Asia Pacific University Library catalogue


Refine your search

Your search returned 402 results.

|
1.
Introduction to security and network forensics / William J. Buchanan.

by Buchanan, William.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Boca Raton, FL : CRC Press, c2011Availability: Items available for loan: APU LibraryCall number: QA76.9.A25 B83 2011 c.1 (4).
  (1 votes)
2.
Security for Web services and service-oriented architectures / Elisa Bertino ... [et al.].

by Bertino, Elisa.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Heidelberg [Germany] ; New York : Springer, c2010Online access: Table of contents | Contributor biographical information | Publisher description Availability: Items available for loan: APU LibraryCall number: QA76.9.A25 S43 2010 c.1 (1).

3.
Protect your digital privacy! : survival skills for the information age / Glee Harrah Cady, Pat McGregor.

by Cady, Glee Harrah | McGregor, Pat.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: [Indianapolis] : Que, c2002Availability: Items available for loan: APU LibraryCall number: QA76.9.A25 C33 2002 c.1 (2).

4.
Building Internet firewalls / D. Brent Chapman and Elizabeth D. Zwicky.

by Chapman, D. Brent | Zwicky, Elizabeth D.

Edition: Minor corrections, Nov. 1995.Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Sebastopol, CA : O'Reilly & Associates, c1995Online access: Contributor biographical information | Publisher description Availability: Items available for loan: APU LibraryCall number: TK5105.59 .C43 1995 c.1 (4). Withdrawn (2).

5.
Computer and communications security : strategies for the 1990s / James Arlin Cooper.

by Cooper, James Arlin.

Series: McGraw-Hill communications seriesMaterial type: Text Text; Format: print ; Literary form: Not fiction Publication details: New York : Intertext Publications, McGraw-Hill, c1989Availability: No items available : Withdrawn (2).

6.
Inside the security mind : making the tough decisions / Kevin Day.

by Day, Kevin, 1975-.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Upper Saddle River, N.J. : Prentice Hall, c2003Availability: Items available for loan: APU LibraryCall number: QA76.9.A25 D39 2003 c.1 (1).

7.
Network security : a hacker's perspective / Ankit Fadia.

by Fadia, Ankit, 1985-.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Delhi : Macmillan India LTD., c2003Availability: No items available : Withdrawn (1).

8.
Unofficial guide to ethical hacking / Ankit Fadia.

by Fadia, Ankit, 1985-.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Delhi : Macmillan, 2001Other title: Ethical hacking.Availability: No items available : Withdrawn (1).

9.
UNIX system security : how to protect your data and prevent intruders / Rik Farrow.

by Farrow, Rik, 1950-.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Reading, Mass. : Addison-Wesley Pub. Co., c1991Availability: No items available : Withdrawn (1).

10.
The art of deception : controlling the human element of security / Kevin D. Mitnick and William L. Simon ; foreword by Steve Wozniak.

by Mitnick, Kevin D. (Kevin David), 1963- | Simon, William L, 1930-.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Indianapolis, Ind. : Wiley, c2002Online access: Contributor biographical information | Publisher description | Table of contents Availability: Items available for loan: APU LibraryCall number: QA76.9.A25 M58 2002 c.1 (1). Withdrawn (1).

11.
Practical firewalls / Terry William Ogletree.

by Ogletree, Terry William.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Indianapolis, Ind. : Que, c2000Availability: No items available : Withdrawn (6).

12.
Security in computing / Charles P. Pfleeger.

by Pfleeger, Charles P, 1948-.

Edition: 2nd ed.Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Upper Saddle River, N.J. ; London : Prentice-Hall International, c1997Availability: No items available : Withdrawn (1).

13.
Security in computing / Charles P. Pfleeger, Shari Lawrence Pfleeger.

by Pfleeger, Charles P, 1948- | Pfleeger, Shari Lawrence.

Edition: 3rd ed.Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Upper Saddle River, N.J. : Prentice Hall PTR ; 2003Availability: No items available : Withdrawn (3).

14.
Internet security and firewalls / V. V. Preetham ; with NIIT.

by Preetham, V. V | ebrary, Inc.

Material type: Text Text; Format: electronic available online remote; Literary form: Not fiction Publication details: Cincinnati, Ohio : Premier Press, c2002Other title: Internet security & firewalls..Availability: Items available for loan: APU LibraryCall number: TK5105.59 .P74 2002 c.1 (1).

15.
The secured enterprise : protecting your information assets / Paul Proctor, and F. Christian Byrnes.

by Proctor, Paul E | Byrnes, F. Christian.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Upper Saddle River, NJ : Prentice Hall PTR, c2002Availability: Items available for loan: APU LibraryCall number: QA76.9.A25 P76 2002 c.1 (2). Withdrawn (1).

16.
Java security / Harpreet Sethi, with NIIT.

by Sethi, Harpreet | ebrary, Inc.

Material type: Text Text; Format: electronic available online remote; Literary form: Not fiction Publication details: Cincinnati, Ohio : Premier Press, c2002Availability: Items available for loan: APU LibraryCall number: QA76.73.J38 S48 2002 c.2 (1). Withdrawn (1).

17.
PC fear factor : the ultimate PC disaster prevention guide / Alan Luber.

by Luber, Alan D, 1951-.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Indianapolis, Ind. : Que Pub., c2003Availability: Items available for loan: APU LibraryCall number: QA76.9.D348 L83 2003 c.1 (3).

18.
Introduction to security : operations and management / P.J. Ortmeier.

by Ortmeier, P. J | Ortmeier, P. J. Security management.

Edition: 3rd ed.Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Upper Saddle River, N.J. : Pearson/Prentice Hall, c2009Availability: Items available for loan: APU LibraryCall number: HV8290 .O78 2009 c.2 (1). Lost (1).

19.
Internet fraud casebook : the World Wide Web of deceit / edited by Joseph T. Wells.

by Wells, Joseph T.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Hoboken, N.J. : John Wiley & Sons, c2010Online access: Publisher description | Table of contents only | Contributor biographical information Availability: Items available for loan: APU LibraryCall number: HV6773 .I58 2010 c.1 (2).

20.
Virtualization and forensics : a digital forensic investigator's guide to virtual environments / Diane Barrett, Gregory Kipper.

by Barrett, Diane | Kipper, Gregory.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Amsterdam ; Boston : Syngress/Elsevier, c2010Availability: Items available for loan: APU LibraryCall number: HV8079.C65 B37 2010 c.1 (3).