Asia Pacific University Library catalogue


Refine your search

Your search returned 238 results.

|
21.
Hacking exposed Web 2.0 : Web 2.0 security secrets and solutions / Rich Cannings, Himanshu Dwivedi, Zane Lackey.

by Cannings, Rich | Dwivedi, Himanshu | Lackey, Zane.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: New York : McGraw-Hill, c2008Other title: Web 2.0 security secrets and solutions.Online access: Contributor biographical information | Publisher description | Table of contents only Availability: Items available for loan: APU LibraryCall number: TK5105.59 .C36 2008 c.1 (2).

22.
Cryptography and network security : principles and practice / William Stallings.

by Stallings, William.

Edition: 4th Pearson int. ed.Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Upper Saddle River, N.J. ; London : Prentice Hall, c2006Availability: Items available for loan: APU LibraryCall number: TK5105.59 .S73 2006 c.2 (2).

23.
Network security essentials : applications and standards / William Stallings.

by Stallings, William.

Edition: 3rd ed.Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Upper Saddle River, NJ : Pearson/Prentice Hall, c2007Availability: Items available for loan: APU LibraryCall number: TK5105.59 .S73 2007 c.1 (4).

24.
Software security engineering : a guide for project managers / Julia H. Allen ... [et al.].

by Allen, Julia H.

Series: The SEI series in software engineering | The Addison-Wesley software security seriesMaterial type: Text Text; Format: print ; Literary form: Not fiction Publication details: Upper Saddle River, NJ : Addison-Wesley, c2008Online access: Table of contents only Availability: Items available for loan: APU LibraryCall number: QA76.9.A25 S64 2008 c.1 (1).

25.
Fuzzing : brute force vulnerabilty discovery / Michael Sutton, Adam Greene, Pedram Amini.

by Sutton, Michael, 1973- | Greene, Adam, 1983- | Amini, Pedram.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Upper Saddle River, NJ : Addison-Wesley, c2007Online access: Table of contents only Availability: Items available for loan: APU LibraryCall number: QA76.9.A25 S88 2007 c.1 (1).

26.
Hacking exposed : network security secrets & solutions / Stuart McClure, Joel Scambray, George Kurtz.

by McClure, Stuart | Scambray, Joel | Kurtz, George.

Edition: 5th ed.Material type: Text Text; Format: print ; Literary form: Not fiction ; Audience: Specialized; Publication details: Emeryville, Calif. : McGraw-Hill/Osborne, c2005Other title: Network security secrets & solutions | Network security secrets and solutions.Online access: Contributor biographical information | Publisher description Availability: Items available for loan: APU LibraryCall number: QA76.9.A25 M33 2005 c.1 (1).

27.
Hacking exposed : network security secrets & solutions / Stuart McClure, Joel Scambray, George Kurtz.

by McClure, Stuart | Scambray, Joel | Kurtz, George.

Edition: 4th ed.Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: New York : McGraw-Hill/Osborne, c2003Online access: Publisher description | Contributor biographical information | Table of contents Availability: Items available for loan: APIIT LibraryCall number: CD-28-56 (1). Items available for reference: APIIT Library To be processedCall number: QA76.9.A25 M33 2003 c.1 (1).

28.
Security for ubiquitous computing / Frank Stajano.

by Stajano, Frank.

Series: Wiley series in communications networking & distributed systemsMaterial type: Text Text; Format: print ; Literary form: Not fiction Publication details: West Sussex, England ; J. Wiley & Sons, New York : c2002Online access: Publisher description | Table of contents Availability: Items available for loan: APU LibraryCall number: TK5105.59 .S73 2002 c.1 (3).

29.
Trusted computing / edited by Chris Mitchell.

by Mitchell, Chris | Institution of Electrical Engineers.

Series: IEE professional applications of computing series ; 6Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: London : Institution of Electrical Engineers, c2005Online access: Table of contents only | Publisher description Availability: Items available for loan: APU LibraryCall number: QA76.9.A25 T78 2005 c.1 (1).

30.
Trusted computing platforms : TCPA technology in context / Siani Pearson, editor ; Boris Balacheff ... [et al.].

by Pearson, Siani | Balacheff, Boris.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Upper Saddle River, N.J. : Prentice Hall PTR, c2003Availability: No items available : Withdrawn (1).

31.
Practical intrusion analysis : prevention and detection for the twenty-first century / Ryan Trost.

by Trost, Ryan.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Upper Saddle River, NJ : Addison-Wesley, c2010Availability: Items available for loan: APU LibraryCall number: TK5105.59 .T76 2010 c.1 (1).

32.
Firewalls and VPNs : principles and practices / Richard W. Tibbs, Edward B. Oakes.

by Tibbs, Richard W | Oakes, Edward B.

Series: Security series (Upper Saddle River, N.J.)Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Upper Saddle River, N.J : Pearson/Prentice Hall, c2006Online access: Table of contents Availability: Items available for loan: APU LibraryCall number: QA76.9.A25 T53 2006 c.1 (1).

33.
PCI compliance : understand and implement effective PCI data security standard compliance / Anton A. Chuvakin, Branden R. Williams ; technical editor, Ward Spangenberg.

by Chuvakin, Anton A | Williams, Branden R.

Edition: 2nd ed.Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Amsterdam ; Boston : Elsevier, c 2010Availability: Items available for loan: APU LibraryCall number: QA76.9.A25 C48 2010 c.1 (2).

34.
Apache security / Ivan Ristic.

by Ristic, Ivan.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Beijing ; Sebastopol, CA : O'Reilly Media, c2005Online access: Publisher description | Contributor biographical information | Table of contents only Availability: Items available for loan: APU LibraryCall number: TK5105.8885.A63 R57 2005 c.1 (2).

35.
LAN switch security : what hackers know about your switches / Eric Vyncke and Christopher Paggen.

by Vyncke, Eric | Paggen, Christopher.

Series: Cisco Press networking technology seriesMaterial type: Text Text; Format: print ; Literary form: Not fiction Publication details: Indianapolis, IN : Cisco Press, c2008Other title: What hackers know about your switches.Online access: Table of contents only Availability: Items available for loan: APU LibraryCall number: TK5105.7 .V96 2008 c.1 (1).

36.
CCNA security official exam certification guide / Michael Watkins, Kevin Wallace.

by Watkins, Michael. CCNA | Wallace, Kevin. CCNP.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Indianapolis, IN : Cisco Press, c2008Online access: Table of contents only Availability: Items available for loan: APU LibraryCall number: TK5105.59 .W38 2008 c.2 (2), APIIT LibraryCall number: CD-35-61 (2).

37.
Windows lockdown! : your XP and Vista guide against hacks, attacks, and other Internet mayhem / Andy Walker.

by Walker, Andy. (Andy G.), 1967-.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Indianapolis, Ind. : Que, c2009Online access: Table of contents only Availability: Items available for loan: APU LibraryCall number: QA76.9.A25 W35 2009 c.2 (2).

38.
Biometrics for network security / Paul Reid.

by Reid, Paul.

Series: Prentice Hall series in computer networking and distributed systemsMaterial type: Text Text; Format: print ; Literary form: Not fiction Publication details: Upper Saddle River, NJ : Prentice Hall PTR, c 2004Other title: Network security.Availability: Items available for loan: APU LibraryCall number: TK7882.B56 R45 2004 c.1 (3).

39.
The process of network security : designing and managing a safe network / Thomas A. Wadlow.

by Wadlow, Thomas A.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Reading, Mass. : Addison Wesley, c2000Availability: Items available for loan: APU LibraryCall number: TK5105.59 .W33 2000 c.2 (2).

40.
Professional penetration testing : creating and operating a formal hacking lab / Thomas Wilhelm ; technical editor, Jan Kanclirz Jr.

by Wilhelm, Thomas.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Burlington, Mass. : Syngress Pub., c2010Availability: Items available for loan: APU LibraryCall number: TK5105.59 .W55 2010 c.1 (1), APIIT LibraryCall number: CD-37-79 (2). Damaged (1).