Asia Pacific University Library catalogue


Refine your search

Your search returned 126 results.

|
61.
Hackproofing your wireless network / Christian Barnes ... [et al.].

by Barnes, Christian.

Material type: Text Text Publication details: Rockland, Mass. : London : Syngress Media ; International Thomson, c2002Availability: Items available for loan: APU LibraryCall number: QA76.9.C55 H33 2002 c.1 (1).

62.
Developer's guide to Web application security / Michael Cross.

by Cross, Michael.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Rockland, Mass. : Syngress, c2007Availability: Items available for loan: APU LibraryCall number: TK5105.59 .C76 2007 c.1 (1).

63.
Protect yourself online / Matthew Danda.

by Danda, Matthew, 1971-.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Redmond, Wash. : Microsoft Press, c2001Availability: Items available for loan: APU LibraryCall number: TK5105.59 .D36 2001 c.1 (1).

64.
Network security architectures / Sean Convery.

by Convery, Sean.

Series: Cisco Press networking technology seriesMaterial type: Text Text; Format: print ; Literary form: Not fiction Publication details: Indianapolis, IN : Cisco Press, c2004Availability: Items available for loan: APU LibraryCall number: TK5105.59 .C66 2004 c.1 (1).

65.
Computer and information security handbook / edited by John R. Vacca.

by Vacca, John R.

Series: The Morgan Kaufmann series in computer securityMaterial type: Text Text; Format: print ; Literary form: Not fiction Publication details: Amsterdam ; Boston : Burlington, MA : Elsevier ; Morgan Kaufmann, c2009Availability: Items available for loan: APU LibraryCall number: QA76.9.A25 C66 2009 c.1 (1).

66.
Network defense and countermeasures : principles and practices / Chuck Easttom.

by Easttom, Chuck.

Series: Security series (Upper Saddle River, N.J.)Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Upper Saddle River, N.J. : Pearson Prentice Hall, c2005Online access: Table of contents Availability: Items available for loan: APU LibraryCall number: TK5105.59 .E27 2005 c.2 (2).

67.
IPSec : securing VPNs / Carlton R. Davis.

by Davis, Carlton R.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: New York : Osborne/McGraw-Hill, c2001Online access: Publisher description | Table of contents | Contributor biographical information Availability: Items available for loan: APU LibraryCall number: TK5105.567 .D38 2001 c.1 (1).

68.
The ethical hacking guide to corporate security / Ankit Fadia.

by Fadia, Ankit, 1985-.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: New Delhi : MacMillan, c2004Availability: Items available for loan: APU LibraryCall number: QA76.9.A25 F33 2004 c.1 (1).

69.
24 deadly sins of software security : programming flaws and how to fix them / Michael Howard, David LeBlanc, and John Viega.

by Howard, Michael, 1965- | LeBlanc, David, 1960- | Viega, John.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: New York : McGraw-Hill, c2010Other title: Twenty four deadly sins of software security.Availability: Items available for loan: APU LibraryCall number: QA76.9.A25 H69 2010 c.1 (3).

70.
Cisco ASA, PIX, and FWSM firewall handbook / David Hucaby.

by Hucaby, Dave | Hucaby, Dave. Cisco ASA and PIX firewall handbook | Cisco Systems, Inc.

Edition: 2nd ed.Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Indianapolis, Ind. : Cisco Press, c2008Online access: Table of contents only Availability: Items available for loan: APU LibraryCall number: TK5105.59 .H83 2008 c.1 (1).

71.
Inside network perimeter security : the definitive guide to firewalls, VPNs, routers, and intrusion detection systems / primary authors, Stephen Northcutt ... [et al.] ; contributing authors, Mark Edmead ... [et al.].

by Northcutt, Stephen | Edmead, Mark T.

Edition: 1st ed.Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Indianapolis, Ind. : New Riders, c2003Availability: Items available for loan: APU LibraryCall number: TK5105.59 .I57 2003 c.1 (2).

72.
Hacker proof : the ultimate guide to network security / Kris Jamsa.

by Jamsa, Kris, 1960- | Klander, Lars. Hacker proof.

Edition: 2nd ed.Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Las Vegas, NV : Thomson, c2002Availability: Items available for loan: APU LibraryCall number: QA76.9.A25 J36 2002 c.1 (1).

73.
Microsoft® Windows server 2008 security resource kit / Jesper M Johansson, with the Microsoft Security Team.

by Johansson, Jesper M | Microsoft Security Team.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Redmond, Wash. : Microsoft Press, c2008Other title: Security resource kit | Windows server 2008 | Windows server 2008 security.Availability: Items available for loan: APU LibraryCall number: QA76.9.A25 J64 2008 c.2 (3), APIIT LibraryCall number: CD-35-31 (2).

74.
Windows Server 2008 PKI and certificate security / Brian Komar.

by Komar, Brian.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Redmond, WA : Microsoft Press, c2008Availability: Items available for loan: APU LibraryCall number: TK5105.59 .K66 2008 c.1 (2), APIIT LibraryCall number: CD-35-49 (2).

75.
SOA security / Ramarao Kanneganti, Prasad Chodavarapu.

by Kanneganti, Ramarao | Chodavarapu, Prasad.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Greenwich, CT : Manning Publications Co., c2008Availability: Items available for loan: APU LibraryCall number: TK5105.52 .K36 2008 c.1 (1).

76.
Designing network security / Merike Kaeo.

by Kaeo, Merike.

Series: Cisco Press fundamentals seriesMaterial type: Text Text; Format: print ; Literary form: Not fiction Publication details: Indianapolis, Ind. : Cisco Press. : c1999Other title: Practical guide to creating a secure network infrastructure.Availability: Items available for loan: APU LibraryCall number: TK5105.59 .K34 1999 c.1 (3).

77.
Cryptography and network security / Atul Kahate.

by [Kahate, Atul . ].

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: India : Tata McGraw Hill , c2003Availability: No items available : Damaged (1).

78.
PCWEEK Microsoft Windows NT security system administrator's guide / Nevin Lambert and Manish Patel.

by Lambert, Nevin | Patel, Manish.

Material type: Text Text Publication details: Emeryville, Calif. : ZD Press, c1997Availability: Items available for loan: APU LibraryCall number: TK5105.59 .L36 1997 c.1 (1).

79.
How to cheat at securing Linux / Mohan Krishnamurthy ... [et al.].

by Krishnamurthy, Mohan.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Burlington, MA : Syngress, c2008Online access: Publisher description Availability: Items available for loan: APU LibraryCall number: TK5105.59 .K75 2008 c.1 (1).

80.
Google hacking for penetration testers. Volume 2 / Johnny Long.

by Long, Johnny.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Burlington, MA : Syngress Pub., c2008Online access: Publisher description Availability: Items available for loan: APU LibraryCall number: TK5105.885.G66 L66 2008 c.1 (2).