Your search returned 342 results.

Not what you expected? Check for suggestions
|
Spyware and adware [electronic resource] / by John Aycock.

by Aycock, John Daniel, 1970-.

Publisher: New York : Springer Science+Business Media, LLC, 2011Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for reference: Taylor's Library-TU [Call number: 005.8] (1).
Security policies and implementation issues / Rob Johnson with Mike Merkow.

by Johnson, Rob (Robert) | Merkow, Mark S.

Publisher: Burlington, MA : Jones & Bartlett Learning, c2011Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 JOH 2011] (1).
The secure information society [electronic resource] : ethical, legal and political challenges / Jörg Krüger, Bertram Nickolay, Sandro Gaycken, editors.

by Krüger, Jörg | Nickolay, Bertram | Gaycken, Sandro, 1973-.

Publisher: London ; New York : Springer, c2013Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for reference: Taylor's Library-TU [Call number: 005.8] (1).
Data security, data mining and data management : technologies and challenges / Serge O'Byrne, editor.

by O'Byrne, Serge [editor of compilation.].

Publisher: [Hauppauge] New York : Novinka, [2013]Copyright date: ©2013Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for reference: Taylor's Library-TU [Call number: 005.8] (1).
Intelligent systems for security informatics [electronic resource] / Christopher C. Yang ... [et al.].

by Yang, Christopher C.

Publisher: Oxford ; Waltham, MA : Academic Press, c2013Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for reference: Taylor's Library-TU [Call number: 005.8] (1).
Theory and practice of cryptography solutions for secure information systems [electronic resource] / Atilla Elci, Josef Pieprzyk, Alexander G. Chefranov, Mehmet A. Orgun, Huaxiong Wang and Rajan Shankaran, editors.

by Elçi, Atilla [editor of compilation.].

Publisher: Hershey, PA : Information Science Reference, 2013Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for reference: Taylor's Library-TU [Call number: 005.8] (1).
Security engineering for cloud computing [electronic resource] : approaches and tools / David G. Rosado, Daniel Mellado, Eduardo Fernandez-Medina, and Mario Piattini, editors.

by Rosado, David G, 1977- | IGI Global.

Publisher: Hershey, Pa. : IGI Global (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA), ©2013Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for reference: Taylor's Library-TU [Call number: 005.8] (1).
Trustworthy execution on mobile devices / Amit Vasudevan, Jonathan M. McCune, James Newsome.

by Vasudevan, Amit [author.] | McCune, Jonathan M [author.] | Newsome, James [author.].

Publisher: New York, NY : Springer, [2013?]Copyright date: ©2014Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for reference: Taylor's Library-TU [Call number: 005.8] (1).
Embedded multimedia security systems [electronic resource] : algorithms and architectures / Amit Pande, Joseph Zambreno.

by Pande, Amit | Zambreno, Joseph.

Publisher: London ; New York : Springer, c2013Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for reference: Taylor's Library-TU [Call number: 006.7] (1).
Discrete dynamical systems, chaotic machines, and applications to information security [electronic resource] / Jacques M. Bahi, Christophe Guyeux.

by Bahi, Jacques Mohcine [author.] | Guyeux, Christophe [author.].

Publisher: Boca Raton : CRC Press, 2013Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for reference: Taylor's Library-TU [Call number: 005.8] (1).
Cyber threat! : how to manage the growing risk of cyber attacks / N. MacDonnell Ulsch.

by Ulsch, N. MacDonnell, 1951-.

Publisher: Hoboken, New Jersey : Wiley, 2014Copyright date: ©2014Availability: Items available for loan: Taylor's Library-TU [Call number: 658.478 ULS 2014] (1).
Network science and cybersecurity [electronic resource] / Robinson E. Pino, editor.

by Pino, Robinson E.

Publisher: New York : Springer Science+Business Media, c2014Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for reference: Taylor's Library-TU [Call number: 005.8] (1).
The state of the art in intrusion prevention and detection / edited by Al-Sakib Khan Pathan.

by Pathan, Al-Sakib Khan [editor,, author.].

Publisher: Boca Raton : CRC Press, Taylor & Francis Group, [2014]Copyright date: ©2014Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for reference: Taylor's Library-TU [Call number: 005.8] (1).
Security, privacy and trust in cloud systems / Surya Nepal, Mukaddim Pathan, editors.

by Nepal, Surya, 1970- [editor of compilation.] | Pathan, Mukaddim [editor of compilation.].

Publisher: Heidelberg : Springer, [2013?]Copyright date: ©2014Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for reference: Taylor's Library-TU [Call number: 004.67/82] (1).
What every engineer should know about cyber security and digital forensics / Joanna F. DeFranco.

by DeFranco, Joanna F [author.].

Publisher: Boca Raton : CRC Press, [2013]Copyright date: ©2014Other title: Cyber security and digital forensics.Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan: [Call number: 005.8] (1).
Introduction to modern cryptography / Jonathan Katz, University of Maryland, College Park, MD, USA, Yehuda Lindell, Bar-llan University, Ramat Gan, Israel.

by Katz, Jonathan, 1974- | Lindell, Yehuda.

Edition: Second edition.Publisher: Boca Raton : CRC Press/Taylor & Francis, [2015]Copyright date: ©2015Availability: Items available for loan: Taylor's Library-TU [Call number: 005.82 KAT 2015] (1).
Cloud management and security / Imad M. Abbadi.

by Abbadi, Imad M.

Publisher: Chichester, West Sussex, United Kingdom : Wiley, 2014Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for reference: Taylor's Library-TU [Call number: 004.67/82] (1).
Principles of information security / Michael E. Whitman, Herbert J. Mattord.

by Whitman, Michael E, 1964-.

Edition: Fourth edition.Publisher: Australia : Course Technology, Cengage Learning, [2012]Copyright date: ©2012Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 PRI 2012 | 005.8 WHI 2012] (2).
Linux system security : an administrator's guide to open source security tools / Scott Mann and Ellen L. Mitchell

by Mann, Scott, 1958- | Mitchell, Ellen L [(j.a.)].

Publisher: Upper Saddle River, NJ : Prentice Hall PTR, c2000Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 MAN] (1).
A process for developing a common vocabulary in the information security area [electronic resource] / edited by Jan von Knop, Alexey A. Salnikov, and Valeriy V. Yaschenko.

by NATO Advanced Research Workshop on a Process for Developing a Common Vocabulary in the Information Security Area (2006 : Moscow, Russia) | Knop, J. V. (Jan V.) | Salʹnikov, Alexey A | IAshchenko, V. V | ebrary, Inc.

Publisher: Amsterdam ; Washington, DC : IOS Press, c2007Online access: An electronic book accessible through the World Wide Web; click to view Availability: No items available