KT34203 COMPUTER AND INFORMATION SECURITY

No.

Title

Item Location

Call Number

1 Pfleeger, C.P. 2012. Analyzing Computer Security: A Threat/Vulnerability/Countermeasure Approach. Prentice Hall.

 N/A

 N/A
2. Marian Quigley, ICT Ethics and Security in the 21st Century: New Developments and Applications, IGI Global, 2011.
  • Main Library General Collection
 T58.5. I38 2011
3 Gasser, M. Building a Secure Computer System , Van Nostrand Reinhold, 1988.   N/A  N/A
4 Viega, J. and McGraw, G. Building Secure Software : How to Avoid Security Problems the Right Way , Addison-Wesley, 2002
  • Main Library General Collection
  • LIC Stack
 QA76.76. D47V857 2002
5 George Curtis, The Law of Cybercrimes and Their Investigations, CRC Press, 2011.  
  • Main Library General Collection
 KF9350. C87 2012
6 E. Humphreys, “Security Management System Standard (Information Security & Privacy Series), Artech House, 2007 (ISBN: 9781596931725).  N/A  N/A