|
|
Securing PHP web applications / Tricia Ballad, William Ballad.
by Ballad, Tricia | Ballad, Bill. Publisher: Upper Saddle River, NJ : Addison-Wesley, c2009Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 BAL 2009]
(2).
|
|
|
Information security : theory and practice / Dhiren R. Patel.
by Patel, Dhiren R. Publisher: New Delhi : Prentice-Hall of India Private Limited, c2008Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 INF 2008]
(1).
|
|
|
Hacking exposed computer forensics / Aaron Philipp, David Cowen, Chris Davis.
by Philipp, Aaron | Cowen, David | Davis, Chris (Christopher Michael). Edition: 2nd ed.Publisher: New York : McGraw-Hill, c2010Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 PHI 2010]
(2).
|
|
|
Hacking exposed Linux : Linux security secrets & solutions / ISECOM.
by ISECOM (Organization). Edition: 3rd ed.Publisher: New York : McGraw-Hill, c2008Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 HAC 2008]
(1).
|
|
|
Mobile application security / Himanshu Dwivedi, Chris Clark, David Thiel.
by Dwivedi, Himanshu | Clark, Chris, 1980- | Thiel, David V. Publisher: New York : McGraw-Hill, c2010Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 DWI 2010]
(2).
|
|
|
Principles of computer security : CompTIA security+ and beyond / Wm. Arthur Conklin ... [et al.].
by Conklin, Wm. Arthur (William Arthur). Edition: 2nd ed.Publisher: New York : McGraw-Hill, c2010Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 PRI 2010]
(4).
|
|
|
Internet security : hacking, counterhacking, and society / [edited by] Kenneth Einar Himma.
by Himma, Kenneth Einar. Publisher: Sudbury, Mass. : Jones and Bartlett Publishers, c2007Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 INT 2007]
(1).
|
|
|
Modelling cyber security : approaches, methodology, strategies / edited by Umberto Gori.
by NATO Advanced Research Workshop on Operational Network Intelligence: Today and Tomorrow (2009 Venice, Italy). Publisher: Amsterdam : IOS Press, c2009Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 NAT 2009]
(1).
|
|
|
Network intrusion detection and prevention : concepts and techniques / Ali A. Ghorbani, Wei Lu, Mahbod Tavallaee.
by Ghorbani, Ali, 1954- | Lu, Wei, 1980- | Tavallaee, Mahbod. Publisher: New York : Springer, c2010Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 GHO 2010]
(1).
|
|
|
Securing wireless communications at the physical layer / Ruoheng Liu, Wade Trappe, editors.
by Liu, Ruoheng | Trappe, Wade. Publisher: New York ; Dordrecht : Springer, c2010Availability: Items available for loan: Taylor's Library-TU
[Call number: 621.384 SEC 2010]
(1).
|
|
|
Advances in security technology : International Conference, SecTech 2008, and Its Special Sessions, Sanya, Hainan Island, China, December 13-15, 2008. Revised Selected Papers / Haeng-Kon Kim, Tai-Hoon Kim, Akingbehin Kiumi (eds.)
by SecTech 2008 (2008 : Sanya Shi, China) | Kim, Haeng-Kon | Kim, Tai-hoon | Kiumi, Akingbehin. Publisher: Berlin : Springer, c2009Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 SEC 2009]
(1).
|
|
|
Cryptology and network security : 8th international conference, CANS 2009, Kanazawa, Japan, December 12-14, 2009 : proceedings / Juan A. Garay, Atsuko Miyaji, Akira Otsuka (eds.)
by International Conference on Cryptology and Network Security (8th : 2009 : Kanazawa-shi, Japan) | Garay, Juan A | Miyaji, Atsuko | Otsuka, Akira. Publisher: Berlin : Springer-Verlag, c2009Other title: CANS 2009..Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 INT 2009]
(1).
|
|
|
Security and cooperation in wireless networks : thwarting malicious and selfish behavior in the age of ubiquitous computing / Levente Buttyán, Jean-Pierre Hubaux.
by Buttyán, Levente | Hubaux, Jean-Pierre. Publisher: Cambridge : Cambridge University Press, 2008Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 BUT 2008]
(1).
|
|
|
Security and quality of service in ad hoc wireless networks / Amitabh Mishra.
by Mishra, Amitabh M. Publisher: Cambridge, UK ; New York : Cambridge University Press, 2008Availability: Items available for loan: Taylor's Library-TU
[Call number: 621.3821 MIS 2008]
(1).
|
|
|
Is there a new Cold War? / Stefan Kiesbye, book editor.
by Kiesbye, Stefan. Publisher: Farmington Hills, MI : Greenhaven Press/Gale Cengage Learning, c2010Availability: Items available for loan: Taylor's Library-TU
[Call number: 327.73047 IST 2010]
(1).
|
|
|
CompTIA security+ deluxe study guide / Emmett Dulaney.
by Dulaney, Emmett A. Edition: 2nd ed.Publisher: Indianapolis : Wiley, c2011Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 DUL 2011]
(2).
|
|
|
Risk analysis and security countermeasure selection / Thomas L. Norman.
by Norman, Thomas L. Publisher: Boca Raton, FL : CRC Press, 2010Availability: Items available for loan: Taylor's Library-TU
[Call number: 658.47 NOR 2010]
(1).
|
|
|
Intelligence cooperation and the war on terror : Anglo-American security relations after 9/11 / Adam D.M. Svendsen.
by Svendsen, Adam D.M. Publisher: Abingdon, Oxon ; New York : Routledge, c2010Availability: Items available for loan: Taylor's Library-TU
[Call number: 363.325163 SVE 2010]
(1).
|
|
|
Distributed systems security : issues, processes and solutions / by Abhijit Belapurkar ... [et al.].
by Belapurkar, Abhijit. Publisher: Hoboken, NJ : John Wiley, c2009Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 DIS 2009]
(1).
|
|
|
Exploiting online games : cheating massively distributed systems / Greg Hoglund, Gary McGraw.
by Hoglund, Greg | McGraw, Gary, 1966-. Publisher: Upper Saddle River, NJ : Addison-Wesley, c2008Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 HOG 2008]
(1).
|