Skip to Main Content

Information Security: Books

information security and related topics

 

 

Printed Books

Printed Books

Printed Books

Applied security visualization

by Raffael Marty

Print Book ©2009

Call Numbers:

  • TK5105.59 .M369 2009 - Main Library Off Campus_General

Cloud application architectures

by George. Reese

Print Book ©2009

Call Numbers:

  • QA76.625 .R44 2009 - Main Library General Collection

Computer networks and internets

by Douglas. Comer

Print Book ©2009

Call Numbers:

  • TK5105.5 .C5897 2009 - Main Library Off Campus_General

Database systems : models, languages, design, and application programming

by Ramez. Elmasri, Sham. Navathe

Print Book ©2011

Call Numbers:

  • QA76.9.D3 .E46 2011 - Main Library General Collection

JavaScript programmer's reference

by Alexei. White

Call Numbers:

  • QA76.73.J39 W5 2009 - Main Library Off Campus_General

Machine learning in cyber trust : security, privacy, and reliability

by Jeffrey J.-P. Tsai, Philip S. Yu

Print Book ©2009

Call Numbers:

  • Q325.5 .M33 2009 - Main Library General Collection

Management information systems : managing the digital firm

by Kenneth C. Laudon, Jane Price. Laudon

Print Book ©2010

Call Numbers:

  • T58.6 .L376 2010 - Main Library Off Campus_General
  • T58.6 .L376 2010 - Main Library General Collection

Networking bible

by Barrie A. Sosinsky

Print Book ©2009

Call Numbers:

  • TK5105.5 .S67 2009 - Main Library Off Campus_General

Oracle PL/SQL programming

by Steven. Feuerstein, Bill. Pribyl

Print Book ©2009

Call Numbers:

  • QA76.73.S67 F49 2009 - Main Library Off Campus_General

Principles of computer networks and communications

by M. Barry. Dumas, Morris Schwartz

Print Book ©2009

Call Numbers:

  • TK5105.5 .D8925 2009 - Main Library Off Campus_General

Find Books or E-Books

E-Books

Advanced penetration testing : hacking the world's most secure networks

by Wil Allsopp

CCSP (ISC)2 Certified Cloud Security Professional Official Study Guide.

by Wiley. , Ann. Wiley, Brian T. O'Hara, Tom. Rubendunst

Communication and Power Engineering.

by R. Rajesh

Computation and Communication Technologies

by Senthil T. Kumar, Bala. Mathivanan

Content delivery networks : fundamentals, design, and evolution

by Dom Robinson

Data science for undergraduates : opportunities and options

by National Academies of Sciences, Engineering, and Medicine (U.S.). Committee on Envisioning the Data Science Discipline: The Undergraduate Perspective,

Delayed and network queues

by Aliakbar Montazer Haghighi, D. P. Mishev

Dependable software systems engineering

by NATO Advanced Study Institute (ASI) on Verification and Synthesis of Correct and Secure Systems (2015 : Marktoberdorf, Germany), Javier Esparza, Orna Grumberg, Salomon Sickert

Empirical Research for Software Security : Foundations and Experience.

by Lotfi. Ben Othmane, Martin Gilje. Jaatun, Edgar. Weippl

Encyclopedia of database systems

by M. Tamer Özsu, Ling Liu

Guide to pairing-based cryptography

by Nadia El Mrabet, Marc Joye

Hacking the hacker : learn from the experts who take down hackers

by Roger A. Grimes

Hybrid intelligence for image analysis and understanding

by Siddhartha Bhattacharyya, Indrajit Pan, Anirban Mukherjee, Paramartha Dutta

Incremental software architecture : a method for saving failing IT implementations

by Michael Bell

Information hiding in communication networks : fundamentals, mechanisms, applications, and countermeasures

by Wojciech. Mazurczyk, Steffen. Wendzel, Sebastian. Zander, Amir. Houmansadr, Krzysztof. Szczypiorski

IoT security issues

by Alasdair Gilchrist

Linux Server security : hack and defend

by Chris Binnie

Network forensics

by Ric Messier

Network routing : fundamentals, applications, and emerging technologies

by Sudip Misra, Sumit Goswami

Penetration testing essentials.

by Sean-Philip. Oriyano

E-Books

2017 European Intelligence and Security Informatics Conference : EISIC 2017 : proceedings : 11-13 September 2017, Athens, Greece

by European Intelligence and Security Informatics Conference (2017 : Athens, Greece), Joel Brynielsson, IEEE Computer Society , Institute of Electrical and Electronics Engineers.

2017 International Workshop on Big Data and Information Security (IWBIS) : Ambhara Hotel, Jakarta, September 23th-24th, 2017

by International Workshop on Big Data and Information Security (2017 : Jakarta, Indonesia), Universitas Indonesia. Fakultas Ilmu Komputer,, Institute of Electrical and Electronics Engineers. Indonesia Section,, Institute of Electrical and Electronics Engineers

2019 4th MEC International Conference on Big Data and Smart City (ICBDSC) : Muscat, Oman, 15-16 January 2019.

by MEC International Conference on Big Data and Smart City (4th : 2019 : Muscat, Oman), Middle East College , IEEE Communications Society , Institute of Electrical and Electronics Engineers. Oman Section,, Institute of Electrical and Electronics Engineers

2019 International Conference on Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA) : University of Oxford, Department of Computer Science, Wolfson Building, Parks Road, Oxford OX1 3QD, United Kingdom, 3-4 June 2019

by International Conference on Cyber Situational Awareness, Data Analytics and Assessment (2019 : London, England), Institute of Electrical and Electronics Engineers

2019 International Conference on Multimedia Analysis and Pattern Recognition (MAPR) : 9-10 May 2019, Ho Chi Minh City, Viet Nam.

by International Conference on Multimedia Analysis and Pattern Recognition (2nd : 2019 : Ho Chi Minh City, Vietnam), Vietnamese Association for Pattern Recognition , Institute of Electrical and Electronics Engineers

2019 the 4th IEEE International Conference on Big Data Analytics (ICBDA 2019) : March 15-18, 2019, Suzhou, China

by IEEE International Conference on Big Data Analysis (4th : 2019 : Suzhou, Jiangsu Sheng, China), Xi'an Jiaotong-Liverpool University. Research Institute of Big Data Analytics,, Institute of Electrical and Electronics Engineers

Printed Books

Printed Books

Printed Books

Principles of information security

by Michael E. Whitman, Herbert J. Mattord

Print Book ©2009

Call Numbers:

  • TK5105.59 .W55 2009 - Main Library Off Campus_General

Professional Oracle WebLogic Server

by Robert. Patrick, Greg. Nyberg, Philip. Aston, Josh. Bregman, Paul. Done

Print Book 2010

Call Numbers:

  • TK5105.7 .P37 2010 - Main Library General Collection

Security awareness : applying practical security in your world

by Mark D. Ciampa

Print Book 2010

Call Numbers:

  • QA76.9.A25 C53 2010 - Main Library General Collection

Security in a Web 2.0+ world : a standards based approach

by C. Solari

Print Book 2009

Call Numbers:

  • TK5105.88817 .S65 2009 - Main Library Off Campus_General

Security+ guide to network security fundamentals

by Mark D. Ciampa

Print Book ©2009

Call Numbers:

  • TK5105.59 .C52 2009 - Main Library Off Campus_General

Software architecture : foundations, theory, and practice

by Richard N. Taylor, Nenad. Medvidović, Eric M. Dashofy

Print Book ©2010

Call Numbers:

  • QA76.754 .T39 2010 - Main Library General Collection

Strategic information systems management

by Kevin Grant, Ray. Hackney, David Edgar

Print Book ©2010

Call Numbers:

  • T58.6 .G73 2010 - Main Library General Collection