Refine your search

Your search returned 174 results.

Not what you expected? Check for suggestions
Core security patterns : best practices and strategies for J2EE, Web services and identity management / Christopher Steel, Ramesh Nagappan, Ray Lai.

by Steel, Christopher, 1968- | Nagappan, Ramesh | Lai, Ray.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Upper Saddle River, NJ : Prentice Hall Professional Technical Reference, c2006Online access: Table of contents Availability: Items available for loan: University of Macedonia LibraryCall number: QA76.73.J38S834 2006 (2).

Multimedia security : steganography and digital watermarking techniques for protection of intellectual property / Chun-Shien Lu.

by Lu, Chun-Shien.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Hershey PA : Idea Group Publishing, c2005Online access: Table of contents Availability: Items available for loan: University of Macedonia LibraryCall number: QA76.9.A25M86 2005 (1).

Secure systems development with UML / Jan Jürjens.

by Jürjens, Jan.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Berlin : Springer, 2005Availability: Items available for loan: University of Macedonia LibraryCall number: QA76.76.D47J84 2005 (1).

Beginning cryptography and PKI in Java / David Hook.

by Hook, David, 1962-.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Indianapolis, IN : Wiley Pub., c2005Online access: Table of contents Availability: Items available for loan: University of Macedonia LibraryCall number: QA76.9.A25H645 2005 (1).

Hardening Apache / Tony Mobily.

by Mobily, Tony.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Berkeley, CA : Apress, c2004Availability: No items available : Lost (1).

Hardening Linux / James Turnbull.

by Turnbull, James.

Series: Expert's voice in open sourceMaterial type: Text Text; Format: print ; Literary form: Not fiction Publication details: Berkeley, CA : Apress, c2005Availability: No items available : Lost (1).

Incident response and computer forensics / Chris Prosise, Kevin Mandia.

by Prosise, Chris | Mandia, Kevin | Prosise, Chris. Incident response.

Edition: 2nd ed.Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: New York, NY : McGraw-Hill/Osborne, c2003Other title: Incident response & computer forensics.Online access: Publisher description | Contributor biographical information | Table of contents Availability: Items available for loan: University of Macedonia LibraryCall number: HV6773.P766 2003 (1).

Incident response : computer forensics toolkit / Douglas Schweitzer.

by Schweitzer, Douglas.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Indianapolis, IN : Wiley, c2003Online access: Contributor biographical information | Publisher description | Table of contents Availability: Items available for loan: University of Macedonia LibraryCall number: HV8079.C65S39 2003 (2).

Introduction to computer security / Matt Bishop.

by Bishop, Matt (Matthew A.).

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Boston : Addison-Wesley, c2005Online access: Table of contents Availability: No items available : Lost (1).

Computer security fundamentals / Chuck Easttom.

by Easttom, Chuck.

Series: Security series (Upper Saddle River, N.J.)Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Upper Saddle River, N.J. : Pearson Prentice Hall, c2006Availability: Items available for loan: University of Macedonia LibraryCall number: QA76.9.A25E325 2006 (1).

Guide to computer forensics and investigations / by Bill Nelson ... [et al.].

by Nelson, Bill.

Edition: 2nd ed.Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Boston, Mass. : Thomson Course Technology, c2006Other title: Computer forensics and investigations..Availability: Items available for loan: University of Macedonia LibraryCall number: QA76.9.A25G8155 2006 (2).

Complexity theory and cryptology : an introduction to cryptocomplexity / Jörg Rothe.

by Rothe, Jörg.

Series: European Association for Theoretical Computer Science. Texts in theoretical computer science ; Texts in theoretical computer science | EATCS seriesMaterial type: Text Text; Format: print ; Literary form: Not fiction Publication details: Berlin : Springer, c2005Other title: Introduction to cryptocomplexity | Cryptocomplexity.Availability: Items available for loan: University of Macedonia LibraryCall number: QA76.9.A25R672 2005 (1).

The security risk assessment handbook : a complete guide for performing security risk assessments / Douglas J. Landoll.

by Landoll, Douglas J.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Boca Raton, FL : Auerbach Publications, 2006Availability: Items available for loan: University of Macedonia LibraryCall number: HF5548.37.L358 2006 (1).

Brute force : cracking the data encryption standard / Matt Curtin.

by Curtin, Matt.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: New York : Copernicus Books, c2005Availability: Items available for loan: University of Macedonia LibraryCall number: QA76.9.A25C873 2005 (1).

The art of computer virus research and defense / Peter Szor.

by Szor, Peter.

Material type: Text Text; Format: print ; Literary form: Not fiction ; Audience: Specialized; Publication details: Upper Saddle River, NJ : Addison-Wesley, c2005Other title: Computer virus research and defense.Availability: Items available for loan: University of Macedonia LibraryCall number: QA76.76.C68S96 2005 (1).

Software security : building security in / Gary McGraw.

by McGraw, Gary, 1966-.

Series: Addison-Wesley software security seriesMaterial type: Text Text; Format: print ; Literary form: Not fiction Publication details: Upper Saddle River, NJ : Addison-Wesley, c2006Online access: Table of contents Availability: Items available for loan: University of Macedonia LibraryCall number: QA76.9.A25M4286 2006 (1).

PC disaster and recovery [electronic resource] / Kate J. Chase.

by Chase, Kate | NetLibrary, Inc.

Material type: Text Text; Format: electronic available online remote; Literary form: Not fiction Publication details: San Francisco, CA : Sybex, c2003Online access: Bibliographic record display Availability: Items available for loan: University of Macedonia LibraryCall number: E-Books (1).

Maximum Linux security [electronic resource] : [a hacker's guide to protecting your Linux server and workstation] / Anonymous.

by Ray, John, 1971- | NetLibrary, Inc.

Edition: 2nd ed / with revisions by John Ray.Material type: Text Text; Format: electronic available online remote; Literary form: Not fiction Publication details: Indianapolis, Ind. : Sams, c2001Online access: Bibliographic record display Availability: Items available for loan: University of Macedonia LibraryCall number: E-Books (1).

Network security foundations [electronic resource] / Matthew Strebe.

by Strebe, Matthew | NetLibrary, Inc.

Material type: Text Text; Format: electronic available online remote; Literary form: Not fiction Publication details: San Francisco : SYBEX, c2004Online access: Bibliographic record display Availability: Items available for loan: University of Macedonia LibraryCall number: E-Books (1).

Fundamentals of computer security technology / Edward G. Amoroso.

by Amoroso, Edward G.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Upper Saddle River, NJ : PTR Prentice Hall, c1994Availability: Items available for loan: University of Macedonia LibraryCall number: QA76.9.A25A46 1994 (1).

European Union Digital Greece ESPA Default