|
|
Disappearing cryptography : information hiding : steganography & watermarking / Peter Wayner.
by Wayner, Peter, 1964-. Edition: 3rd ed.Publisher: Burlington, MA : Elsevier/Morgan Kaufmann, c2009Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.82 WAY 2009]
(1).
|
|
|
Cloud computing technologies for green enterprises / Kashif Munir, editor.
by Munir, Kashif, 1976- [editor.]. Publisher: Hershey, PA : Business Science Reference, [2018]Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for reference: Taylor's Library-TU
[Call number: 004.67/82]
(1).
|
|
|
Cryptography for dummies / by Chey Cobb.
by Cobb, Chey. Publisher: Indianapolis, IN : Wiley Pub., c2004Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.82 COB 2004]
(1).
|
|
|
Internet forensics / Robert Jones.
by Jones, Robert. Publisher: Sebastopol, CA : O'Reilly, c2006Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 JON 2006]
(1).
|
|
|
Security sector reform and post-conflict peacebuilding [electronic resource] / edited by Albrecht Schnabel and Hans-Georg Ehrhart.
by Schnabel, Albrecht | Ehrhart, Hans-Georg, 1955-. Publisher: Tokyo : Bristol : United Nations University Press ; University Presses Marketing [distributor], 2005Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan:
[Call number: 327.172]
(1).
|
|
|
Digital forensics for network, Internet, and cloud computing : a forensic evidence guide for moving targets and data / Terrence V. Lillard ... [et al.] ; technical editor, Jim Murray.
by Lillard, Terrence. Publisher: Burlington, MA : Elsevier/Syngress, c2010Availability: Items available for loan: Taylor's Library-TU
[Call number: 363.25968 GAR 2010]
(1).
|
|
|
Virtualization and forensics : a digital forensic investigator's guide to virtual environments / Diane Barrett, Gregory Kipper.
by Barrett, Diane | Kipper, Gregory. Publisher: Burlington, MA : Elsevier/Syngress, c2010Availability: Items available for loan: Taylor's Library-TU
[Call number: 363.25968 BAR 2010]
(1).
|
|
|
The art of software security assessment : identifying and preventing software vulnerabilities / Mark Dowd, John McDonald, Justin Schuh.
by Dowd, Mark | McDonald, John, 1977- | Schuh, Justin. Publisher: Upper Saddle River, NJ : Addison-Wesley, c2007Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 DOW 2007]
(1).
|
|
|
The security risk assessment handbook : a complete guide for performing security risk assessments / Douglas J. Landoll.
by Landoll, Douglas J. Publisher: Boca Raton, FL : Auerbach Pub., 2006Availability: Items available for loan: Taylor's Library-TU
[Call number: 658.47 LAN 2006]
(1).
|
|
|
The management of network security : technology, design, and management control / Houston H. Carr, Charles A. Snyder, and Bliss N. Bailey.
by Carr, Houston H, 1937- | Snyder, Charles A | Bailey, Bliss N. Publisher: Upper Saddle River, N.J. : Prentice Hall, c2010Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 CAR 2010]
(1).
|
|
|
Network security assessment / Chris McNab.
by McNab, Chris (Chris R.), 1980-. Edition: 2nd ed.Publisher: Sebastopol, Calif. : O'Reilly, c2008Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 MAC 2008]
(1).
|
|
|
Introduction to network security / Douglas Jacobson.
by Jacobson, Douglas. Publisher: Boca Raton : CRC Press, c2009Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 JAC 2009]
(1).
|
|
|
Computer security basics / Rick Lehtinen, Deborah Russell and G.T. Gangemi, Sr.
by Lehtinen, Rick | Russell, Deborah | Gangemi, G. T | Russell, Deborah. Computer security basics. Edition: 2nd ed.Publisher: Sebastopol, CA : O'Reilly, c2006Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 LEH 2006]
(1).
|
|
|
Security in computing / Charles P. Pfleeger, Shari Lawrence Pfleeger.
by Pfleeger, Charles P, 1948- | Pfleeger, Shari Lawrence. Edition: 4th ed.Publisher: Upper Saddle River, NJ : Prentice Hall, c2007Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 PFL 2007]
(1).
|
|
|
Hardware-based computer security techniques to defeat hackers : from biometrics to quantum cryptography / Roger Dube.
by Dube, Roger. Publisher: Hoboken, N.J. : John Wiley, c2008Other title: Computer security techniques to defeat hackers.Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 DUB 2008]
(1).
|
|
|
China's techno-warriors [electronic resource] : national security and strategic competition from the nuclear to the information age / Evan A. Feigenbaum.
by Feigenbaum, Evan A, 1969- | ebrary, Inc. Publisher: Stanford, Calif. : Stanford University Press, 2003Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan:
[Call number: 355/.033051]
(1).
|