|
|
Spyware and adware [electronic resource] / by John Aycock.
by Aycock, John Daniel, 1970-. Publisher: New York : Springer Science+Business Media, LLC, 2011Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for reference: Taylor's Library-TU
[Call number: 005.8]
(1).
|
|
|
Security policies and implementation issues / Rob Johnson with Mike Merkow.
by Johnson, Rob (Robert) | Merkow, Mark S. Publisher: Burlington, MA : Jones & Bartlett Learning, c2011Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 JOH 2011]
(1).
|
|
|
The secure information society [electronic resource] : ethical, legal and political challenges / Jörg Krüger, Bertram Nickolay, Sandro Gaycken, editors.
by Krüger, Jörg | Nickolay, Bertram | Gaycken, Sandro, 1973-. Publisher: London ; New York : Springer, c2013Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for reference: Taylor's Library-TU
[Call number: 005.8]
(1).
|
|
|
Data security, data mining and data management : technologies and challenges / Serge O'Byrne, editor.
by O'Byrne, Serge [editor of compilation.]. Publisher: [Hauppauge] New York : Novinka, [2013]Copyright date: ©2013Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for reference: Taylor's Library-TU
[Call number: 005.8]
(1).
|
|
|
Intelligent systems for security informatics [electronic resource] / Christopher C. Yang ... [et al.].
by Yang, Christopher C. Publisher: Oxford ; Waltham, MA : Academic Press, c2013Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for reference: Taylor's Library-TU
[Call number: 005.8]
(1).
|
|
|
Theory and practice of cryptography solutions for secure information systems [electronic resource] / Atilla Elci, Josef Pieprzyk, Alexander G. Chefranov, Mehmet A. Orgun, Huaxiong Wang and Rajan Shankaran, editors.
by Elçi, Atilla [editor of compilation.]. Publisher: Hershey, PA : Information Science Reference, 2013Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for reference: Taylor's Library-TU
[Call number: 005.8]
(1).
|
|
|
Security engineering for cloud computing [electronic resource] : approaches and tools / David G. Rosado, Daniel Mellado, Eduardo Fernandez-Medina, and Mario Piattini, editors.
by Rosado, David G, 1977- | IGI Global. Publisher: Hershey, Pa. : IGI Global (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA), ©2013Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for reference: Taylor's Library-TU
[Call number: 005.8]
(1).
|
|
|
Trustworthy execution on mobile devices / Amit Vasudevan, Jonathan M. McCune, James Newsome.
by Vasudevan, Amit [author.] | McCune, Jonathan M [author.] | Newsome, James [author.]. Publisher: New York, NY : Springer, [2013?]Copyright date: ©2014Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for reference: Taylor's Library-TU
[Call number: 005.8]
(1).
|
|
|
Embedded multimedia security systems [electronic resource] : algorithms and architectures / Amit Pande, Joseph Zambreno.
by Pande, Amit | Zambreno, Joseph. Publisher: London ; New York : Springer, c2013Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for reference: Taylor's Library-TU
[Call number: 006.7]
(1).
|
|
|
Discrete dynamical systems, chaotic machines, and applications to information security [electronic resource] / Jacques M. Bahi, Christophe Guyeux.
by Bahi, Jacques Mohcine [author.] | Guyeux, Christophe [author.]. Publisher: Boca Raton : CRC Press, 2013Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for reference: Taylor's Library-TU
[Call number: 005.8]
(1).
|
|
|
Cyber threat! : how to manage the growing risk of cyber attacks / N. MacDonnell Ulsch.
by Ulsch, N. MacDonnell, 1951-. Publisher: Hoboken, New Jersey : Wiley, 2014Copyright date: ©2014Availability: Items available for loan: Taylor's Library-TU
[Call number: 658.478 ULS 2014]
(1).
|
|
|
Network science and cybersecurity [electronic resource] / Robinson E. Pino, editor.
by Pino, Robinson E. Publisher: New York : Springer Science+Business Media, c2014Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for reference: Taylor's Library-TU
[Call number: 005.8]
(1).
|
|
|
The state of the art in intrusion prevention and detection / edited by Al-Sakib Khan Pathan.
by Pathan, Al-Sakib Khan [editor,, author.]. Publisher: Boca Raton : CRC Press, Taylor & Francis Group, [2014]Copyright date: ©2014Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for reference: Taylor's Library-TU
[Call number: 005.8]
(1).
|
|
|
Security, privacy and trust in cloud systems / Surya Nepal, Mukaddim Pathan, editors.
by Nepal, Surya, 1970- [editor of compilation.] | Pathan, Mukaddim [editor of compilation.]. Publisher: Heidelberg : Springer, [2013?]Copyright date: ©2014Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for reference: Taylor's Library-TU
[Call number: 004.67/82]
(1).
|
|
|
What every engineer should know about cyber security and digital forensics / Joanna F. DeFranco.
by DeFranco, Joanna F [author.]. Publisher: Boca Raton : CRC Press, [2013]Copyright date: ©2014Other title: Cyber security and digital forensics.Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan:
[Call number: 005.8]
(1).
|
|
|
Introduction to modern cryptography / Jonathan Katz, University of Maryland, College Park, MD, USA, Yehuda Lindell, Bar-llan University, Ramat Gan, Israel.
by Katz, Jonathan, 1974- | Lindell, Yehuda. Edition: Second edition.Publisher: Boca Raton : CRC Press/Taylor & Francis, [2015]Copyright date: ©2015Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.82 KAT 2015]
(1).
|
|
|
Cloud management and security / Imad M. Abbadi.
by Abbadi, Imad M. Publisher: Chichester, West Sussex, United Kingdom : Wiley, 2014Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for reference: Taylor's Library-TU
[Call number: 004.67/82]
(1).
|
|
|
Principles of information security / Michael E. Whitman, Herbert J. Mattord.
by Whitman, Michael E, 1964-. Edition: Fourth edition.Publisher: Australia : Course Technology, Cengage Learning, [2012]Copyright date: ©2012Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 PRI 2012 | 005.8 WHI 2012]
(2).
|
|
|
Linux system security : an administrator's guide to open source security tools / Scott Mann and Ellen L. Mitchell
by Mann, Scott, 1958- | Mitchell, Ellen L [(j.a.)]. Publisher: Upper Saddle River, NJ : Prentice Hall PTR, c2000Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 MAN]
(1).
|
|
|
A process for developing a common vocabulary in the information security area [electronic resource] / edited by Jan von Knop, Alexey A. Salnikov, and Valeriy V. Yaschenko.
by NATO Advanced Research Workshop on a Process for Developing a Common Vocabulary in the Information Security Area (2006 : Moscow, Russia) | Knop, J. V. (Jan V.) | Salʹnikov, Alexey A | IAshchenko, V. V | ebrary, Inc. Publisher: Amsterdam ; Washington, DC : IOS Press, c2007Online access: An electronic book accessible through the World Wide Web; click to view Availability: No items available
|