KT34203 COMPUTER AND INFORMATION SECURITY
No. |
Title |
Item Location |
Call Number |
1 | Pfleeger, C.P. 2012. Analyzing Computer Security: A Threat/Vulnerability/Countermeasure Approach. Prentice Hall. |
N/A |
N/A |
2. | Marian Quigley, ICT Ethics and Security in the 21st Century: New Developments and Applications, IGI Global, 2011. |
|
T58.5. I38 2011 |
3 | Gasser, M. Building a Secure Computer System , Van Nostrand Reinhold, 1988. | N/A | N/A |
4 | Viega, J. and McGraw, G. Building Secure Software : How to Avoid Security Problems the Right Way , Addison-Wesley, 2002 |
|
QA76.76. D47V857 2002 |
5 | George Curtis, The Law of Cybercrimes and Their Investigations, CRC Press, 2011. |
|
KF9350. C87 2012 |
6 | E. Humphreys, “Security Management System Standard (Information Security & Privacy Series), Artech House, 2007 (ISBN: 9781596931725). | N/A | N/A |