Your search returned 11 results.

Sort
Results
19 puntos críticos sobre seguridad de software : fallas de programación y cómo corregirlas / Michael Howard, David Leblanc, John Viega ; tr. Eloy Pineda Rojas.

by Howard, Michael, 1965- | Leblanc, David [coaut.] | Viega, John [coaut.].

Material type: Text Text; Literary form: Not fiction Publication details: México : McGraw-Hill Interamericana, c2007Availability: Items available for loan: 1 . Collection(s): Colección General Call number: QA76.9 A2.5 H6.2.

A prueba de hackers / Lars Klander ; tr. Carlos Anaya Alvarez.

by Klander, Lars.

Material type: Text Text; Literary form: Not fiction Publication details: Madrid : Anaya Multimedia, 1998Availability: Items available for loan: 2 . Collection(s): Colección General Call number: QA76.9 A2.5 K4.2.

Cómo protegernos de los peligros de internet / Gonzalo Alvarez Marañón.

by Alvarez Marañón, Gonzalo.

Series: ¿Qué sabemos de? ; 6Material type: Text Text; Literary form: Not fiction Publication details: Madrid : Los Libros de la Catarata : CSIC, 2009Availability: Items available for loan: 1 . Collection(s): Colección General Call number: HF5548.37 A4.2.

Delitos informáticos / Pablo Andrés Palazzi.

by Palazzi, Pablo Andrés.

Material type: Text Text; Literary form: Not fiction Publication details: Buenos Aires : ADHOC, 2000Availability: Items available for loan: 1 . Collection(s): Colección General Call number: KHA5582 P3.3.

Diseño de un sistema de gestión de seguridad de información : óptica ISO 27001:2005 / Alberto G. Alexander.

by Alexander, Alberto G.

Material type: Text Text; Literary form: Not fiction Publication details: Colombia : Alfaomega, 2007Availability: Items available for loan: 3 . Collection(s): Colección General Call number: T58.64 A4.2.

Firewall policies and VPN configurations / ed. Anne Henmi ; Mark Lucas ... [et al.].

by Henmi, Anne [ed.] | Lucas, Mark [coaut.].

Material type: Text Text; Literary form: Not fiction Publication details: Rockand, E.U.A. : Syngress, 2006Availability: Items available for loan: 1 . Collection(s): Colección General Call number: TK5105.59 F5.7.

Hacking Linux exposed / Brian Hatch, James Lee.

by Hatch, Brian | Lee, James, 1962- [coaut.].

Edition: 2nd. ed.Material type: Text Text; Literary form: Not fiction Publication details: New York : McGraw-Hill Osborne, c2003Availability: Items available for loan: 1 . Collection(s): Colección General Call number: QA76.76 O6.3 H3.3 2003.

Incident response & computer forensics / Chris Prosise, Kevin Mandia.

by Prosise, Chris | Mandia, Kevin [coaut.].

Edition: 2a ed.Material type: Text Text; Literary form: Not fiction Publication details: New York : McGraw-Hill, c2003Availability: Items available for loan: 1 . Collection(s): Colección General Call number: HV6773 P7.4 2003.

Penetration tester's open source toolkit / ed. Aaron W. Bayles.

by Bayles, Aaron W [ed.].

Material type: Text Text; Literary form: Not fiction Publication details: Burlington, EUA : Syngress, 2007Availability: Items available for loan: 1 . Collection(s): Colección General Call number: QA76.9 A2.5 P4.6.

Seguridad en centros de cómputo : políticas y procedimientos / Leronard H. Fine ; tr. Fernando Aldrete Bernal.

by Fine, Leonard H.

Edition: 2a ed.Material type: Text Text; Literary form: Not fiction Publication details: México : Trillas, 1990Availability: Items available for loan: 1 . Collection(s): Colección General Call number: HF5548.37 F5.6 1990.

Seguridad práctica en UNIX e Internet / Simson Garfinkel y Gene Spafford ; tr. Enrique Daltabuit Velázquez.

by Garfinkel, Simson | Spafford, Gene [coaut.].

Series: Seguridad en computadorasEdition: 2a ed.Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: México : McGraw Hill Interamericana, 1999Availability: Items available for loan: 1 . Collection(s): Colección General Call number: QA76.76 O6.3 G3.7 1999.

Pages