Your search returned 342 results.

Not what you expected? Check for suggestions
|
Digital forensics for network, Internet, and cloud computing : a forensic evidence guide for moving targets and data / Terrence V. Lillard ... [et al.] ; technical editor, Jim Murray.

by Lillard, Terrence.

Publisher: Burlington, MA : Elsevier/Syngress, c2010Availability: Items available for loan: Taylor's Library-TU [Call number: 363.25968 GAR 2010] (1).
Virtualization and forensics : a digital forensic investigator's guide to virtual environments / Diane Barrett, Gregory Kipper.

by Barrett, Diane | Kipper, Gregory.

Publisher: Burlington, MA : Elsevier/Syngress, c2010Availability: Items available for loan: Taylor's Library-TU [Call number: 363.25968 BAR 2010] (1).
The security risk assessment handbook : a complete guide for performing security risk assessments / Douglas J. Landoll.

by Landoll, Douglas J.

Publisher: Boca Raton, FL : Auerbach Pub., 2006Availability: Items available for loan: Taylor's Library-TU [Call number: 658.47 LAN 2006] (1).
Introduction to network security / Douglas Jacobson.

by Jacobson, Douglas.

Publisher: Boca Raton : CRC Press, c2009Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 JAC 2009] (1).
Computer security basics / Rick Lehtinen, Deborah Russell and G.T. Gangemi, Sr.

by Lehtinen, Rick | Russell, Deborah | Gangemi, G. T | Russell, Deborah. Computer security basics.

Edition: 2nd ed.Publisher: Sebastopol, CA : O'Reilly, c2006Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 LEH 2006] (1).
Security in computing / Charles P. Pfleeger, Shari Lawrence Pfleeger.

by Pfleeger, Charles P, 1948- | Pfleeger, Shari Lawrence.

Edition: 4th ed.Publisher: Upper Saddle River, NJ : Prentice Hall, c2007Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 PFL 2007] (1).
The web application hacker's handbook : discovering and exploiting security flaws / Dafydd Stuttard, Marcus Pinto.

by Stuttard, Dafydd, 1972- | Pinto, Marcus, 1978-.

Publisher: Indianapolis, IN : Wiley Pub., c2008Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 STU 2008] (1).
Dear Hacker : letters to the editor of 2600 / Emmanuel Goldstein.

by Goldstein, Emmanuel, 1959-.

Publisher: Indianapolis, IN : Wiley Pub., c2010Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 GOL 2010] (1).
Principles of information security / Michael E. Whitman, Herbert J. Mattord.

by Whitman, Michael E, 1964- [author.] | Mattord, Herbert J [author.].

Edition: Sixth edition.Publisher: Boston, MA : Cengage Learning, [2018]Copyright date: ©2018Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 WHI 2018] (1).
Cloud computing : from beginning to end, cloud technology, design, and migration methodologies explained / Ray Rafaels.

by Rafaels, Ray [author.].

Edition: 2nd edition.Publisher: [Scotts Valley, California] : [CreateSpace Independent Publishing Platform], [2018]Copyright date: ©2018Availability: Items available for loan: Taylor's Library-TU [Call number: 004.6782 RAF 2018] (4).
Management of information security / Michael E. Whitman, Herbert J. Mattord.

by Whitman, Michael E, 1964- [author.] | Mattord, Herbert J [author.].

Edition: Sixth edition.Publisher: Boston, MA : Cengage Learning, [2019]Copyright date: ©2019Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 WHI 2019] (1).
Cyberpsychology : an introduction to human-computer interaction / Kent L. Norman, University of Maryland.

by Norman, Kent L [author.].

Edition: Second edition.Publisher: Cambridge : Cambridge University Press, 2017Availability: Items available for loan: Taylor's Library-TU [Call number: 004.019 NOR 2017] (2).
Cybersecurity law : protect yourself and your customers.

by Brathwaite, Shimon.

Publisher: New York : Business Expert Press, 2019Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for reference: Taylor's Library-TU [Call number: 342.0858] (1).
Best damn firewall book period [electronic resource] / T.W. Shinder ... [et al.].

by Shinder, Thomas W | ebrary, Inc.

Edition: 2nd ed.Publisher: Burlington, Mass. : Syngress, c2007Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan: [Call number: 005.8] (1).
24 deadly sins of software security : programming flaws and how to fix them / Michael Howard, David LeBlanc, and John Viega.

by Howard, Michael, 1965- | LeBlanc, David, 1960- | Viega, John.

Publisher: New York, NY : McGraw-Hill, c2010Other title: Twenty four deadly sins of software security.Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 HOW 2010] (1).
Crackproof your software [electronic resource] : the best ways to protect your software against crackers / Pavol C̆ervĕn.

by Cerven, Pavol | ebrary, Inc.

Publisher: San Francisco : No Starch Press, c2002Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan: [Call number: 005.8] (1).
Hacking exposed malware & rootkits : malware & rootkits security secrets & solutions / Michael Davis, Sean Bodmer, Aaron Lemasters.

by Davis, Michael A | Bodmer, Sean | LeMasters, Aaron.

Publisher: New York : McGraw Hill, c2010Other title: Hacking exposed malware and rootkits.Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 DAV 2010] (1).
Handbook of information and communication security / Peter Stavroulakis, Mark Stamp, editors.

by Stavroulakis, Peter | Stamp, Mark.

Publisher: Berlin : Springer, 2010Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 HAN 2010] (1).