Asia Pacific University Library catalogue


Refine your search

Your search returned 402 results.

|
181.
Security in computing / Charles P. Pfleeger, Shari Lawrence Pfleeger.

by Pfleeger, Charles P, 1948- | Pfleeger, Shari Lawrence.

Edition: 4th ed.Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Upper Saddle River, N.J. : Prentice Hall, c2007Online access: Table of contents only Availability: No items available : Withdrawn (1).

182.
Security in computing (信息安全原理与应用) / Charles P. Pfleeger, Shari Lawrence Pfleeger.

by Pfleeger, Charles P | Pfleeger, Shari Lawrence.

Edition: 4th ed.Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Beijing, China : Publishing House of Electronics Industry, c2007Availability: No items available : Withdrawn (2).

183.
Surreptitious software : obfuscation, watermarking, and tamperproofing for software protection / Christian Collberg, Jasvir Nagra.

by Collberg, Christian | Nagra, Jasvir.

Series: Addison-Wesley software security seriesMaterial type: Text Text; Format: print ; Literary form: Not fiction Publication details: Upper Saddle River, NJ : Addison-Wesley, c2010Availability: Items available for loan: APU LibraryCall number: QA76.9.A25 C65 2010 c.1 (1).

184.
The Stephen Cobb complete book of PC and LAN security / Stephen Cobb.

by Cobb, Stephen, 1952-.

Edition: 1st ed.Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Blue Ridge Summit, PA : Windcrest : TAB, Software Dept. [distributor], c1992Availability: Items available for loan: APU LibraryCall number: TK5105.7 .C63 1990 c.1 (1).

185.
Linux security / Shadab Siddiqui with NIIT.

by Siddiqui, Shadab | NIIT (Corporation).

Series: Linux, SecurityMaterial type: Text Text; Format: print ; Literary form: Not fiction Publication details: Indianapolis, Ind. : Premier Press, c2002Online access: Table of contents Availability: Items available for loan: APU LibraryCall number: QA76.9.A25 S53 2002 c.1 (1).

186.
Gray hat Python : Python programming for hackers and reverse engineers / by Justin Seitz.

by Seitz, Justin.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: San Francisco : No Starch Press, c2009Online access: Contributor biographical information | Publisher description | Table of contents only Availability: Items available for loan: APU LibraryCall number: QA76.9.A25 S45 2009 c.1 (2).

187.
Data privacy and security / David Salomon.

by Salomon, David . (David), 1938-.

Series: Springer professional computingMaterial type: Text Text; Format: print ; Literary form: Not fiction Publication details: New York : Springer, c2003Online access: Table of contents | Publisher description Availability: Items available for loan: APU LibraryCall number: QA76.9.A25 S25 2003 c.1 (1).

188.
Best damn firewall book period / T.W. Shinder ... [et al.].

by Shinder, Thomas W.

Series: Best damn firewall book periodEdition: 2nd ed.Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Burlington, Mass. : Syngress ; c2007Availability: Items available for loan: APU LibraryCall number: TK5105.59 .S55 2007 c.1 (1).

189.
Configuring ISA Server 2000 : building firewalls for Windows 2000 / [Thomas W. Shinder, Debra Littlejohn Shinder, Martin Grasdal, technical editor].

by Shinder, Thomas W | Shinder, Debra Littlejohn | Grasdal, Martin.

Series: Configuring ISA Server 2000Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Rockland : Syngress, c2001Availability: Items available for loan: APU LibraryCall number: QA76.9.C55 S55 2001 c.1 (1), APIIT LibraryCall number: CD-26-40 (1).

190.
The shellcoder's handbook : discovering and exploiting security holes / Chris Anley ... [et al.].

by Anley, Chris | Koziol, Jack. Shellcoder's handbook.

Edition: 2nd ed.Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Indianapolis, IN : Wiley Pub., c2007Online access: Cover | Table of contents | Table of contents | Contributor biographical information | Publisher description Availability: Items available for reference: APU Library ProcessingCall number: QA76.9.A25 S54 2007 c.2 (1). : Lost (1).

191.
The craft of system security / Sean Smith, John Marchesini.

by Smith, Sean W, 1964- | Marchesini, John.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Upper Saddle River, NJ : Addison-Wesley, c2008Online access: Table of contents only Availability: Items available for loan: APU LibraryCall number: QA76.9.A25 S65 2008 c.1 (2).

192.
Smart cards, tokens, security and applications / by Keith E. Mayes and Konstantinos Markantonakis.

by Mayes, Keith E | Markantonakis, Konstantinos.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: New York : Springer, c2008Online access: Publisher description | Table of contents only Availability: Items available for loan: APU LibraryCall number: TK7895.S62 S63 2008 c.1 (1).

193.
Network security : an introduction to techniques & standard / Kamaruzzaman Seman, Shaharudin Ismail, Waidah Ismail.

by Kamaruzzaman Seman | Shaharudin Ismail | Waidah Ismail.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Nilai, Negeri Sembilan : Penerbit Universiti Sains Islam Malaysia, 2007Availability: Items available for loan: APU LibraryCall number: TK5105.59 .K36 2007 c.1 (2).

194.
Hacking : the art of exploitation / Jon Erickson.

by Erickson, Jon, 1977-.

Edition: 2nd ed.Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: San Francisco, CA : No Starch Press, c2008Online access: Table of contents Availability: Items available for loan: APU LibraryCall number: QA76.9.A25 E75 2008 c.1 (1), APIIT LibraryCall number: CD-37-67 (2). Lost (1).

195.
Endpoint security / Mark Kadrich.

by Kadrich, Mark S.

Series: Endpoint securityEdition: 1st ed.Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Indianapolis : Addison Wesley Professional, c2007Availability: Items available for loan: APU LibraryCall number: QA76.9.A25 K33 2007 c.1 (1).

196.
Network security : a beginner's guide / Eric Maiwald.

by Maiwald, Eric.

Series: Essential skills made easyEdition: 2nd ed.Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: New York : McGraw-Hill / Osborne, c2003Online access: Publisher description | Contributor biographical information | Table of contents Availability: Items available for loan: APU LibraryCall number: TK5105.59 .M35 2003 c.1 (1).

197.
Internet security and firewalls / V.V. Preetham with NIIT.

by Preetham, V. V | NIIT (Corporation).

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Cincinnati, Ohio : Premier Press, c2002Availability: Items available for loan: APU LibraryCall number: TK5105.59 .P74 2002 c.1 (1).

198.
Hackers' handbook 3.0 / Dr. K.

by Dr. K, 1959-.

Edition: Expanded, rev & updated ed.Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: London : Carlton, 2008Availability: No items available : Checked out (1).

199.
E-security law & strategy / Zaid Hamzah.

by Zaid Hamzah | Malaysia. Akta Jenayah Komputer 1997 | Singapore. Computer Misuse Act.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Kelana Jaya, Selangor, Malaysia : Dayton, Ohio : Malayan Law Journal Sdn. Bhd. ; LexisNexis, c2005Other title: E-security law and strategy.Availability: Items available for loan: APU LibraryCall number: KPG80.C65 H36 2005 c.1 (1).

200.
Secure software design / Theodor Richardson, Charles N. Thies.

by Richardson, Theodor | Thies, Charles N.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Burlington, MA : Jones & Bartlett Learning, c2013Availability: Items available for loan: APU LibraryCall number: QA76.76.D47 R53 2013 c.1 (2).