discover universiti teknologi brunei library

Your search returned 52 results.

Sort
Results
Computer security handbook / Richard H. Baker [Books].

by Baker, Richard H [author].

Edition: 2nd editionMaterial type: Text Text; Format: print ; Audience: General; Publication details: Blue Ridge Summit, PA : TAB Professional and Reference Books ; ©1991Availability: Items available for loan: Universiti Teknologi Brunei Library (1)Call number: QA76.9 BAK 1991 c.1.

Corporate computer and network security / Raymond R. Panko [Books].

by Panko, Raymond R [author].

Edition: International editionMaterial type: Text Text; Format: print ; Audience: General; Publication details: Upper Saddle River, New Jersey : Pearson Prentice Hall ; ©2004Availability: Items available for loan: Universiti Teknologi Brunei Library (3)Call number: QA76.9 PAN 2004 c.3, ...

Data & computer security : dictionary of standards, concepts, and terms / Dennis Longley [Books].

by Longley, Dennis [author] | Shain, Michael [author].

Material type: Text Text; Format: print ; Audience: General; Publication details: New York, N.Y. : Stockton Press/Macmillan Publishers Ltd. ; ©1987Availability: Items available for loan: Universiti Teknologi Brunei Library (1)Call number: QA76.9 LON 1987 c.1.

Designing information systems security / Richard Baskerville [Books].

by Baskerville, Richard [author].

Material type: Text Text; Format: print ; Audience: General; Publication details: Chichester [England] : John Wiley & Sons Ltd. ; ©1988Availability: Not available: Universiti Teknologi Brunei Library: Checked out (1).

Computational intelligence in information systems : Proceedings of the Fourth INNS Symposia Series on Computational Intelligence in Information Systems (INNS-CIIS 2014) / [edited by] Somnuk Phon- Amnuaisuk, Thien Wan Au.

Series: Advances in intelligent systems and computing ; 331Edition: 1st edition.Material type: Text Text; Format: print ; Literary form: Not fiction ; Audience: General; Publication details: New York : Springer, 2014Online access: Publisher description | Table of contents only Availability: Items available for loan: Universiti Teknologi Brunei Library (5)Call number: Q342 COM c.5, ... Items available for reference: Universiti Teknologi Brunei Library: Not for loan (1)Call number: Q342 COM c.1.

Mastering network security / Chris Brenton [Book].

by Brenton, Chris [author].

Material type: Text Text; Format: print ; Literary form: Not fiction ; Audience: General; Publication details: San Francisco, California : SYBEX Inc. ; ©1999Online access: Contributor biographical information | Publisher description | Table of contents only Availability: Items available for loan: Universiti Teknologi Brunei Library (1)Call number: QA76.9 BRE 1999 c.1.

Information security risk analysis / Thomas R. Peltier [Books].

by Peltier, Thomas R [author].

Edition: 2nd editionMaterial type: Text Text; Format: print ; Audience: General; Publication details: Boca Raton, Florida : Auerbach Publications ; ©2005Online access: Publisher description Availability: Items available for loan: Universiti Teknologi Brunei Library (1)Call number: QA76.9 PEL 2005 c.1.

Insider computer fraud : an in-depth framework for detecting and defending against insider IT attacks / Kenneth C. Brancik [Books].

by Brancik, Kenneth C [author].

Material type: Text Text; Format: print ; Audience: General; Publication details: Boca Raton, Florida : Auerbach Publications, Taylor & Francis Group ; ©2008Online access: Table of contents only Availability: Items available for loan: Universiti Teknologi Brunei Library (1)Call number: QA76.9 BRA 2008 c.1.

Network security essentials : applications and standards / William Stallings.

by Stallings, William.

Edition: 2nd ed.Material type: Text Text; Format: print ; Literary form: Not fiction ; Audience: General; Publication details: Upper Saddle River ; New Jersey Prentice Hall, 2003Availability: Items available for loan: Universiti Teknologi Brunei Library (1)Call number: TK5105.595 STA c.1.

Managed code rootkits : hooking into runtime environments / Erez Metula [Book].

by Metula, Erez [author].

Material type: Text Text; Format: print ; Literary form: Not fiction ; Audience: Primary; Publication details: Burlington, Massachusetts : Syngress ; ©2011Availability: Items available for loan: Universiti Teknologi Brunei Library (1)Call number: QA76.9 MET 2011 c.1.

SQL injection attacks and defense / Justin Clarke [Book].

by Clarke, Justin [Lead author / technical editor] | Alvarez, Rodrigo Marcos [author] | Hartley, Dave [author] | Hemler, Joseph [author].

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Burlington, Massachusetts : Syngress Publishing, Inc. ; ©2009Availability: Items available for loan: Universiti Teknologi Brunei Library (1)Call number: QA76.9 SQL 2009 c.1.

Reversing : : secrets of reverse engineering Eldad Eilam ; [foreword by Elliot Chikofsky].

by Eilam, Eldad | Chikofsky, Elliot J.

Material type: Text Text; Format: print ; Literary form: Not fiction ; Audience: Specialized; Publication details: Indianapolis, IN : Wiley, 2005Availability: Items available for loan: Universiti Teknologi Brunei Library (1)Call number: QA76.758 EIL c.1.

Microsoft® Windows server 2008 security resource kit

by Johansson, Jesper M.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Redmond, Wash. : Microsoft Press, 2008Other title: Security resource kit | Windows server 2008 | Windows server 2008 security.Availability: Items available for loan: Universiti Teknologi Brunei Library (1)Call number: QA76.76 JOH c.1.

Web application obfuscation : -/WAFs..Evasion..Filters//alert (/Obfuscation/)-

by Heiderich, Mario.

Material type: Text Text; Format: print ; Literary form: Not fiction ; Audience: Primary; Publication details: Amsterdam ; Boston : Elsevier/Syngress, 2011Availability: Items available for loan: Universiti Teknologi Brunei Library (1)Call number: QA76.625 HEI c.1.

Management of information security / Michael E. Whitman, Herbert J. Mattord.

by Whitman, Michael E, 1964- [author.] | Mattford, Herbert J [author.].

Edition: Sixth edition.Material type: Text Text; Format: print Publication details: Boston, Massachusetts : Cengage Learning, [2019]Availability: Items available for loan: Universiti Teknologi Brunei Library (2)Call number: TK5105.59 WHI c.2, ...

Computer & internet security : a hands-on approach/ Wenliang Du

by DU, Wenliang [author.].

Edition: Second editionMaterial type: Text Text; Format: print ; Literary form: Not fiction ; Audience: General; Publication details: [Place of publication not identified] : [Publisher not identified], 2019Availability: Items available for loan: Universiti Teknologi Brunei Library (1)Call number: TK5105.875 2019 DU c. 2.

Computer security : principles and practice / William Stallings [Book].

by Stallings, William [author] | Brown, Lawrie [author].

Edition: 4th EditionMaterial type: Text Text; Format: print ; Literary form: Not fiction Publication details: Upper Saddle River, New Jersey : Pearson Education, Inc. ; ©2018Availability: Items available for loan: Universiti Teknologi Brunei Library (3)Call number: QA76.9 STA 2018 c.1, ...

Computer security : principles and practice / William Stallings, Lawrie Brown, UNSW Canberra at the Australian Defence Force Academy.

by Stallings, William [author.] | Brown, Lawrie [author.].

Edition: Fourth Edition.Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: New York, NY : Pearson, [2018]Availability: Items available for loan: Universiti Teknologi Brunei Library (1)Call number: QA76.9 STA 2018 c. 1.

IT auditing : using controls to protect information assets / Mike Kegerreis, Mike Schiller, Chris Davis, with Brian Wrozek.

by Kegerreis, Mike [author.] | Schiller, Mike [author.] | Davis, Chris (Christopher Michael) [author.] | Wrozek, Brian [author.].

Edition: Third edition.Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: [New York] : McGraw-Hill Education, 2020Other title: Information technology auditing.Online access: Click here to access online Availability: Items available for loan: Universiti Teknologi Brunei Library (2)Call number: QA76.9 DAV 2020 c. 1, ...
Lists:

Effective cybersecurity : understanding and using standards and best practices / William Stallings.

by Stallings, William [author.].

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Upper Saddle River, NJ: Addison-Wesley, 2019Other title: Effective cybersecurity: a guide to using best practices and standards.Availability: Items available for loan: Universiti Teknologi Brunei Library (1)Call number: TK5105.59 STA 2019 c.1.

Pages

library opening hours

24/7 study area

Friday Open 24 hours (Closed during Friday Prayers from 11.30am to 2.30pm)