Asia Pacific University Library catalogue


Refine your search

Your search returned 126 results.

|
41.
Network and application security fundamentals and practices / Debashis Ganguly ; edited by Shibamouli Lahiri.

by Ganguly, Debashis | Lahiri, Shibamouli.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Enfield, NH : Boca Raton, FL : Science Publishers ; Distributed by CRC Press, c2012Availability: Items available for loan: APU LibraryCall number: TK5105.59 .G36 2012 c.1 (2).

42.
Cryptography and network security : principles and practice / William Stallings.

by Stallings, William.

Edition: 5th ed.Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Boston : Prentice Hall, c2011Availability: Items available for reference: APU Library ProcessingCall number: TK5105.59 .S73 2011 c.1 (1). :

43.
Cryptography and network security : principles and practice / William Stallings.

by Stallings, William.

Edition: 5th ed.Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Boston, [Mass.] ; London : Prentice Hall, c2011Availability: Items available for loan: APU LibraryCall number: TK5105.59 .S73 2011 c.2 (2). Items available for reference: APU Library ProcessingCall number: TK5105.59 .S73 2011 c.4 (2).

44.
Cryptography and network security : principles and practice / William Stallings.

by Stallings, William.

Edition: 3rd ed.Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Upper Saddle River, N. J. : Prentice-Hall, c2003Availability: Items available for reference: APU Library ProcessingCall number: TK5105.59 .S73 2003 c.1 (1). :

45.
Network intrusion detection and prevention : concepts and techniques / Ali A. Ghorbani, Wei Lu, Mahbod Tavallaee.

by Ghorbani, Ali A, 1954- | Lu, Wei, 1980- | Tavallaee, Mahbod.

Series: Advances in information securityMaterial type: Text Text; Format: print ; Literary form: Not fiction Publication details: New York : Springer, c2010Availability: Items available for loan: APU LibraryCall number: TK5105.59 .G46 2010 c.1 (1).

46.
Cryptography and network security : principles and practice / William Stallings.

by Stallings, William.

Edition: 2nd ed.Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Upper Saddle River, N.J. : Prentice Hall, c1999Availability: Items available for loan: APU LibraryCall number: TK5105.59 .S73 1999 c.1 (1). Items available for reference: APU Library ProcessingCall number: TK5105.59 .S73 1999 c.2 (1).

47.
Disappearing cryptography : information hiding : steganography & watermarking / Peter Wayner.

by Wayner, Peter, 1964-.

Edition: 3rd ed.Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Amsterdam ; Boston : Morgan Kaufmann Publishers, c2009Availability: Items available for loan: APU LibraryCall number: TK5105.59 .W39 2009 c.2 (2). Items available for reference: APU Library ProcessingCall number: TK5105.59 .W39 2009 c.3 (1).

48.
Counter hack reloaded : a step-by-step guide to computer attacks and effective defenses / Ed Skoudis with Tom Liston.

by Skoudis, Ed | Skoudis, Ed. Counter hack | Liston, Tom.

Series: Radia Perlman series in computer networking and securityEdition: 2nd ed.Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Upper Saddle River, NJ : Prentice Hall Professional Technical Reference, c2006Online access: Table of contents Availability: Items available for loan: APU LibraryCall number: TK5105.59 .S57 2006 c.2 (2). Items available for reference: APU Library ProcessingCall number: TK5105.59 .S57 2006 c.3 (2).

49.
Maximum security / Anonymous.

Edition: 4th ed.Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Indianapolis, Ind. : Sams, c2003Availability: Items available for loan: APIIT LibraryCall number: CD-27-26 (3). Withdrawn (3).

50.
Windows forensic analysis toolkit : advanced analysis techniques for Windows 7 / Harlan Carvey ; technical editor, Jennifer Kolde.

by Carvey, Harlan A | Kolde, Jennifer.

Edition: 3rd ed.Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Waltham, MA : Syngress, c2012Availability: Items available for loan: APU LibraryCall number: HV8079.C65 C37 2012 c.1 (2).

51.
Hacking web apps : detecting and preventing web application security problems / Mike Shema ; technical editor, Jorge Blanco Alcover.

by Shema, Mike | Alcover, Jorge Blanco.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Amsterdam ; Boston : Syngress, c2012Availability: Items available for loan: APU LibraryCall number: TK5105.59 .S54 2012 c.1 (1).

52.
Privacy defended : protecting yourself online / Gary Bahadur, William Chan, Chris Weber.

by Bahadur, Gary | Chan, William, M.S | Weber, Christopher R.

Material type: Text Text Publication details: Indianapolis, Ind. ; [Great Britain] : Que, 2002Availability: Items available for loan: APU LibraryCall number: QA76.9.A25 B34 2002 c.1 (1).

53.
PKI : a Wiley tech brief / Thomas Austin and Dennis Huaman.

by Austin, Tom, 1954- | Huaman, Dennis.

Material type: Text Text Publication details: New York ; Chichester : Wiley, c2001Availability: Items available for loan: APU LibraryCall number: TK5105.59 .A93 2001 c.1 (1).

54.
Computer security and penetration testing / Alfred Basta and Wolf Halton.

by Basta, Alfred | Halton, Wolf.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Boston : Thomson, c2008Availability: Items available for loan: APU LibraryCall number: TK5105.59 .B37 2008 c.1 (1).

55.
Microsoft Windows XP networking and security : inside out : also covers Windows 2000 / Ed Bott, Carl Siechert.

by Bott, Ed | Siechert, Carl.

Material type: Text Text; Format: electronic available online remote; Literary form: Not fiction Publication details: Redmond, WA : Microsoft Press, c2006Availability: Items available for loan: APU LibraryCall number: TK5105.59 .B68 2006 c.1 (1), APIIT LibraryCall number: CD-35-52 (1).

56.
Snort 2.0 : intrusion detection / Jay Beale, James C. Foster; Jeffrey Posluns, technical advisor; Brain Caswell, technical editor.

by Beale, Jay | Foster, James C | Posluns, Jeffrey | Caswell, Brian.

Material type: Text Text; Format: print optical disc regular print ; Literary form: Not fiction Publication details: Rockland, Mass. : [Oxford : Syngress ; Elsevier Science,] c2003Availability: Items available for loan: APIIT LibraryCall number: CD-27-56 (1). Lost (1).

57.
Linux server security / Michael D. Bauer.

by Bauer, Michael D.

Edition: 2nd ed.Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Beijing ; Sebastopol, CA : O'Reilly, c2005Online access: Publisher description | Contributor biographical information | Table of contents only Availability: Items available for loan: APU LibraryCall number: TK5105.59 .B38 2005 c.1 (1).

58.
Applied information security : a hands-on approach / David Basin, Patrick Schaller, Michael Schlapfer.

by Basin, David | Schaller, Patrick | Schlapfer, Michael.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: New York : Springer, c2011Availability: Items available for loan: APU LibraryCall number: QA76.9.A25 B37 2011 c.1 (2).

59.
Network security technologies and solutions / Yusuf Bhaiji.

by Bhaiji, Yusuf.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Indianapolis, IN : Cisco Press, c2008Availability: Items available for loan: APU LibraryCall number: TK5105.59 .B43 2008 c.1 (1).

60.
Privacy, identity, and cloud computing / by Harry Katzan, Jr.

by Katzan, Harry.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: New York : iUniverse, Inc., c2010Availability: Items available for loan: APU LibraryCall number: QA76.585 .K38 2010 c.2 (2).