|
|
Applied information security : a hands-on approach / David Basin, Patrick Schaller, Michael Schläpfer.
by Basin, David | Schaller, Patrick | Schläpfer, Michael. Publisher: Heidelberg : Springer, 2011Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 BAS 2011]
(1).
|
|
|
Information security : a practical approach / S.M. Bhaskar, S.I. Ahson.
by Bhaskar, S. M | Ahson, S. I. Publisher: Oxford : Alpha Science Int., c2008Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 BHA 2008]
(1).
|
|
|
Moodle security : learn how to install and configure Moodle in the most secure way possible / Darko Miletić.
by Miletić, Darko. Publisher: Birmingham, U.K. : Packt Publishing, c2011Availability: Items available for loan: Taylor's Library-TU
[Call number: 371.334 MIL 2011]
(1).
|
|
|
Web commerce security : design and development / Hadi Nahari, Ronald L. Krutz.
by Nahari, Hadi | Krutz, Ronald L. Publisher: Indianapolis : John Wiley, c2011Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 NAH 2011]
(1).
|
|
|
The security risk assessment handbook : a complete guide for performing security risk assessments / Douglas Landoll.
by Landoll, Douglas J. Edition: 2nd ed.Publisher: Boca Raton, FL : CRC Press, 2011Availability: Items available for loan: Taylor's Library-TU
[Call number: 658.47 LAN 2011]
(1).
|
|
|
Security de-engineering : solving the problems in information risk management / Ian Tibble.
by Tibble, Ian. Publisher: Boca Raton, FL : CRC Press, c2012Availability: Items available for loan: Taylor's Library-TU
[Call number: 658.478 TIB 2012]
(1).
|
|
|
Computer forensics and cyber crime : an introduction / Marjie T. Britz.
by Britz, Marjie [author.]. Edition: Third Edition.Publisher: Boston : Pearson, [2013]Copyright date: ©2013Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 BRI 2013]
(1).
|
|
|
Cybersecurity : the essential body of knowledge / Dan Shoemaker, Wm. Arthur Conklin.
by Shoemaker, Dan | Conklin, Wm. Arthur (William Arthur). Publisher: Boston, MA : Course Technology, Cengage Learning, c2012Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 SHO 2012]
(1).
|
|
|
Management of information security / Michael Whitman, Herbert Mattord.
by Whitman, Michael E, 1964- | Mattord, Herbert J. Edition: 2nd ed.Publisher: Boston, MA : Course Technology, Cengage Learning, c2008Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 WHI 2008]
(1).
|
|
|
Security engineering : a guide to building dependable distributed systems / Ross J. Anderson.
by Anderson, Ross, 1956-. Edition: 2nd ed.Publisher: Indianapolis, IN : Wiley, c2008Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 AND 2008]
(5).
|
|
|
Cryptography and network security : principles and practice / William Stallings.
by Stallings, William. Edition: 7th ed.Publisher: Boston, MA : Pearson, c2014Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 STA 2014]
(2).
|
|
|
Secure software design / Theodor Richardson, Charles N. Thies.
by Richardson, Theodor | Thies, Charles. Publisher: Burlington, MA : Jones & Bartlett Learning, c2013Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 RIC 2013]
(1).
|
|
|
Data-driven security : analysis, visualization and dashboards / Jay Jacobs + Bob Rudis.
by Jacobs, Jay (Data analyst) | Rudis, Bob. Edition: 1st edition.Publisher: Indianapolis, IN : John Wiley & Sons Inc., [2014]Copyright date: ©2014Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 JAC 2014]
(1).
|
|
|
Android hacker's handbook / Joshua J. Drake [and five others].
by Drake, Joshua J. Publisher: Indiana, IN : John Wiley & Sons, Inc., [2014]Copyright date: ©2014Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 DRA 2014]
(1).
|
|
|
Cyber attack : the truth about digital crime, cyber warfare and goverment snooping / Paul Day.
by Day, Paul (Computer security expert). Publisher: London : Carlton Books, 2014Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 DAY 2014]
(1).
|
|
|
Management of information security / Michael E. Whitman, Herbert J. Mattord.
by Whitman, Michael E, 1964- | Mattord, Herbert J. Edition: Fourth edition.Publisher: Stamford, CT : Cengage Learning, [2014]Copyright date: ©2014Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 WHI 2014]
(2).
|
|
|
IT governance : an international guide to data security and ISO27001/ISO27002 / Alan Calder and Steve Watkins.
by Calder, Alan, 1957- | Watkins, Steve, 1970-. Edition: Fifth edition.Publisher: London ; Philadelphia : Kogan Page, 2012Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 CAL 2012]
(2).
|
|
|
Incident response & computer forensics / Jason T. Luttgens, Matthew Pepe, and Kevin Mandia.
by Pepe, Matthew. Edition: Third edition.Publisher: New York : McGraw-Hill Education, [2014]Copyright date: ©2014Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 PEP 2014]
(3).
|
|
|
Cyber security essentials / edited by James Graham, Richard Howard, and Ryan Olson.
by Graham, James (James J.) | Howard, Richard, 1959- | Olson, Ryan, 1981-. Publisher: Boca Raton, FL : CRC Press/Auerbach Publications, 2011Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 CYB 2011]
(1).
|
|
|
Security in computing / Charles P. Pfleeger
by Pfleeger, Charles P, 1948-. Edition: 2nd ed.Publisher: Upper Saddle River, N. J. : Prentice Hall, 1997Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 PFL]
(1), TC External Storage
[Call number: 005.8 PFL]
(1).
|