|
|
Digital forensics for network, Internet, and cloud computing : a forensic evidence guide for moving targets and data / Terrence V. Lillard ... [et al.] ; technical editor, Jim Murray.
by Lillard, Terrence. Publisher: Burlington, MA : Elsevier/Syngress, c2010Availability: Items available for loan: Taylor's Library-TU
[Call number: 363.25968 GAR 2010]
(1).
|
|
|
Virtualization and forensics : a digital forensic investigator's guide to virtual environments / Diane Barrett, Gregory Kipper.
by Barrett, Diane | Kipper, Gregory. Publisher: Burlington, MA : Elsevier/Syngress, c2010Availability: Items available for loan: Taylor's Library-TU
[Call number: 363.25968 BAR 2010]
(1).
|
|
|
The security risk assessment handbook : a complete guide for performing security risk assessments / Douglas J. Landoll.
by Landoll, Douglas J. Publisher: Boca Raton, FL : Auerbach Pub., 2006Availability: Items available for loan: Taylor's Library-TU
[Call number: 658.47 LAN 2006]
(1).
|
|
|
Introduction to network security / Douglas Jacobson.
by Jacobson, Douglas. Publisher: Boca Raton : CRC Press, c2009Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 JAC 2009]
(1).
|
|
|
Computer security basics / Rick Lehtinen, Deborah Russell and G.T. Gangemi, Sr.
by Lehtinen, Rick | Russell, Deborah | Gangemi, G. T | Russell, Deborah. Computer security basics. Edition: 2nd ed.Publisher: Sebastopol, CA : O'Reilly, c2006Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 LEH 2006]
(1).
|
|
|
Security in computing / Charles P. Pfleeger, Shari Lawrence Pfleeger.
by Pfleeger, Charles P, 1948- | Pfleeger, Shari Lawrence. Edition: 4th ed.Publisher: Upper Saddle River, NJ : Prentice Hall, c2007Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 PFL 2007]
(1).
|
|
|
The web application hacker's handbook : discovering and exploiting security flaws / Dafydd Stuttard, Marcus Pinto.
by Stuttard, Dafydd, 1972- | Pinto, Marcus, 1978-. Publisher: Indianapolis, IN : Wiley Pub., c2008Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 STU 2008]
(1).
|
|
|
Dear Hacker : letters to the editor of 2600 / Emmanuel Goldstein.
by Goldstein, Emmanuel, 1959-. Publisher: Indianapolis, IN : Wiley Pub., c2010Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 GOL 2010]
(1).
|
|
|
Principles of information security / Michael E. Whitman, Herbert J. Mattord.
by Whitman, Michael E, 1964- [author.] | Mattord, Herbert J [author.]. Edition: Sixth edition.Publisher: Boston, MA : Cengage Learning, [2018]Copyright date: ©2018Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 WHI 2018]
(1).
|
|
|
Cloud computing : from beginning to end, cloud technology, design, and migration methodologies explained / Ray Rafaels.
by Rafaels, Ray [author.]. Edition: 2nd edition.Publisher: [Scotts Valley, California] : [CreateSpace Independent Publishing Platform], [2018]Copyright date: ©2018Availability: Items available for loan: Taylor's Library-TU
[Call number: 004.6782 RAF 2018]
(4).
|
|
|
Management of information security / Michael E. Whitman, Herbert J. Mattord.
by Whitman, Michael E, 1964- [author.] | Mattord, Herbert J [author.]. Edition: Sixth edition.Publisher: Boston, MA : Cengage Learning, [2019]Copyright date: ©2019Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 WHI 2019]
(1).
|
|
|
Cyberpsychology : an introduction to human-computer interaction / Kent L. Norman, University of Maryland.
by Norman, Kent L [author.]. Edition: Second edition.Publisher: Cambridge : Cambridge University Press, 2017Availability: Items available for loan: Taylor's Library-TU
[Call number: 004.019 NOR 2017]
(2).
|
|
|
Cybersecurity law : protect yourself and your customers.
by Brathwaite, Shimon. Publisher: New York : Business Expert Press, 2019Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for reference: Taylor's Library-TU
[Call number: 342.0858]
(1).
|
|
|
Best damn firewall book period [electronic resource] / T.W. Shinder ... [et al.].
by Shinder, Thomas W | ebrary, Inc. Edition: 2nd ed.Publisher: Burlington, Mass. : Syngress, c2007Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan:
[Call number: 005.8]
(1).
|
|
|
24 deadly sins of software security : programming flaws and how to fix them / Michael Howard, David LeBlanc, and John Viega.
by Howard, Michael, 1965- | LeBlanc, David, 1960- | Viega, John. Publisher: New York, NY : McGraw-Hill, c2010Other title: Twenty four deadly sins of software security.Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 HOW 2010]
(1).
|
|
|
Crackproof your software [electronic resource] : the best ways to protect your software against crackers / Pavol C̆ervĕn.
by Cerven, Pavol | ebrary, Inc. Publisher: San Francisco : No Starch Press, c2002Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan:
[Call number: 005.8]
(1).
|
|
|
Hacking exposed malware & rootkits : malware & rootkits security secrets & solutions / Michael Davis, Sean Bodmer, Aaron Lemasters.
by Davis, Michael A | Bodmer, Sean | LeMasters, Aaron. Publisher: New York : McGraw Hill, c2010Other title: Hacking exposed malware and rootkits.Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 DAV 2010]
(1).
|
|
|
Handbook of information and communication security / Peter Stavroulakis, Mark Stamp, editors.
by Stavroulakis, Peter | Stamp, Mark. Publisher: Berlin : Springer, 2010Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 HAN 2010]
(1).
|