Your search returned 342 results.

Not what you expected? Check for suggestions
|
VMware vSphere and virtual infrastructure security : securing the virtual environment / Edward L. Haletky.

by Haletky, Edward L.

Publisher: Upper Saddle River, NJ. : Prentice Hall, c2009Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 HAL 2009] (1).
Managing cybersecurity resources : a cost-benefit analysis / by Lawrence A. Gordon and Martin P. Loeb.

by Gordon, Lawrence A | Loeb, Martin P.

Publisher: New York : McGraw-Hill, c2006Availability: Items available for loan: Taylor's Library-TU [Call number: 658.478 GOR] (1).
The official CHFI exam 312-49 study guide [electronic resource] : for computer hacking forensics investigators.

by Kleiman, Dave | ebrary, Inc.

Publisher: Burlington, Mass. : Syngress Pub., c2007Other title: Exam 312-49 study guide.Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan: [Call number: 005.8] (1).
Security and access control using biometric technologies / Robert Newman.

by Newman, Robert.

Publisher: Boston, MA : Course Technology/Cengage Learning, c2010Availability: Items available for loan: Taylor's Library-TU [Call number: 006.4 NEW 2010] (1).
Security awareness : applying practical security in your world / Mark Ciampa.

by Ciampa, Mark D.

Edition: 2nd ed.Publisher: Boston, Mass. : Thomson/Course Technology, 2007Availability: Items available for loan: Taylor's Library-TU [Call number: 658.478 CIA] (1).
Moving target defense II : application of game theory and adversarial modeling / Sushil Jajodia ... [et al.], editors.

by Jajodia, Sushil.

Publisher: New York : Springer, c2013Other title: Moving target defense two.Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 MOV 2013] (1).
Hack proofing ColdFusion [electronic resource] / Greg Meyer ... [et al.].

by Meyer, Greg [aut] | ebrary, Inc.

Publisher: Rockland, Mass. : Syngress Publishing, Inc., c2002Other title: Hackproofing ColdFusion.Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan: [Call number: 005.75/8] (1).
Check Point NG [electronic resource] : next generation security administration / Drew Simonis ... [et al.].

by Simonis, Drew | ebrary, Inc.

Publisher: Rockland, Mass. : Syngress Publishing, Inc., c2002Other title: Check Point Next Generation | CheckPoint NG.Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan: [Call number: 005.8] (1).
Hacking exposed 6 : network security secrets & solutions / Stuart McClure, Joel Scambray, George Kurtz.

by McClure, Stuart | Scambray, Joel | Kurtz, George.

Edition: 10th anniversary ed.Publisher: New York : McGraw-Hill, c2009Other title: Hacking exposed six | Hacking 6 exposed.Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 MAC] (1).
Information [electronic resource] : getting, protecting and using data.

by ebrary, Inc.

Publisher: Boston, Mass. : Technology Research News, 2003Online access: An electronic book accessible through the World Wide Web; click to view Availability: No items available
Network security bible / by Eric Cole, Ronald Krutz, James W. Conley.

by Cole, Eric | Krutz, Ronald L, 1938- | Conley, James W.

Edition: 2nd ed.Publisher: Indianapolis, IN : Wiley Pub., c2009Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 COL 2009] (1).
Principles of information security / Michael E. Whitman and Herbert J. Mattord

by Whitman, Michael E, 1964- | Mattord, Herbert J.

Edition: 3rd ed.Publisher: Boston, Mass. : Course Technology Cengage Learning, c2009Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 WHI 2009] (1).
Security awareness : applying practical security in your world / Mark Ciampa.

by Ciampa, Mark.

Edition: 3rd ed.Publisher: Boston, MA : Course Technology, Cengage Learning, c2010Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 CIA 2010] (1).
Information security : theory and practice / Dhiren R. Patel.

by Patel, Dhiren R.

Publisher: New Delhi : Prentice-Hall of India Private Limited, c2008Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 INF 2008] (1).
Hacking exposed computer forensics / Aaron Philipp, David Cowen, Chris Davis.

by Philipp, Aaron | Cowen, David | Davis, Chris (Christopher Michael).

Edition: 2nd ed.Publisher: New York : McGraw-Hill, c2010Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 PHI 2010] (2).
Hacking exposed Linux : Linux security secrets & solutions / ISECOM.

by ISECOM (Organization).

Edition: 3rd ed.Publisher: New York : McGraw-Hill, c2008Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 HAC 2008] (1).
Risk analysis and security countermeasure selection / Thomas L. Norman.

by Norman, Thomas L.

Publisher: Boca Raton, FL : CRC Press, 2010Availability: Items available for loan: Taylor's Library-TU [Call number: 658.47 NOR 2010] (1).
Distributed systems security : issues, processes and solutions / by Abhijit Belapurkar ... [et al.].

by Belapurkar, Abhijit.

Publisher: Hoboken, NJ : John Wiley, c2009Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 DIS 2009] (1).