|
|
VMware vSphere and virtual infrastructure security : securing the virtual environment / Edward L. Haletky.
by Haletky, Edward L. Publisher: Upper Saddle River, NJ. : Prentice Hall, c2009Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 HAL 2009]
(1).
|
|
|
Managing cybersecurity resources : a cost-benefit analysis / by Lawrence A. Gordon and Martin P. Loeb.
by Gordon, Lawrence A | Loeb, Martin P. Publisher: New York : McGraw-Hill, c2006Availability: Items available for loan: Taylor's Library-TU
[Call number: 658.478 GOR]
(1).
|
|
|
The official CHFI exam 312-49 study guide [electronic resource] : for computer hacking forensics investigators.
by Kleiman, Dave | ebrary, Inc. Publisher: Burlington, Mass. : Syngress Pub., c2007Other title: Exam 312-49 study guide.Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan:
[Call number: 005.8]
(1).
|
|
|
Security and access control using biometric technologies / Robert Newman.
by Newman, Robert. Publisher: Boston, MA : Course Technology/Cengage Learning, c2010Availability: Items available for loan: Taylor's Library-TU
[Call number: 006.4 NEW 2010]
(1).
|
|
|
Security awareness : applying practical security in your world / Mark Ciampa.
by Ciampa, Mark D. Edition: 2nd ed.Publisher: Boston, Mass. : Thomson/Course Technology, 2007Availability: Items available for loan: Taylor's Library-TU
[Call number: 658.478 CIA]
(1).
|
|
|
Moving target defense II : application of game theory and adversarial modeling / Sushil Jajodia ... [et al.], editors.
by Jajodia, Sushil. Publisher: New York : Springer, c2013Other title: Moving target defense two.Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 MOV 2013]
(1).
|
|
|
Hack proofing ColdFusion [electronic resource] / Greg Meyer ... [et al.].
by Meyer, Greg [aut] | ebrary, Inc. Publisher: Rockland, Mass. : Syngress Publishing, Inc., c2002Other title: Hackproofing ColdFusion.Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan:
[Call number: 005.75/8]
(1).
|
|
|
Check Point NG [electronic resource] : next generation security administration / Drew Simonis ... [et al.].
by Simonis, Drew | ebrary, Inc. Publisher: Rockland, Mass. : Syngress Publishing, Inc., c2002Other title: Check Point Next Generation | CheckPoint NG.Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan:
[Call number: 005.8]
(1).
|
|
|
Hacking exposed 6 : network security secrets & solutions / Stuart McClure, Joel Scambray, George Kurtz.
by McClure, Stuart | Scambray, Joel | Kurtz, George. Edition: 10th anniversary ed.Publisher: New York : McGraw-Hill, c2009Other title: Hacking exposed six | Hacking 6 exposed.Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 MAC]
(1).
|
|
|
Information [electronic resource] : getting, protecting and using data.
by ebrary, Inc. Publisher: Boston, Mass. : Technology Research News, 2003Online access: An electronic book accessible through the World Wide Web; click to view Availability: No items available
|
|
|
Network security bible / by Eric Cole, Ronald Krutz, James W. Conley.
by Cole, Eric | Krutz, Ronald L, 1938- | Conley, James W. Edition: 2nd ed.Publisher: Indianapolis, IN : Wiley Pub., c2009Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 COL 2009]
(1).
|
|
|
Principles of information security / Michael E. Whitman and Herbert J. Mattord
by Whitman, Michael E, 1964- | Mattord, Herbert J. Edition: 3rd ed.Publisher: Boston, Mass. : Course Technology Cengage Learning, c2009Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 WHI 2009]
(1).
|
|
|
Security awareness : applying practical security in your world / Mark Ciampa.
by Ciampa, Mark. Edition: 3rd ed.Publisher: Boston, MA : Course Technology, Cengage Learning, c2010Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 CIA 2010]
(1).
|
|
|
Information security : theory and practice / Dhiren R. Patel.
by Patel, Dhiren R. Publisher: New Delhi : Prentice-Hall of India Private Limited, c2008Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 INF 2008]
(1).
|
|
|
Hacking exposed computer forensics / Aaron Philipp, David Cowen, Chris Davis.
by Philipp, Aaron | Cowen, David | Davis, Chris (Christopher Michael). Edition: 2nd ed.Publisher: New York : McGraw-Hill, c2010Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 PHI 2010]
(2).
|
|
|
Hacking exposed Linux : Linux security secrets & solutions / ISECOM.
by ISECOM (Organization). Edition: 3rd ed.Publisher: New York : McGraw-Hill, c2008Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 HAC 2008]
(1).
|
|
|
Risk analysis and security countermeasure selection / Thomas L. Norman.
by Norman, Thomas L. Publisher: Boca Raton, FL : CRC Press, 2010Availability: Items available for loan: Taylor's Library-TU
[Call number: 658.47 NOR 2010]
(1).
|
|
|
Distributed systems security : issues, processes and solutions / by Abhijit Belapurkar ... [et al.].
by Belapurkar, Abhijit. Publisher: Hoboken, NJ : John Wiley, c2009Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 DIS 2009]
(1).
|