|
|
The fiancée caper / Maureen Child.
by Child, Maureen. Publisher: Don Mills, Ontario : Harlequin Enterprises Limited, [2014]Copyright date: ©2014Availability: Items available for loan: Taylor's Library-TU
[Call number: 813.54 CHI 2014]
(1).
|
|
|
Data-driven security : analysis, visualization and dashboards / Jay Jacobs + Bob Rudis.
by Jacobs, Jay (Data analyst) | Rudis, Bob. Edition: 1st edition.Publisher: Indianapolis, IN : John Wiley & Sons Inc., [2014]Copyright date: ©2014Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 JAC 2014]
(1).
|
|
|
Anti-hacker tool kit / Mike Shema.
by Shema, Mike. Edition: Fourth edition.Publisher: New York : McGraw-Hill Education, [2014]Copyright date: ©2014Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 SHE 2014]
(1).
|
|
|
Android hacker's handbook / Joshua J. Drake [and five others].
by Drake, Joshua J. Publisher: Indiana, IN : John Wiley & Sons, Inc., [2014]Copyright date: ©2014Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 DRA 2014]
(1).
|
|
|
Network security through data analysis : building situational awareness / Michael Collins.
by Collins, Michael (Michael S.). Edition: First edition.Publisher: Sebastopol, CA : O'Reilly, [2014]Copyright date: ©2014Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 COL 2014]
(1).
|
|
|
Ethical hacking and penetration testing guide / Rafay Baloch.
by Baloch, Rafay. Publisher: Boca Raton : CRC Press, 2014Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 BAL 2014]
(1).
|
|
|
Penetration testing : a hands-on introduction to hacking / by Georgia Weidman.
by Weidman, Georgia. Publisher: San Francisco : No Starch Press, [2014]Copyright date: ©2014Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8092 WEI 2014]
(1).
|
|
|
Cyber attack : the truth about digital crime, cyber warfare and goverment snooping / Paul Day.
by Day, Paul (Computer security expert). Publisher: London : Carlton Books, 2014Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 DAY 2014]
(1).
|
|
|
Security for multihop wireless networks / [edited by] Shafiullah Khan and Jaime Lloret Mauri.
by Khan, Shafiullah | Lloret Mauri, Jaime. Publisher: Boca Raton, FL : CRC Press, Taylor & Francis Group, [2014]Copyright date: ©2014Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 SEC 2014]
(1).
|
|
|
Secure data provenance and inference control with semantic web / Bhavani Thuraisingham, Tyrone Cadenhead, Murat Kantarcioglu, Vaibhav Khadilkar.
by Thuraisingham, Bhavani M | Cadenhead, Tyrone | Kantarcioglu, Murat | Khadilkar, Vaibhav. Publisher: Boca Raton : CRC Press, Taylor & Francis Group, [2015]Copyright date: ©2015Availability: Items available for loan: Taylor's Library-TU
[Call number: 025.0427028558 THU 2015]
(1).
|
|
|
The secure information society [electronic resource] : ethical, legal and political challenges / Jörg Krüger, Bertram Nickolay, Sandro Gaycken, editors.
by Krüger, Jörg | Nickolay, Bertram | Gaycken, Sandro, 1973-. Publisher: London ; New York : Springer, c2013Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for reference: Taylor's Library-TU
[Call number: 005.8]
(1).
|
|
|
The way of the knife : the CIA, a secret army, and a war at the ends of the Earth / Mark Mazzetti.
by Mazzetti, Mark. Publisher: New York : Penguin Books, 2014Copyright date: ©2013Availability: Items available for loan: Taylor's Library-TU
[Call number: 356.160973 MAZ 2014]
(1).
|
|
|
Cybersecurity and cyberwar : what everyone needs to know / Peter W. Singer, Allan Friedman.
by Singer, P. W. (Peter Warren) | Friedman, Allan. Publisher: New York : Oxford University Press, USA, [2014]Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for reference: Taylor's Library-TU
[Call number: 005.8]
(1).
|
|
|
Data security, data mining and data management : technologies and challenges / Serge O'Byrne, editor.
by O'Byrne, Serge [editor of compilation.]. Publisher: [Hauppauge] New York : Novinka, [2013]Copyright date: ©2013Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for reference: Taylor's Library-TU
[Call number: 005.8]
(1).
|
|
|
Intelligent systems for security informatics [electronic resource] / Christopher C. Yang ... [et al.].
by Yang, Christopher C. Publisher: Oxford ; Waltham, MA : Academic Press, c2013Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for reference: Taylor's Library-TU
[Call number: 005.8]
(1).
|
|
|
Theory and practice of cryptography solutions for secure information systems [electronic resource] / Atilla Elci, Josef Pieprzyk, Alexander G. Chefranov, Mehmet A. Orgun, Huaxiong Wang and Rajan Shankaran, editors.
by Elçi, Atilla [editor of compilation.]. Publisher: Hershey, PA : Information Science Reference, 2013Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for reference: Taylor's Library-TU
[Call number: 005.8]
(1).
|
|
|
Security engineering for cloud computing [electronic resource] : approaches and tools / David G. Rosado, Daniel Mellado, Eduardo Fernandez-Medina, and Mario Piattini, editors.
by Rosado, David G, 1977- | IGI Global. Publisher: Hershey, Pa. : IGI Global (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA), ©2013Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for reference: Taylor's Library-TU
[Call number: 005.8]
(1).
|
|
|
IT security governance innovations [electronic resource] : theory and research / Daniel Mellado ... [et al.], editors.
by Mellado, Daniel, 1980-. Publisher: Hershey, Pa. : Information Science Reference, 2013Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for reference: Taylor's Library-TU
[Call number: 005.8]
(1).
|
|
|
Image encryption : a communication perspective / Fathi E. Abd El-Samie,Hossam Eldin H. Ahmed,Ibrahim F. Elashry,Mai H. Shahieen,Osama S. Faragallah, El-Sayed M. El-Rabaie,Saleh A. Alshebeili.
by Abd el-Samie, Fathi E. Publisher: Boca Raton, [Florida] : CRC Press, [2013]Copyright date: ©2014Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for reference: Taylor's Library-TU
[Call number: 006.6]
(1).
|
|
|
Trustworthy execution on mobile devices / Amit Vasudevan, Jonathan M. McCune, James Newsome.
by Vasudevan, Amit [author.] | McCune, Jonathan M [author.] | Newsome, James [author.]. Publisher: New York, NY : Springer, [2013?]Copyright date: ©2014Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for reference: Taylor's Library-TU
[Call number: 005.8]
(1).
|