Asia Pacific University Library catalogue


Refine your search

Your search returned 126 results.

|
1.
Introduction to security and network forensics / William J. Buchanan.

by Buchanan, William.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Boca Raton, FL : CRC Press, c2011Availability: Items available for loan: APU LibraryCall number: QA76.9.A25 B83 2011 c.1 (4).
  (1 votes)
2.
Security for Web services and service-oriented architectures / Elisa Bertino ... [et al.].

by Bertino, Elisa.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Heidelberg [Germany] ; New York : Springer, c2010Online access: Table of contents | Contributor biographical information | Publisher description Availability: Items available for loan: APU LibraryCall number: QA76.9.A25 S43 2010 c.1 (1).

3.
Cisco security / Kartik Bhatnagar, with NIIT.

by Bhatnagar, Kartik | NIIT (Corporation).

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Cincinnati, Ohio : Premier Press, c2002Availability: Items available for loan: APU LibraryCall number: TK5105.59 .B43 2002 c.1 (2).

4.
Web security basics / Shweta Bhasin ; with NIIT.

by Bhasin, Shweta, 1977- | NIIT (Corporation).

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Cincinnati, Ohio : Premier Press, c2003Availability: Items available for loan: APU LibraryCall number: TK5105.59 .B43 2003 c.2 (1). Withdrawn (1).

5.
Internet security and firewalls / V. V. Preetham ; with NIIT.

by Preetham, V. V | ebrary, Inc.

Material type: Text Text; Format: electronic available online remote; Literary form: Not fiction Publication details: Cincinnati, Ohio : Premier Press, c2002Other title: Internet security & firewalls..Availability: Items available for loan: APU LibraryCall number: TK5105.59 .P74 2002 c.1 (1).

6.
Building secure and reliable network applications / Kenneth P. Birman.

by Birman, Kenneth P.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Greenwich : Manning, c1996Availability: Items available for loan: APU LibraryCall number: TK5105.59 .B57 1996 c.1 (2).

7.
Digital forensics for network, Internet, and cloud computing : a forensic evidence guide for moving targets and data / Terrence V. Lillard ... [et al.] ; technical editor, Jim Murray.

by Lillard, Terrence.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Burlington, MA : Syngress, c2010Availability: Items available for loan: APU LibraryCall number: HV8079.C65 D54 2010 c.4 (5).

8.
Nessus network auditing / Russ Rogers, technical editor ; Mark Carey, Paul Criscuolo, Mike Petruzzi.

by Carey, Mark | Rogers, Russ | Criscuolo, Paul | Petruzzi, Mike.

Edition: 2nd ed.Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Burlington, MA : Syngress, c2008Availability: Items available for loan: APU LibraryCall number: TK5105.5 .N47 2008 c.2 (2).

9.
Advanced persistent threat : understanding the danger and how to protect your organization / Dr. Eric Cole.

by Cole, Eric.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Waltham, MA : Syngress, c2013Availability: Items available for loan: APU LibraryCall number: QA76.9.A25 C65 2013 c.1 (2).

10.
Pro PHP security : from application security principles to the implementation of XSS defenses / Chris Snyder, Thomas Myer, Michael Southwell.

by Snyder, Chris. (Christopher H.) | Myer, Tom | Southwell, Michael G.

Series: Expert's voice in open sourceEdition: 2nd ed.Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: [Berkeley, CA] : New York : Apress ; Distributed to the book trade worldwide by Springer Science+Business Media, c2010Availability: Items available for loan: APU LibraryCall number: QA76.73.P224 S69 2010 c.1 (1).

11.
Secure electronic commerce : building the infrastructure for digital signatures and encryption / Warwick Ford, Michael S. Baum.

by Ford, Warwick | Baum, Michael S.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Upper Saddle River, N.J. : Prentice Hall PTR, c1997Availability: No items available : Lost (1).

12.
Harley Hahn's Internet insecurity : why your privacy, security, and safety are at risk and what you can do about it / Harley Hahn.

by Hahn, Harley, 1952-.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Upper Saddle River, N. J. : Prentice Hall, c2002Other title: Internet insecurity.Availability: Items available for loan: APU LibraryCall number: TK5105.59 .H34 2002 c.1 (1).

13.
Building Linux Virtual Private Networks (VPNs) / Oleg Kolesnikov, Brian Hatch.

by Kolesnikov, Oleg | Hatch, Brian.

Edition: 1st ed.Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Indianapolis, Ind. : New Riders, 2002Availability: Items available for loan: APU LibraryCall number: QA76.76.O63 K65 2002 c.3 (3).

14.
Virtual private networks / Charlie Scott, Paul Wolfe, and Mike Erwin.

by Scott, Charlie | Erwin, Mike, 1969- | Wolfe, Paul.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Sebastopol, CA : O'Reilly, c1998Online access: Contributor biographical information | Publisher description Availability: Items available for loan: APU LibraryCall number: TK5105.875.I57 S36 1998 c.1 (1).

15.
Virtual private networks / Charlie Scott, Paul Wolfe, and Mike Erwin.

by Scott, Charlie | Wolfe, Paul | Erwin, Mike, 1969-.

Edition: 2nd ed.Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Beijing [China] ; Sebastopol, CA : O'Reilly, c1999Online access: Publisher description Availability: Items available for loan: APU LibraryCall number: TK5105.875.I57 S36 1999 c.3 (3).

16.
Hacking exposed Web 2.0 : Web 2.0 security secrets and solutions / Rich Cannings, Himanshu Dwivedi, Zane Lackey.

by Cannings, Rich | Dwivedi, Himanshu | Lackey, Zane.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: New York : McGraw-Hill, c2008Other title: Web 2.0 security secrets and solutions.Online access: Contributor biographical information | Publisher description | Table of contents only Availability: Items available for loan: APU LibraryCall number: TK5105.59 .C36 2008 c.1 (2).

17.
Cryptography and network security : principles and practice / William Stallings.

by Stallings, William.

Edition: 4th Pearson int. ed.Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Upper Saddle River, N.J. ; London : Prentice Hall, c2006Availability: Items available for loan: APU LibraryCall number: TK5105.59 .S73 2006 c.2 (2).

18.
Network security essentials : applications and standards / William Stallings.

by Stallings, William.

Edition: 3rd ed.Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Upper Saddle River, NJ : Pearson/Prentice Hall, c2007Availability: Items available for loan: APU LibraryCall number: TK5105.59 .S73 2007 c.1 (4).

19.
Software security engineering : a guide for project managers / Julia H. Allen ... [et al.].

by Allen, Julia H.

Series: The SEI series in software engineering | The Addison-Wesley software security seriesMaterial type: Text Text; Format: print ; Literary form: Not fiction Publication details: Upper Saddle River, NJ : Addison-Wesley, c2008Online access: Table of contents only Availability: Items available for loan: APU LibraryCall number: QA76.9.A25 S64 2008 c.1 (1).

20.
Fuzzing : brute force vulnerabilty discovery / Michael Sutton, Adam Greene, Pedram Amini.

by Sutton, Michael, 1973- | Greene, Adam, 1983- | Amini, Pedram.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Upper Saddle River, NJ : Addison-Wesley, c2007Online access: Table of contents only Availability: Items available for loan: APU LibraryCall number: QA76.9.A25 S88 2007 c.1 (1).