Asia Pacific University Library catalogue


Refine your search

Your search returned 402 results.

|
281.
Ethical hacking and penetration testing guide / Rafay Baloch.

by Baloch, Rafay.

Edition: 1st ed.Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Broken Sound Parkway, N.W. : CRC Press, c2015Online access: Cover image Availability: Items available for loan: APU LibraryCall number: QA76.9.A25 B35 2015 c.1 (4).

282.
CISSP : certified information systems security professional study guide / James M Stewart, Mike Chapple, Darril Gibson.

by Stewart, James M.

Edition: 7th edition.Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Indianapolis, Indiana : Sybex, 2015Availability: Items available for loan: APU LibraryCall number: QA76.3 .S57 2008 c.1 (2).

283.
The basics of hacking and penetration testing : ethical hacking and penetration testing made easy / Dr. Patrick Engebretson, David Kennedy, Technical Editor.

by Engebretson, Pat (Patrick Henry), 1974-.

Edition: 2nd ed.Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Waltham, USA ; Syngress, c2013Availability: Items available for loan: APU LibraryCall number: QA76.9.A25 E54 2013 c.1 (2). Checked out (1).

284.
CISSP study guide / Eric Conrad, Seth Misenar and Joshua Feldman.

by Conrad, Eric, 1967- | Misenar, Seth | Feldman, Joshua.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Waltham, M.A. ; Syngress, c2016Availability: Items available for loan: APU LibraryCall number: TK5105.59 .C66 2016 c.1 (2).

285.
Blue team handbook : incident response edition : a condensed field guide for the cyber security incident responder / Don Murdoch

by Murdoch, Don.

Edition: 1st ed. :Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: United State : CreateSpace Independent Publishing, c2014Availability: Items available for loan: APU LibraryCall number: TK5105.59 .M87 2014 c.1 (3).

286.
Computer and information security handbook / John R. Vacca.

by Vacca, John R.

Edition: 2nd edition.Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Amsterdam : Morgan Kaufman, c2013Availability: Items available for loan: APU LibraryCall number: QA76.9.A25 V33 2013 c.1 (1).

287.
Securing SQL server : protecting your database from attackers / Denny Cherry.

by Cherry, D.

Edition: 3rd ed.Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Amsterdam : Syngress, c2015Online access: Publisher description Availability: Items available for loan: APU LibraryCall number: QA76.73.S67 C44 2015 c.1 (2).

288.
Security in computing / Charles P. Pfleeger.

by Pfleeger, Charles P [author] | Pfleeger, Shari Lawrence [author.] | Margulies, Jonathan [author].

Edition: 5th ed. /Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Upper Saddle River, N.J. : Pearson, c2015Availability: Items available for loan: APU LibraryCall number: QA76.9.A25 P45 2015 c.1 (1). Items available for reference: APU Library ProcessingCall number: QA76.9.A25 P45 2015 c.2 (1).

289.
Principles of information security / Michael E. Whitman, Herbert J. Mattford.

by Whitman, Michael E, 1964- | Mattord, Herbert J.

Edition: 5th ed.Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Boston, MA : Cengage Learning, c2016Availability: Items available for loan: APU LibraryCall number: TK5105.59 .W54 2016 c.1 (1).

290.
Cryptography and network security : principles and practice / William Stallings.

by Stallings, William | Stallings, William. Network and internetwork security.

Edition: 2nd ed.Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Upper Saddle River, N.J. : Prentice Hall, c1999Availability: Items available for loan: APU LibraryCall number: TK5105.59 .S73 1999 c.1 (1).

291.
A practical guide to computer forensics investigations / Darren R. Hayes.

by Hayes, D. R.

Edition: 1st ed.Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Indiana : Pearson, c2015Availability: Items available for loan: APU LibraryCall number: HV8079.C65 H39 2015 c.2 (2). Lost (1).

292.
Hacker techniques, tools, and incident handling / Sean-Philip Oriyano.

by Oriyano, Sean-Philip.

Series: Edition: 2nd ed.Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Burlinton, MA : Jones & Bartlett Learning, c2014Availability: Items available for loan: APU LibraryCall number: TK5105.59 .O75 2014 c.1 (1). Items available for reference: APU Library ProcessingCall number: TK5105.59 .O75 2014 c.2 (1).

293.
Computer and information security handbook / edited by John R. Vacca.

by Vacca, John R.

Edition: 3rd ed. ; ©2017Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Cambridge, MA : Morgan Kaufmann, 2017Availability: Items available for loan: APU LibraryCall number: QA76.9.A25 C66 2017 c.1 (1).

294.
Cybersecurity Essentials / by Charles J. Brooks,‎ Philip Craig,‎ Donald Short.

by Brooks, Charles J | Craig, Philip | Short, Donald.

Edition: 1st ed.Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: United States : Sybex, c2018Availability: Items available for loan: APU LibraryCall number: TK5105.59 .B76 2018 c.1 (2).
  (1 votes)
295.
Cybersecurity : geopolitics, law and policy / Amos N. Guiora.

by Guiora, Amos N.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Boca Raton, FL : Routledge, c2017Availability: Items available for loan: APU LibraryCall number: TK5105.59 .G85 2017 c.1 (2).

296.
CompTIA Security+ get certified get ahead : SYO-501 study guide / Darril Gibson.

by Gibson, Darril.

Edition: 4th ed.Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Virginia Beach, VA : YCDA, LLC, [2017]Availability: Items available for loan: APU LibraryCall number: QA76.3 .G53 2017 c.1 (1). Lost (1).

297.
Computer security : principles and practice / William Stallings, Lawrie Brown, UNSW Canberra at the Australian Defence Force Academy.

by Stallings, William | Brown, Lawrie.

Edition: 4th ed. ; Global ed.Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: New York : Pearson Education, Inc., 2018Availability: Items available for reference: APU Library ProcessingCall number: QA76.9.A25 S75 2018 c.1 (2). :

298.
Hacking the hacker / Roger A Grimes.

by Grimes, Roger A.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Indianapolis : John Wiley & Sons, 2017Availability: Items available for loan: APU LibraryCall number: QA76.9.A25 G75 2017 c.2 (1). Lost (1).
  (1 votes)
299.
Adopting biometric technology : challenges and solutions / Ravindra Das.

by Das, Ravindra.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Boca Raton : CRC Press, Taylor & Francis Group, [2016]Availability: Items available for loan: APU LibraryCall number: TK7882.B56 D37 2016 c.1 (2).

300.
Digital forensics : an academic introduction / edited by Andre Arnes.

by Årnes, André.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Hoboken, NJ : John Wiley & Sons Inc., 2018Availability: Items available for loan: APU LibraryCall number: HV8079.C65 D53 2018 c.1 (2).