|
81.
|
|
|
82.
|
|
|
83.
|
|
|
84.
|
|
|
85.
|
|
|
86.
|
Network intrusion detection / Stephen Northcutt, Judy Novak. by Northcutt, Stephen | Novak, Judy. Edition: 3rd ed.Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: Indianapolis, Ind. : New Riders Pub., c2003Availability: Items available for loan: APU LibraryCall number: TK5105.59 .N67 2003 c.1 (1).
|
|
87.
|
Network security bible / Eric Cole, Ronald Krutz, James W. Conley. by Cole, Eric | Krutz, Ronald L, 1938- | Conley, James W. Edition: 2nd ed.Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: Indianapolis, IN : Wiley, c2009Availability: Items available for loan: APU LibraryCall number: QA76.9.A25 C65 2009 c.1 (1).
|
|
88.
|
|
|
89.
|
|
|
90.
|
Corporate computer and network security / Raymond R. Panko. by Panko, Raymond R. Edition: International ed.Material type: Text Publication details: Upper Saddle River, N.J. ; [Great Britain] : Pearson Prentice Hall, c2004Availability: Items available for loan: APU LibraryCall number: QA76.9.A25 P36 2004 c.2 (2). Withdrawn (1).
|
|
91.
|
|
|
92.
|
|
|
93.
|
|
|
94.
|
|
|
95.
|
|
|
96.
|
|
|
97.
|
|
|
98.
|
|
|
99.
|
|
|
100.
|
Hacking : the art of exploitation / Jon Erickson. by Erickson, Jon, 1977-. Edition: 2nd ed.Material type: Text; Format:
print
; Literary form:
Not fiction
Publication details: San Francisco, CA : No Starch Press, c2008Online access: Table of contents Availability: Items available for loan: APU LibraryCall number: QA76.9.A25 E75 2008 c.1 (1), APIIT LibraryCall number: CD-37-67 (2). Lost (1).
|