Your search returned 20 results.

Not what you expected? Check for suggestions
UNIX system security : a guide for users and system administrators / David A. Curry.

by Curry, David A. (David Allan), 1962-.

Series: Addison-Wesley professional computing seriesMaterial type: Text Text; Format: print ; Literary form: Not fiction Publication details: Reading, Mass. : Addison-Wesley Pub. Co., c1992Availability: Items available for loan: University of Macedonia LibraryCall number: QA76.9.A25C87 1992 (1).

Secure XML : the new syntax for signatures and encryption / Donald E. Eastlake III, Kitty Niles.

by Eastlake, Donald | Niles, Kitty.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Boston, MA : Addison-Wesley, c2003Availability: Items available for loan: University of Macedonia LibraryCall number: QA76.9.A25E32 2003 (1).

Understanding PKI : concepts, standards, and deployment considerations / Carlisle Adams, Steve Lloyd.

by Adams, Carlisle, 1961- | Lloyd, Steve | Adams, Carlisle, 1961-. Understanding public-key infrastructure.

Edition: 2nd ed.Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Boston : Addison-Wesley, 2003Availability: Items available for loan: University of Macedonia LibraryCall number: QA76.9.A25A346 2003 (1).

Building secure software : how to avoid security problems the right way / John Viega, Gary McGraw.

by Viega, John | McGraw, Gary, 1966-.

Series: Addison-Wesley professional computing seriesMaterial type: Text Text; Format: print ; Literary form: Not fiction Publication details: Boston : Addison-Wesley, c2002Availability: Items available for loan: University of Macedonia LibraryCall number: QA76.76.D47V857 2002 (1).

Exploiting software : how to break code / Greg Hoglund, Gary McGraw.

by Hoglund, Greg | McGraw, Gary, 1966-.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Boston : Addison-Wesley, c2004Online access: Table of contents Availability: Items available for loan: University of Macedonia LibraryCall number: QA76.9.A25H635 2004 (1).

Computer security : art and science / Matt Bishop.

by Bishop, Matt (Matthew A.).

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Boston : Addison-Wesley, 2003Availability: Items available for loan: University of Macedonia LibraryCall number: QA76.9.A25B56 2003 (1).

Introduction to computer security / Matt Bishop.

by Bishop, Matt (Matthew A.).

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Boston : Addison-Wesley, c2005Online access: Table of contents Availability: No items available : Lost (1).

The art of computer virus research and defense / Peter Szor.

by Szor, Peter.

Material type: Text Text; Format: print ; Literary form: Not fiction ; Audience: Specialized; Publication details: Upper Saddle River, NJ : Addison-Wesley, c2005Other title: Computer virus research and defense.Availability: Items available for loan: University of Macedonia LibraryCall number: QA76.76.C68S96 2005 (1).

Software security : building security in / Gary McGraw.

by McGraw, Gary, 1966-.

Series: Addison-Wesley software security seriesMaterial type: Text Text; Format: print ; Literary form: Not fiction Publication details: Upper Saddle River, NJ : Addison-Wesley, c2006Online access: Table of contents Availability: Items available for loan: University of Macedonia LibraryCall number: QA76.9.A25M4286 2006 (1).

Cryptography decrypted / H.X. Mel, Doris Baker ; math appendix by Steve Burnett ; foreword by John Kinyon.

by Mel, H. X, 1948- | Baker, Doris M, 1953-.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Boston, MA : Addison-Wesley, c2001Availability: Items available for loan: University of Macedonia LibraryCall number: QA76.9.A25M44 2001 (1).

Rootkits : subverting the Windows kernel / Greg Hoglund, James Butler.

by Hoglund, Greg | Butler, James.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Upper Saddle River, NJ : Addison-Wesley, c2006Online access: Table of contents Availability: Items available for loan: University of Macedonia LibraryCall number: QA76.9.A25H637 2006 (1).

The craft of system security / Sean Smith, John Marchesini.

by Smith, Sean W, 1964- | Marchesini, John.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Upper Saddle River, NJ : Addison-Wesley, c2008Availability: Items available for loan: University of Macedonia LibraryCall number: QA76.9.A25S6527 2008 (1).

Know your enemy : learning about security threats / The Honeynet Project.

by Honeynet Project.

Edition: 2nd ed.Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Boston, MA : Addison-Wesley, c2004Online access: Table of contents Availability: Items available for loan: University of Macedonia LibraryCall number: QA76.9.A25K624 2004 (1).

Applied security visualization / Raffael Marty.

by Marty, Raffael, 1976-.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Upper Saddle River, NJ : Addison-Wesley, c2009Online access: Table of contents only Availability: Items available for loan: University of Macedonia LibraryCall number: TK5105.59.M369 2009 (1).

The CERT C secure coding standard / Robert C. Seacord.

by Seacord, Robert C.

Series: SEI series in software engineeringMaterial type: Text Text; Format: print ; Literary form: Not fiction Publication details: Upper Saddle River, NJ : Addison-Wesley, c2009Online access: Table of contents only Availability: Items available for loan: University of Macedonia LibraryCall number: QA76.73.C15S4155 2009 (1).

Effective cybersecurity : understanding and using standards and best practices / William Stallings.

by Stallings, William [author.].

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: Upper Saddle River, NJ : Addison-Wesley, [2019]Copyright date: ©2019Other title: Effective cybersecurity : a guide to using best practices and standards.Availability: Items available for loan: University of Macedonia LibraryCall number: QA76.9.A25S686 2019 (1).

European Union Digital Greece ESPA Default