Applied Security Laboratory

Hands-on course on applied aspects of information security. Applied
information security, operating system security, OS hardening, computer forensics, web application security, project work, design, implementation, and configuration of security mechanisms, risk analysis, system review.

AVAILABLE
READING ROOM ONLY
NOT AVAILABLE
ONLINE VERSION
cover image

Security in computing

Charles P. Pfleeger, Shari Lawrence Pfleeger

Signature Year Rack/Shelf Lecture Return Date Status
Textbook.M.023.04.1 2007 8 / 4 Applied Security Laboratory Available
Textbook.M.023.04.2 2007 8 / 4 Applied Security Laboratory Available
Textbook.B.072.07.1 2007 6 / 1 Information Security Available
Textbook.B.072.07.2 2007 6 / 1 Information Security Available
IT.89.1 1989 Available
AVAILABLE
READING ROOM ONLY
NOT AVAILABLE
ONLINE VERSION
cover image

Hacking exposed web applications

Web application security secrets and solutions

Joel Scambray, Vincent Liu, Caleb Sima

Signature Year Rack/Shelf Lecture Return Date Status
Textbook.M.023.01.1 2011 8 / 4 Applied Security Laboratory Available
AVAILABLE
READING ROOM ONLY
NOT AVAILABLE
ONLINE VERSION
cover image

Unix power tools

Shelley Powers... [et al.]

Signature Year Rack/Shelf Lecture Return Date Status
Textbook.M.023.07.2 2003 8 / 4 Applied Security Laboratory Available
Textbook.M.023.07.1 2003 8 / 4 Applied Security Laboratory On-site use only
AVAILABLE
READING ROOM ONLY
NOT AVAILABLE
ONLINE VERSION
cover image

Practical UNIX and Internet security

Simson Garfinkel, Gene Spafford & Alan Schwartz

Signature Year Rack/Shelf Lecture Return Date Status
Textbook.M.023.06.1 2003 8 / 4 Applied Security Laboratory Available
Textbook.M.023.06.2 2003 8 / 4 Applied Security Laboratory Available
Textbook.M.023.06.3 2003 8 / 4 Applied Security Laboratory Available
Textbook.M.023.06.4 2003 8 / 4 Applied Security Laboratory Available
Textbook.M.023.06.5 2003 8 / 4 Applied Security Laboratory Available
AVAILABLE
READING ROOM ONLY
NOT AVAILABLE
cover image

Innocent code

A security wake-up call for Web programmers

Sverre H. Huseby

Signature Year Rack/Shelf Lecture Return Date Status
Textbook.M.023.05.1 2004 8 / 4 Applied Security Laboratory Available
Textbook.M.023.05.2 2004 8 / 4 Applied Security Laboratory Available
AVAILABLE
READING ROOM ONLY
NOT AVAILABLE
ONLINE VERSION
cover image

Computer networking

A top-down approach

James F. Kurose, University of Massachussetts, Amherst, Keith W. Ross, NYU and NYU Shanghai

Signature Year Rack/Shelf Lecture Return Date Status
Textbook.M.106.06.2 2017 10 / 3 Future Internet Available
Textbook.M.106.06.3 2017 10 / 3 Future Internet Available
Textbook.M.106.06.4 2017 10 / 3 Future Internet Available
Textbook.M.106.06.5 2017 10 / 3 Future Internet Available
Textbook.M.023.03.1 2017 8 / 4 Applied Security Laboratory Available
Textbook.M.023.03.2 2017 8 / 4 Applied Security Laboratory Available
Textbook.M.106.06.1 2017 10 / 3 Future Internet On-site use only
Textbook.M.023.09.1 2022 8 / 4 Applied Security Laboratory 2.4.2024 Unavailable
Textbook.B.178.01.2 2017 4 / 1 Computer Networks 15.4.2024 Unavailable
Textbook.B.178.01.5 2017 4 / 1 Computer Networks 15.4.2024 Unavailable
Textbook.M.023.03.3 2017 8 / 4 Applied Security Laboratory 23.4.2024 Unavailable
Textbook.B.178.01.3 2017 4 / 1 Computer Networks 2.5.2024 Unavailable
Textbook.B.178.01.1 2017 4 / 1 Computer Networks 6.5.2024 Unavailable
AVAILABLE
READING ROOM ONLY
NOT AVAILABLE
ONLINE VERSION
cover image

Applied information security

A hands-on approach

David Basin, Patrick Schaller, Michael Schläpfer

Signature Year Rack/Shelf Lecture Return Date Status
Textbook.M.023.02.1 2011 8 / 4 Applied Security Laboratory Available
doz.basin.2011.01.2 2011 Available
doz.basin.2011.01.1 2011 On-site use only
AVAILABLE
READING ROOM ONLY
NOT AVAILABLE
ONLINE VERSION
cover image

Essential system administration

Aeleen Frisch

Signature Year Rack/Shelf Lecture Return Date Status
Textbook.M.023.08.1 1995 8 / 4 Applied Security Laboratory Available