Your search returned 27 results.

Not what you expected? Check for suggestions
Ασφάλεια πληροφοριακών συστημάτων και δικτύων / Γ. Πάγκαλος, Ι. Μαυρίδης.

by Πάγκαλος, Γεώργιος | Μαυρίδης, Ι. (Ιωάννης).

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Θεσσαλονίκη : Ανίκουλας, c2002Online access: Εξώφυλλο, οπισθόφυλλο και πίνακας περιεχομένων Availability: Items available for loan: University of Macedonia LibraryCall number: QA76.9.A25P34 2002 (4).

Τεχνικές κρυπτογραφίας & κρυπτανάλυσης / Βασίλειος Αν. Κάτος, Γεώργιος Χρ. Στεφανίδης.

by Κάτος, Βασίλειος Αν | Στεφανίδης, Γεώργιος Χρ.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Θεσσαλονίκη : Ζυγός, 2003Online access: Εξώφυλλο, οπισθόφυλλο και πίνακας περιεχομένων Availability: Items available for loan: University of Macedonia LibraryCall number: QA76.9.A25K38 2003 (4).

Cryptography in C and C++ / Michael Welschenbach ; translated by David Kramer.

by Welschenbach, Michael.

Edition: [2nd ed.]Material type: Text Text; Format: print ; Literary form: Not fiction Language: English Original language: German Publication details: Bekeley : Apress, c2001Availability: Items available for loan: University of Macedonia LibraryCall number: QA76.9.A25W4313 2001 (1).

Εργαλειοθήκη για την αντιμετώπιση των hacker / Keith J. Jones, Mike Shema, Bradley C. Johnson ; απόδοση, Μαίρη Γκλαβά.

by Jones, Keith J. (Keith John) | Shema, Mike | Johnson, Bradley C.

Material type: Text Text; Format: print ; Literary form: Not fiction Language: Greek, Modern (1453- ) Original language: English Publication details: Αθήνα : Μ. Γκιούρδας, 2002Availability: Items available for loan: University of Macedonia LibraryCall number: TK5105.59.J6616 2002 (2).

Οι χάκερ επιτίθενται / Richard Mansfield ; απόδοση, Ε. Γκαγκάτσιου.

by Mansfield, Richard, 1945-.

Material type: Text Text; Format: print ; Literary form: Not fiction Language: Greek, Modern (1453- ) Original language: English Publication details: Αθήνα : Μ. Γκιούρδας 2001Other title: Προστατέψτε τον υπολογιστή σας από την εγκληματικότητα του internet.Availability: Items available for loan: University of Macedonia LibraryCall number: QA76.9.A25M3316 2001 (1).

Ασφάλεια δικτύων / Chris Brenton, Cameron Hunt ; απόδοση, Ε. Γκαγκάτσιου.

by Brenton, Chris | Hunt, Cameron.

Material type: Text Text; Format: print ; Literary form: Not fiction Language: Greek, Modern (1453- ) Original language: English Publication details: Αθήνα : Μ. Γκιούρδας, 2003Online access: Εξώφυλλο, οπισθόφυλλο και πίνακας περιεχομένων Availability: Items available for loan: University of Macedonia LibraryCall number: QA76.9.A25B75716 2003 (2).

Snort 2.1 intrusion detection / [Jay Beale] featuring the Snort Development Team, Andrew R. Baker, Brian Caswell, Mike Poor ; foreword by Stephen Northcutt with Raven Alder ... [et al.].

by Beale, Jay | Baker, Andrew R | Caswell, Brian | Poor, Mike.

Series: Jay Beale's open source security seriesEdition: 2nd ed.Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Rockland, MA : Syngress, c2004Availability: Items available for loan: University of Macedonia LibraryCall number: TK5105.59.B33 2004 (1).

Microsoft Windows security resource kit / Ben Smith and Brian Komar, with the microsoft security team.

by Smith, Ben, 1975- | Komar, Brian.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Redmond, Wash. : Microsoft Press, c2003Availability: Items available for loan: University of Macedonia LibraryCall number: QA76.9.A25S63 2003 (1).

Code hacking : a developer's guide to network security / Richard Conway, Julian Cordingley.

by Conway, Richard, 1974- | Cordingley, Julian, 1966-.

Series: Charles River Media networking/security seriesEdition: 1st ed.Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Hingham, Mass. : Charles River Media, c2004Online access: Table of contents Availability: Items available for loan: University of Macedonia LibraryCall number: TK5105.59.C5795 2004 (2).

Homeland security techniques and technologies / Jesâus Mena.

by Mena, Jesus.

Series: Charles River Media networking/security seriesEdition: 1st ed.Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Hingham, Mass. : Charles River Media, c2004Availability: Items available for loan: University of Macedonia LibraryCall number: QA76.9.D343M439 2004 (1).

Hiding in plain sight : steganography and the art of covert communication / Eric Cole.

by Cole, Eric.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: New York : Wiley Pub., c2003Online access: Contributor biographical information | Publisher description | Table of contents Availability: Items available for loan: University of Macedonia LibraryCall number: QA76.9.A25C598 2003 (1).

Core security patterns : best practices and strategies for J2EE, Web services and identity management / Christopher Steel, Ramesh Nagappan, Ray Lai.

by Steel, Christopher, 1968- | Nagappan, Ramesh | Lai, Ray.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Upper Saddle River, NJ : Prentice Hall Professional Technical Reference, c2006Online access: Table of contents Availability: Items available for loan: University of Macedonia LibraryCall number: QA76.73.J38S834 2006 (2).

Incident response : computer forensics toolkit / Douglas Schweitzer.

by Schweitzer, Douglas.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Indianapolis, IN : Wiley, c2003Online access: Contributor biographical information | Publisher description | Table of contents Availability: Items available for loan: University of Macedonia LibraryCall number: HV8079.C65S39 2003 (2).

Guide to computer forensics and investigations / by Bill Nelson ... [et al.].

by Nelson, Bill.

Edition: 2nd ed.Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Boston, Mass. : Thomson Course Technology, c2006Other title: Computer forensics and investigations..Availability: Items available for loan: University of Macedonia LibraryCall number: QA76.9.A25G8155 2006 (2).

Software security : building security in / Gary McGraw.

by McGraw, Gary, 1966-.

Series: Addison-Wesley software security seriesMaterial type: Text Text; Format: print ; Literary form: Not fiction Publication details: Upper Saddle River, NJ : Addison-Wesley, c2006Online access: Table of contents Availability: Items available for loan: University of Macedonia LibraryCall number: QA76.9.A25M4286 2006 (1).

Protecting your PC / Ian Barile.

by Barile, Ian.

Series: Charles River Media general computing seriesMaterial type: Text Text; Format: print ; Literary form: Not fiction Publication details: Boston, Mass. : Charles River Meida, c2006Online access: Table of contents only Availability: Items available for loan: University of Macedonia LibraryCall number: QA76.9.A25B37734 2006 (1).

The security development lifecycle : SDL, a process for developing demonstrably more secure software / Michael Howard and Steve Lipner.

by Howard, Michael, 1965- | Lipner, Steve.

Series: Secure software development seriesMaterial type: Text Text; Format: print ; Literary form: Not fiction Publication details: Redmond, Wash. : Microsoft Press, c2006Other title: SDL : a process for developing demonstrably more secure software.Availability: Items available for loan: University of Macedonia LibraryCall number: QA76.76.D47H74 2006 (1).

European Union Digital Greece ESPA Default