teams / Wil Allsopp.

by Allsopp, Wil.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Chichester, West Sussex, U.K. : Wiley, c2009Other title: Unauthorized access | Physical penetration testing for IT security teams.Availability: Items available for loan: APU LibraryCall number: QA76.9.A25 A45 2009 c.1 (2).

109.
Defending the digital frontier : practical security for management / Jan Babiak, John Butters, Mark W. Doll.

by Babiak, Jan | Butters, John | Doll, Mark W | Doll, Mark W. Defending the digital frontier.

Edition: 2nd ed. Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Hoboken, NJ : Wiley, c2005Online access: Table of contents only | Contributor biographical information | Publisher description Availability: Items available for loan: APU LibraryCall number: TK5105.59 .B33 2005 c.1 (2). Items available for reference: APU Library ProcessingCall number: TK5105.59 .B33 2005 c.3 (1).

110.
IT audit, control, and security / Robert Moeller.

by Moeller, Robert R.

Material type: Text Text; Format: electronic available online remote; Literary form: Not fiction Publication details: Hoboken, N.J. : Wiley, c2010Availability: Items available for loan: APU LibraryCall number: QA76.9.A93 M64 2010 c.1 (2).

111.
Information security for managers / Michael Workman, Daniel C. Phelps, John N. Gathegi.

by Workman, Michael D, 1957- | Phelps, Daniel C | Gathegi, John Ng'ang'a.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Burlington, MA : Jones & Bartlett Learning, c2013Availability: Items available for loan: APU LibraryCall number: HF5548.37 .W67 2013 c.1 (1).

112.
Management of information security / Michael E. Whitman, Herbert J. Mattord.

by Whitman, Michael E, 1964- | Mattord, Herbert J.

Edition: 2nd ed.Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Boston, Mass. : Thomson Course Technology, c2008Availability: Items available for reference: APU Library ProcessingCall number: TK5105.59 .W45 2008 c.1 (1). :

113.
Introduction to cryptography and network security / Behrouz A. Forouzan.

by Forouzan, Behrouz A.

Series: McGraw-Hill Forouzan networking seriesMaterial type: Text Text; Format: print ; Literary form: Not fiction Publication details: Boston : McGraw-Hill Higher Education, c2008Online access: Publisher description | Table of contents only Availability: Items available for loan: APU LibraryCall number: TK5105.59 .F67 2008 c.1 (1), APIIT LibraryCall number: CD-38-98 (1).

114.
Windows registry forensics : advanced digital forensic analysis of the Windows registry / Harlan Carvey.

by Carvey, Harlan A.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Burlington, MA : Syngress, 2011Availability: Items available for loan: APU LibraryCall number: HV8079.C65 C37 2011 c.1 (1), APIIT LibraryCall number: CD-38-11 (1).

115.
Computer forensics : a pocket guide / Nathan Clarke.

by Clarke, Nathan.

Source: Safari books online.Material type: Text Text; Format: available online remote; Literary form: Not fiction Publication details: Ely : IT Governance Pub., 2010Availability: Items available for loan: APU LibraryCall number: QA76.9.A25 C53 2010 c.1 (1).

116.
Network security essentials : applications and standards / William Stallings.

by Stallings, William.

Edition: 2nd ed.Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Upper Saddle River, NJ : Pearson Education, c2003Availability: Items available for reference: APU Library ProcessingCall number: TK5105.59 .S73 2003 c.1 (1). :

117.
Business data networks and security / Raymond R. Panko, Julia L. Panko.

by Panko, Raymond R | Panko, Julia L | Panko, R. R. Business data networks and telecommunications.

Edition: 10th global ed.Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Essex : Pearson Education, c2015Availability: Items available for loan: APU LibraryCall number: HD30.37 .P36 2015 c.1 (2).

118.
Cryptography and network security : principles and practice / William Stallings.

by Stallings, William.

Edition: 6th ed.Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Boston : Prentice Hall, c2014Availability: Items available for loan: APU LibraryCall number: TK5105.59 .S73 2014 c.1 (1). Items available for reference: APU Library ProcessingCall number: TK5105.59 .S73 2014 c.2 (1).

119.
Cram 101 textbook outlines to accompany : Counter hack reloaded : step-by-step guide to computer attacks and effective defenses / Edward Skoudis.

by Skoudis, Ed.

Series: Cram101 textbook outlinesEdition: 2nd ed.Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Upper Saddle River, N.J. ; London : Prentice Hall, 2011 2011Other title: Outlines & highlights for Counter hack reloaded : step-by-step guide to computer attacks and effective defenses by Edward Skoudis, Cram101 textbook reviews..Availability: Items available for loan: APU LibraryCall number: TK5105.59 .S57 2006 c.1 (1).

120.
Computer and information security handbook / John R. Vacca.

by Vacca, John R.

Edition: 2nd edition.Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Amsterdam : Morgan Kaufman, c2013Availability: Items available for loan: APU LibraryCall number: QA76.9.A25 V33 2013 c.1 (1).