Welcome to Central Library, SUST

Your search returned 17 results.

Not what you expected? Check for suggestions
Sort
Results
1.
Web hacking : attacks and defense / Stuart McClure, Saumil Shah, Shreeraj Shah. by
  • McClure, Stuart
  • Shah, Saumil
  • Shah, Shreeraj
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Boston : Addison-Wesley, c2002
Availability: Items available for loan: Central Library, SUST (1)Call number: 004.6 MCW.

2.
Enhancing computer security with smart technology [electronic resource] / editor, V. Rao Vemuri. by
  • Vemuri, V. Rao
Material type: Text Text; Format: electronic ; Literary form: Not fiction
Publication details: Boca Raton, FL : Auerbach Publications, 2006
Online access:
Availability: No items available.

3.
Network anomaly detection : a machine learning perspective / Dhruba Kumar Bhattacharyya, Jugal Kumar Kalita. by
  • Bhattacharyya, Dhruba K [author.]
  • Kalita, Jugal Kumar [author.]
Material type: Text Text; Literary form: Not fiction
Online access:
Availability: No items available.

4.
Security and policy driven computing [electronic resource] / Lei Liu. by
  • Liu, Lei, 1968-
Material type: Text Text; Format: electronic ; Literary form: Not fiction
Publication details: Boca Raton, Fla. : CRC Press, c2011
Online access:
Availability: No items available.

5.
Data mining tools for malware detection [electronic resource] / Mehedy Masud, Latifur Khan and Bhavani Thuraisingham. by
  • Masud, Mehedy
  • Khan, Latifur
  • Thuraisingham, Bhavani M
Material type: Text Text; Format: electronic ; Literary form: Not fiction
Publication details: Boca Raton, Fla. : CRC Press, 2012
Online access:
Availability: No items available.

6.
Honeypot [electronic resource] : a new paradigm to information security / R.C. Joshi, Anjali Sardana. by
  • Joshi, R. C
  • Sardana, Anjali
Material type: Text Text; Format: electronic ; Literary form: Not fiction
Publication details: Enfield, N.H. : Science Publishers, 2011
Online access:
Availability: No items available.

7.
What every engineer should know about cyber security and digital forensics / Joanna F. DeFranco. by
  • DeFranco, Joanna F [author.]
Series:
Material type: Text Text; Literary form: Not fiction
Other title:
  • Cyber security and digital forensics
Online access:
Availability: No items available.

8.
What every engineer should know about cyber security and digital forensics / Joanna F. DeFranco. by
  • DeFranco, Joanna F [author.]
Series:
Material type: Text Text; Literary form: Not fiction
Other title:
  • Cyber security and digital forensics
Online access:
Availability: No items available.

9.
Cryptography and network security : principles and practice / William Stallings. by
  • Stallings, William
Edition: 2nd ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Upper Saddle River, N.J. : Prentice Hall, c2000
Availability: Items available for loan: Central Library, SUST (1)Call number: 005.8 STC.

10.
Understanding Bitcoin : Cryptography, Engineering and Economics / Pedro Franco. by
  • Franco, Pedro [author.]
Series: Wiley finance series
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publication details: Chichester, West Sussex : Wiley, 2015
Availability: No items available.

11.
Security intelligence : a practitioner's guide to solving enterprise security challenges / Qing Li, Gregory Clark. by
  • Li, Qing, 1971- [author.]
  • Clark, Gregory [author.]
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publisher: Indianapolis, IN : Wiley, 2015
Availability: No items available.

12.
Beyond cybersecurity : protecting your digital business / James M. Kaplan, Tucker Bailey, Chris Rezek, Derek O'Halloran, Alan Marcus. by
  • Kaplan, James M [author.]
  • Bailey, Tucker [author.]
  • Rezek, Chris [author.]
  • O'Halloran, Derek [author.]
  • Marcus, Alan [author.]
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publisher: Hoboken, New Jersey : Wiley, 2015
Availability: No items available.

13.
Network attacks and exploitation : a framework / Matthew Monte. by
  • Monte, Matthew [author.]
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publisher: Indianapolis, IN : Wiley, 2015Copyright date: ©2015
Other title:
  • Network attacks & exploitation
Availability: No items available.

14.
The network security test lab : a step-by-step guide / Michael Gregg. by
  • Gregg, Michael (Michael C.) [author.]
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publisher: Indianapolis, IN : Wiley, [2015]Copyright date: ©2015
Availability: No items available.

15.
The antivirus hacker's handbook / Joxean Koret, Elias Bachaalany. by
  • Koret, Joxean [author.]
  • Bachaalany, Elias [author.]
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publisher: Indianapolis, IN : John Wiley & Sons, Inc., [2015]Copyright date: ©2015
Availability: No items available.

16.
Engineering information security : the application of systems engineering concepts to achieve information assurance / Stuart Jacobs. by
  • Jacobs, Stuart [author.]
Series: IEEE Press series on information & communication networks security
Edition: Second edition.
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publisher: Piscataway, NJ : Hoboken, N.J. : IEEE Press ; Wiley, [2016]Copyright date: ©2016
Availability: No items available.

17.
Cryptography and network security : principles and practice / William Stallings. by
  • Stallings, William
Edition: 7th ed.
Material type: Text Text festschrift
Publication details: India : Pearson, c2017
Availability: Items available for loan: Central Library, SUST (5)Call number: 005.8 STC, ...

Pages