Asia Pacific University Library catalogue


Refine your search

Your search returned 126 results.

|
81.
Cisco router and switch forensics : investigating and analyzing malicious network activity / Dale Liu, lead author and technical editor ; James Burton ... [et al.].

by Liu, Dale.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Burlington, MA : Syngress, c2009Availability: Items available for loan: APU LibraryCall number: TK5105.59 .L58 2009 c.1 (2).

82.
Wireless security / Merritt Maxim and David Pollino.

by Maxim, Merritt | Pollino, David.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: New York : McGraw-Hill/Osborne, c2002Online access: Table of contents | Publisher description | Contributor biographical information Availability: Items available for loan: APU LibraryCall number: TK5105.59 .M39 2002 c.1 (1).

83.
Computer forensics : computer crime scene investigation / John R. Vacca.

by Vacca, John R.

Edition: 2nd ed.Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Hingham, Mass. : Charles River Media, c2005Online access: Table of contents Availability: Items available for loan: APU LibraryCall number: QA76.9.A25 V33 2005 c.2 (3), APIIT LibraryCall number: CD-36-27 (3).

84.
Network intrusion detection : an analyst's handbook / Stephan [sic] Northcutt, Judy Novak, Donald McLachlan.

by Northcutt, Stephen | Novak, Judy | McLachlan, Donald.

Edition: 2nd ed.Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Indianapolis, Ind. : New Riders, c2001Availability: Items available for loan: APU LibraryCall number: TK5105.59 .N67 2001 c.1 (3).

85.
Computer security : protecting digital resources / Robert C. Newman.

by Newman, Robert C.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Sudbury, Mass. : Jones and Bartlett Publishers, c2010Availability: Items available for loan: APU LibraryCall number: QA76.9.D314 N49 2010 c.1 (1).

86.
Network intrusion detection / Stephen Northcutt, Judy Novak.

by Northcutt, Stephen | Novak, Judy.

Edition: 3rd ed.Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Indianapolis, Ind. : New Riders Pub., c2003Availability: Items available for loan: APU LibraryCall number: TK5105.59 .N67 2003 c.1 (1).

87.
Network security bible / Eric Cole, Ronald Krutz, James W. Conley.

by Cole, Eric | Krutz, Ronald L, 1938- | Conley, James W.

Edition: 2nd ed.Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Indianapolis, IN : Wiley, c2009Availability: Items available for loan: APU LibraryCall number: QA76.9.A25 C65 2009 c.1 (1).

88.
Peter Norton's network security fundamentals / Peter Norton and Mike Stockman.

by Norton, Peter, 1943- | Stockman, Mike.

Edition: 1st ed.Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Indianapolis : Sams, c2000Other title: Network security fundamentals.Availability: Items available for loan: APU LibraryCall number: TK5105.59 .N57 2000 c.1 (2).

89.
Googling security : how much does Google know about you? / Greg Conti.

by Conti, Greg.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Upper Saddle River, NJ : Addison-Wesley, c2009Online access: Table of contents only Availability: Items available for loan: APU LibraryCall number: QA76.9.A25 C66 2009 c.1 (1).
  (1 votes)
90.
Corporate computer and network security / Raymond R. Panko.

by Panko, Raymond R.

Edition: International ed.Material type: Text Text Publication details: Upper Saddle River, N.J. ; [Great Britain] : Pearson Prentice Hall, c2004Availability: Items available for loan: APU LibraryCall number: QA76.9.A25 P36 2004 c.2 (2). Withdrawn (1).

91.
Implementing Cisco IOS network security (IINS) / Catherine Paquet.

by Paquet, Catherine.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Indianapolis, IN : Cisco Press, c2009Availability: No items available : Lost (1).

92.
Corporate computer and network security / Raymond R. Panko.

by Panko, R. Raymond.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Upper Saddle River, NJ : Pearson Prentice Hall, c2004. c2004Online access: Table of contents Availability: Items available for loan: APU LibraryCall number: QA76.9.A25 P36 2004 c.1 (1).

93.
Tactical perimeter defense : becoming a security network specialist /

by Peterson,Warren | Scott,Clay.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: NEW YORK; SECURITY CERTIFIED PROGRAM, c2007Online access: Contributor biographical information | Publisher description | Table of contents only Availability: Items available for loan: APU LibraryCall number: TK5105.59 .P48 2007 c.1 (1), APIIT LibraryCall number: CD-37-63 (1).

94.
Strategic infrastructure security : becoming a security network professional /

by Peterson,Warren.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: New York ; Security Certified Program, c2007Availability: Items available for loan: APU LibraryCall number: TK5105.59 .P48 2007 c.1 (1), APIIT LibraryCall number: CD-37-62 (1).

95.
Counter hack : a step-by-step guide to computer attacks and effective defenses / Ed Skoudis.

by Skoudis, Ed.

Series: Prentice Hall series in computer networking and distributed systemsMaterial type: Text Text; Format: print ; Literary form: Not fiction Publication details: Upper Saddle River, N.J. : Prentice Hall PTR, c2002Availability: Items available for reference: APU Library ProcessingCall number: TK5105.59 .S56 2002 c.1 (1). :

96.
Router security strategies : securing IP network traffic planes / Gregg Schudel, David J. Smith.

by Schudel, Gregg | Smith, David J., CCIE.

Series: Router security strategiesMaterial type: Text Text; Format: print ; Literary form: Not fiction Publication details: Indianapolis, Ind. : Cisco Press, c2008Online access: Table of contents only Availability: Items available for loan: APU LibraryCall number: TK5105.543 .S3 2008 c.1 (1).

97.
End-to-end network security : defense-in-depth / Omar Santos.

by Santos, Omar.

Series: End-to-end network securityCisco Press networking technology seriesMaterial type: Text Text; Format: print ; Literary form: Not fiction Publication details: Indianapolis, Ind. : Cisco Press, c2008Availability: Items available for loan: APU LibraryCall number: TK5105.59 .S26 2008 c.1 (1).

98.
The craft of system security / Sean Smith, John Marchesini.

by Smith, Sean W, 1964- | Marchesini, John.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Upper Saddle River, NJ : Addison-Wesley, c2008Online access: Table of contents only Availability: Items available for loan: APU LibraryCall number: QA76.9.A25 S65 2008 c.1 (2).

99.
Network security : an introduction to techniques & standard / Kamaruzzaman Seman, Shaharudin Ismail, Waidah Ismail.

by Kamaruzzaman Seman | Shaharudin Ismail | Waidah Ismail.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Nilai, Negeri Sembilan : Penerbit Universiti Sains Islam Malaysia, 2007Availability: Items available for loan: APU LibraryCall number: TK5105.59 .K36 2007 c.1 (2).

100.
Hacking : the art of exploitation / Jon Erickson.

by Erickson, Jon, 1977-.

Edition: 2nd ed.Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: San Francisco, CA : No Starch Press, c2008Online access: Table of contents Availability: Items available for loan: APU LibraryCall number: QA76.9.A25 E75 2008 c.1 (1), APIIT LibraryCall number: CD-37-67 (2). Lost (1).