Your search returned 55 results.

Not what you expected? Check for suggestions
|
Hack attacks testing : how to conduct your own security audit / John Chirillo

by Chirillo, John, 1970-.

Publisher: New York : Wiley, c2003Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 CHI] (1).
Security + guide to network security fundamentals / by Mark Ciampa

by Ciampa, Mark.

Edition: 2nd ed.Publisher: Boston, Mass. : Course Technology / Thomson Learning, c2005Other title: Guide to network security fundamentals. | Network security fundamentals..Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 CIA] (1).
Forensic discovery / Dan Farmer, Wietse Venema.

by Farmer, Dan | Venema, Wietse.

Publisher: Upper Saddle River, NJ : Addison-Wesley, c2005Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 FAR 2005] (1).
Virtualization and forensics : a digital forensic investigator's guide to virtual environments / Diane Barrett, Gregory Kipper.

by Barrett, Diane | Kipper, Gregory.

Publisher: Burlington, MA : Elsevier/Syngress, c2010Availability: Items available for loan: Taylor's Library-TU [Call number: 363.25968 BAR 2010] (1).
The security risk assessment handbook : a complete guide for performing security risk assessments / Douglas J. Landoll.

by Landoll, Douglas J.

Publisher: Boca Raton, FL : Auerbach Pub., 2006Availability: Items available for loan: Taylor's Library-TU [Call number: 658.47 LAN 2006] (1).
The web application hacker's handbook : discovering and exploiting security flaws / Dafydd Stuttard, Marcus Pinto.

by Stuttard, Dafydd, 1972- | Pinto, Marcus, 1978-.

Publisher: Indianapolis, IN : Wiley Pub., c2008Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 STU 2008] (1).
Dear Hacker : letters to the editor of 2600 / Emmanuel Goldstein.

by Goldstein, Emmanuel, 1959-.

Publisher: Indianapolis, IN : Wiley Pub., c2010Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 GOL 2010] (1).
24 deadly sins of software security : programming flaws and how to fix them / Michael Howard, David LeBlanc, and John Viega.

by Howard, Michael, 1965- | LeBlanc, David, 1960- | Viega, John.

Publisher: New York, NY : McGraw-Hill, c2010Other title: Twenty four deadly sins of software security.Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 HOW 2010] (1).
Handbook of information and communication security / Peter Stavroulakis, Mark Stamp, editors.

by Stavroulakis, Peter | Stamp, Mark.

Publisher: Berlin : Springer, 2010Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 HAN 2010] (1).
VMware vSphere and virtual infrastructure security : securing the virtual environment / Edward L. Haletky.

by Haletky, Edward L.

Publisher: Upper Saddle River, NJ. : Prentice Hall, c2009Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 HAL 2009] (1).
Managing cybersecurity resources : a cost-benefit analysis / by Lawrence A. Gordon and Martin P. Loeb.

by Gordon, Lawrence A | Loeb, Martin P.

Publisher: New York : McGraw-Hill, c2006Availability: Items available for loan: Taylor's Library-TU [Call number: 658.478 GOR] (1).
Moving target defense II : application of game theory and adversarial modeling / Sushil Jajodia ... [et al.], editors.

by Jajodia, Sushil.

Publisher: New York : Springer, c2013Other title: Moving target defense two.Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 MOV 2013] (1).
Professional ASP.NET 3.5 security, membership, and role management with C# and VB / Bilal Haidar, Stefan Schackow.

by Haidar, Bilal | Schackow, Stefan, 1970-.

Publisher: Indianapolis, IN : Wiley Pub., 2008Availability: Items available for loan: Taylor's Library-TU [Call number: 005.276 HAI] (1).
Principles of information security / Michael E. Whitman and Herbert J. Mattord

by Whitman, Michael E, 1964- | Mattord, Herbert J.

Edition: 3rd ed.Publisher: Boston, Mass. : Course Technology Cengage Learning, c2009Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 WHI 2009] (1).
Risk analysis and security countermeasure selection / Thomas L. Norman.

by Norman, Thomas L.

Publisher: Boca Raton, FL : CRC Press, 2010Availability: Items available for loan: Taylor's Library-TU [Call number: 658.47 NOR 2010] (1).
Distributed systems security : issues, processes and solutions / by Abhijit Belapurkar ... [et al.].

by Belapurkar, Abhijit.

Publisher: Hoboken, NJ : John Wiley, c2009Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 DIS 2009] (1).
Hacking exposed : web applications : web application security secrets and solutions / Joel Scambray, Vincent Liu, Caleb Sima.

by Scambray, Joel | Liu, Vincent | Sima, Caleb.

Edition: 3rd ed.Publisher: San Francisco, CA : McGraw-Hill Companies, 2011Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 SCA 2011] (2).
Computer forensics Jumpstart / Michael Solomon, Diane Barrett, Neil Broom.

by Solomon, Michael, (Michael G.), 1963- | Barrett, Diane | Broom, Neil.

Publisher: San Francisco, Calif. : Sybex, 2005Availability: Items available for loan: Taylor's Library-TU [Call number: 363.25968 SOL 2005] (1).
Security 2020 : reduce security risks this decade / Doug Howard and Kevin Prince.

by Howard, Doug | Prince, Kevin.

Edition: 1st ed.Publisher: Indianapolis, IN : Wiley Pub., c2011Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 HOW 2011] (1).
Corporate computer security / Randall J. Boyle, Raymond R. Panko.

by Boyle, Randall J | Panko, Raymond R.

Edition: 3rd ed.Publisher: Boston : Pearson, c2013Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 BOY 2013] (1).