|
|
Hack proofing Linux : a guide to open source security / James Stanger, Patrick T. Lane
by Stanger, James | Lane, Patrick T. Publisher: Rockland, Mass : Syngress, c2001Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 STA]
(1).
|
|
|
Intrusion signatures and analysis / Stephen Northcutt ... [et al.]
by Northcutt, Stephen. Edition: 1st ed.Publisher: Indianapolis, Ind. : New Riders, c2001Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 INT]
(1).
|
|
|
Maximum security : [a hacker's guide to protecting your internet site and network] / Anonymous Edition: 3rd ed.Publisher: Indianapolis, Ind. : Sams, c2001Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 MAX]
(2).
|
|
|
Maximum Linux security : [a hacker's guide to protecting your Linux server and workstation] / Anonymous
by Ray, John, 1971-. Edition: 2nd ed. / with revisions by John Ray.Publisher: Indianapolis, Ind. : Sams, c2001Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 MAX]
(1).
|
|
|
Multimedia security technologies for digital rights management / edited by Wenjun Zeng, Heather Yu, Ching-Yung Lin.
by Zeng, Wenjun, 1967- | Yu, Hong Heather, 1967- | Lin, Ching-Yung. Publisher: Boston : Academic Press, c2006Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 MUL]
(1).
|
|
|
Developer's guide to web application security / Michael Cross.
by Cross, Michael. Publisher: Rockland, Mass. : Syngress Publishing, c2007Other title: Web application security..Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 CRO]
(1).
|
|
|
Computer security : art and science / Matt Bishop
by Bishop, Matthew. Publisher: Boston, Mass. : Addison-Wesley, c2003Other title: Computer security.Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 BIS]
(1).
|
|
|
Hack attacks testing : how to conduct your own security audit / John Chirillo
by Chirillo, John, 1970-. Publisher: New York : Wiley, c2003Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 CHI]
(1).
|
|
|
Guide to computer forensics and investigation / Bill Nelson ... [et al.].
by Nelson, Bill. Publisher: Boston : Thomson/Course Technology, c2004Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 GUI]
(1).
|
|
|
Applied cryptography : protocols, algorithms, and source code in C / Bruce Schneier.
by Schneier, Bruce, 1963-. Edition: 2nd ed.Publisher: New York : Wiley, c1996Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.82 SCH]
(3).
|
|
|
Sams teach yourself Linux Security basics in 24 hours / Aron Hsiao.
by Hsiao, Aron. Publisher: Indianapolis, IN : Sams, c2001Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 HSI]
(1).
|