BU Library and Learning Space

Refine your search

Your search returned 173 results.

Sort
Results
Mac OS X security / Bruce Potter, Preston Norvell, Brian Wotring by Series: Voices that matter
Material type: Text Text; Literary form: Not fiction ; Audience: Specialized;
Publication details: Indianapolis, Ind. : New Riders, 2003
Availability: Items available for loan: BU Library and Learning Space (1)Call number: QA76.76 .O63 P677M.

Hacking Linux exposed : Linux security secrets & solutions / Brian Hatch, James Lee, George Kurtz by
Material type: Text Text; Literary form: Not fiction ; Audience: Specialized;
Publication details: New York, [N.Y.] : Osborne/McGraw-Hill, c2001
Availability: Items available for loan: BU Library and Learning Space (1)Call number: QA76.76 .O63 H372H.

Innocent code : a security wake-up call for Web programmers / Sverre H. Huseby by
Material type: Text Text; Literary form: Not fiction ; Audience: Specialized;
Publication details: Chichester : Wiley, c2004
Availability: Items available for loan: BU Library and Learning Space (2)Call number: QA76.9 .A25 H873I, ...

Complete book of remote access : connectivity and security / editor Victor Kasacavage by Series: The Auerbach best practices series
Material type: Text Text; Literary form: Not fiction ; Audience: Specialized;
Publication details: Boca Raton, Fla. : Auerbach, c2003
Availability: Items available for loan: BU Library and Learning Space (1)Call number: TK5105.597 C656.

Auditing and security : AS/400, NT, UNIX, networks, and disaster recovery plans / Yusufali F. Musaji by
Material type: Text Text; Literary form: Not fiction ; Audience: Specialized;
Publication details: New York, N.Y. : Wiley, c2001
Availability: Items available for loan: BU Library and Learning Space (1)Call number: QA76.9 .A93 M872A.

Cisco secure Internet security solutions / Andrew G. Mason, Mark J. Newcomb by Series: Cisco Press networking technologies series
Material type: Text Text; Literary form: Not fiction ; Audience: Specialized;
Publication details: Indianapolis, Ind. : Cisco Press, c2001
Availability: Items available for loan: BU Library and Learning Space (1)Call number: TK5105.59 M376C.

Complete guide to security and privacy metrics : measuring regulatory compliance, operational resilience, and ROI / Debra S. Herrmann. by
Material type: Text Text; Literary form: Not fiction ; Audience: Specialized;
Publication details: Boca Raton, Fla. : Auerbach Publications, c2007
Availability: Items available for loan: BU Library and Learning Space (1)Call number: TK 5102.85 H477C.

Auditing and security [electronic resource] : AS/400, NT, UNIX, networks, and disaster recovery plans / Yusufali F. Musaji. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New York, N.Y. : John Wiley, 2001
Online resources:
Availability: No items available.

Web 2.0 security : defending Ajax, RIA, and SOA / Shreeraj Shah by Series: Charles River Media Internet series
Material type: Text Text; Literary form: Not fiction ; Audience: Specialized;
Publication details: Boston, Mass. : Charles River Media, c2008
Availability: Items available for loan: BU Library and Learning Space (1)Call number: TK5105.59 S523W.

Hack attacks revealed : a complete reference for UNIX, Windows, and Linux with custom security toolkit / John Chirillo by
Edition: 2nd ed.
Material type: Text Text; Literary form: Not fiction ; Audience: Specialized;
Publication details: Indianapolis, Ind. : Wiley, c2002
Availability: Items available for loan: BU Library and Learning Space (1)Call number: QA76.9 .A25 C447H 2002.

Computer networking from LANs to WANs : hardware, software, and security / Kenneth C. Mansfield, Jr., James L. Antonakos by Series: Networking
Edition: International ed.
Material type: Text Text; Literary form: Not fiction ; Audience: Specialized;
Publication details: Australia : Course Technology, Cengage Learning, c2010
Availability: Items available for loan: BU Library and Learning Space (1)Call number: TK5105.5 M367C 2010.

Wireless security [electronic resource] : models, threats, and solutions / Randall K. Nichols, Panos C. Lekkas. by Series: McGraw-Hill telecom professional
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New York, N.Y. : McGraw-Hill, c2002
Online resources:
Availability: No items available.

Local area network management, design and security [electronic resource] : a practical approach / Arne Mikalsen and Per Borgesen by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Chichester : Wiley, c2002
Online resources:
Availability: No items available.

Multimedia security [electronic resource]: steganography and digital watermarking techniques for protection of intellectual property / Chun-Shien Lu. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Hershey PA : Idea Group Publishing, ©2005
Online resources:
Availability: No items available.

Real digital forensics : computer security and incident response / Keith J. Jones, Richard Bejtlich, Curtis W. Rose by
Material type: Text Text; Literary form: Not fiction ; Audience: Specialized;
Publication details: Upper Saddle River, N.J. : Addison-Wesley, c2006
Availability: Items available for loan: BU Library and Learning Space (1)Call number: HV8079 .C65 J663R.

Secure Data Science : integrating cyber security and data science / Bhavani Thuraisingham, Murat Kantarcioglu, and Latifur Khan by
Edition: First edition.
Material type: Text Text; Literary form: Not fiction ; Audience: Specialized;
Publisher: Boca Raton, Florida : CRC PRESS, 2022
Online resources:
Availability: No items available.

Securing the clicks : network security in the age of social media / Gary Bahadur, Jason Inasi, Alex de Carvalho. by
Material type: Text Text; Format: print ; Literary form: Not fiction ; Audience: Specialized;
Publication details: New York, N.Y. : McGraw-Hill, c2012
Availability: Items available for loan: BU Library and Learning Space (1)Call number: TK5105.59 B332S.

Mobility, security and web services : technologies and service-oriented architectures for a new era of IT solutions / by Gerhard Wiehler by
Material type: Text Text; Literary form: Not fiction ; Audience: Specialized;
Publication details: Erlangen : Publicis Corporate, c2004
Availability: Items available for loan: BU Library and Learning Space (1)Call number: HD30.2 W533M.

Shadow warfare : cyberwar policy in the United States, Russia, and China / Elizabeth Van Wie Davis. by Series: Security and Professional Intelligence Education Series (SPIES) ; 34
Material type: Text Text; Literary form: Not fiction ; Audience: Specialized;
Publisher: Lanham, Md. : Rowman & Littlefield, ©2021
Online resources:
Availability: No items available.

Enterprise information systems assurance and system security : managerial and technical issues / [edited by] Merrill Warkentin and Rayford B. Vaughn by
Material type: Text Text; Literary form: Not fiction ; Audience: Specialized;
Publication details: Hershey, Pa. : Idea Group, c2006
Availability: Items available for loan: BU Library and Learning Space (1)Call number: QA76.9 .A25 E573.

Library Opening Hours

Mon. - Sat. : 8:30 - 20:00

Public Holidays : Closed

Sun. : Closed

Contact Us

9/1 Moo 5, Surat Osathanugrah Library (Building C6), Phaholyothin Road, Klong Nueng, Klong Luang, Pathumthani 12120

Phone : 02-407-3888 ext. 2701

E-mail : [email protected]