Your search returned 342 results.

Not what you expected? Check for suggestions
|
Hands on hacking / Matthew Hickey with Jennifer Arcuri.

by Hickey, Matthew (Computer security expert) [author.] | Arcuri, Jennifer [author.].

Publisher: Indianapolis, Indiana : John Wiley & Sons, Inc., [2020]Availability: Items available for loan: Taylor's Library-TU [Call number: 005.87 HIC 2020] (1).
The web application hacker's handbook [electronic resource] : finding and exploiting security flaws / Dafydd Stuttard, Marcus Pinto.

by Stuttard, Dafydd | Pinto, Marcus | ebrary, Inc.

Edition: 2nd ed.Publisher: Indianapolis : Wiley, 2011Online access: An electronic book accessible through the World Wide Web; click to view Availability: No items available
The Cloud [electronic resource] : understanding the security, privacy and trust challenges / Neil Robinson, ... [et al.].

by Robinson, Neil, 1964- | ebrary, Inc | Rand Corporation | European Commission. Information Society DG.

Publisher: Santa Monica : Rand, 2011Online access: An electronic book accessible through the World Wide Web; click to view Availability: No items available
How to cheat at Configuring ISA Server 2004 [electronic resource] / Dr. Thomas W. Shinder.

by Shinder, Dr. Thomas W | ebrary, Inc.

Publisher: Rockland, MA : Syngress Publishing, c2004Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan: [Call number: 005.8] (1).
Intrusion prevention and active response [electronic resource] : deploying network and host IPS / Michael Rash ... [et al.] ; technical reviewer, Anne Henmi.

by Henmi, Anne [rev] | Rash, Michael [aut] | ebrary, Inc.

Publisher: Rockland, Mass. : Syngress Publishing, c2005Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan: [Call number: 005.8] (1).
Guide to computer forensics and investigations : processing digital evidence.

by Nelson, Bill | Steuart, Christopher | Phillips, Amelia.

Edition: Fifth edition / Bill Nelson, Amelia Phillips, Christopher Steuart.Publisher: Boston, MA : Cengage Learning, [2016]Copyright date: ©2016Availability: Items available for loan: Taylor's Library-TU [Call number: 363.25968 NEL 2016] (4).
The misuse of information systems [electronic resource] : the impact of security countermeasures / John P. D'Arcy.

by D'Arcy, John P, 1975- | ebrary, Inc.

Publisher: New York : LFB Scholarly Pub., 2007Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan: [Call number: 005.8] (1).
MCSE designing security for a Windows Server 2003 network : exam 70-298 [electronic resource] : study guide & DVD training system / Elias N. Khnaser ... [et al.].

by Khnaser, Elias N | ebrary, Inc.

Publisher: Rockland, MA : Syngress Pub., c2004Other title: Microsoft Certified System Engineer designing security for a Windows Server 2003 network : exam 70-298.Online access: An electronic book accessible through the World Wide Web; click to view Availability: No items available
Ethereal [electronic resource] : packet sniffing / Angela Orebaugh with Greg Morris, Ed Warnicke, Gilbert Ramirez.

by Orebaugh, Angela | Morris, Greg | Warnicke, Ed | Ramirez, Gilbert | ebrary, Inc.

Publisher: Rockland, MA : Syngress Pub., c2004Other title: Ethereal packet sniffing.Online access: An electronic book accessible through the World Wide Web; click to view Availability: No items available
Information security [electronic resource] : policy, processes, and practices / Detmar W. Straub, Seymour Goodman, Richard L. Baskerville, editors.

by Straub, Detmar W | Goodman, Seymour E | Baskerville, Richard | ebrary, Inc.

Publisher: Armonk, N.Y. : M.E. Sharpe, c2008Online access: An electronic book accessible through the World Wide Web; click to view Availability: No items available
Threat modeling : designing for security / Adam Shostack.

by Shostack, Adam [author.].

Publisher: Indianapolis, IN : John Wiley and Sons, [2014]Copyright date: ©2014Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan: [Call number: 005.8] (1).
Zen and the art of information security [electronic resource] / Ira Winkler.

by Winkler, Ira | ebrary, Inc.

Publisher: Rockland, MA : Syngress, c2007Other title: Ira Winkler's zen of security.Online access: An electronic book accessible through the World Wide Web; click to view Availability: No items available
Nessus, Snort, & Ethereal power tools [electronic resource] : customizing open source security applications / Neil Archibald, Gilbert Ramirez, Noam Rathaus ; Josh Burke, Brian Caswell, Renaud Deraison,technical editor[s].

by Archibald, Neil | Burke, Josh | Caswell, Brian | Deraison, Renaud | Ramirez, Gilbert | Rathaus, Noam | ebrary, Inc.

Publisher: Rockland, Mass. : Syngress Pub., c2005Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan: [Call number: 005.8] (1).
Insider threat [electronic resource] : protecting the enterprise from sabotage, spying, and theft / Eric Cole, Sandra Ring.

by Cole, Eric | Ring, Sandra | ebrary, Inc.

Publisher: Rockland, Mass. : [S.l.] : Syngress ; Distributed by O'Reilly Media, 2006Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan: [Call number: 005.8] (1).
Software piracy exposed [electronic resource] / Ron Honick.

by Honick, Ron | ebrary, Inc.

Publisher: Rockland, Mass. : Syngress, 2005Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan: [Call number: 364.168] (1).
Securing IM and P2P applications for the enterprise [electronic resource] / Paul L. Piccard ... [et al.] ; Marcus H. Sachs, technical editor.

by Piccard, Paul L [aut] | Sachs, Marcus H [edt] | ebrary, Inc.

Publisher: Rockland, Mass. : Syngress Publishing, c2006Other title: IM and P2P applications.Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan: [Call number: 005.8] (1).
Penetration tester's open source toolkit [electronic resource] / Johnny Long ... [et al.] ; foreword by Max Moser.

by Long, Johnny | ebrary, Inc.

Publisher: Rockland, MA : Syngress Pub., 2006Other title: Pentester's open source toolkit.Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan: [Call number: 005.8] (1).
Perfect passwords [electronic resource] : selection, protection, authentication / Mark Burnett ; Dave Kleiman, technical editor.

by Burnett, Mark | Kleiman, Dave | ebrary, Inc.

Publisher: Rockland, Mass. : Syngress, 2006Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan: [Call number: 005.8] (1).
Network security evaluation [electronic resource] : using the NSA IEM / Ed Fuller.

by Fuller, Ed | ebrary, Inc.

Publisher: Rockland, Mass. : Syngress Publishing, c2005Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan: [Call number: 005.8] (1).