|
|
Hack attacks testing : how to conduct your own security audit / John Chirillo
by Chirillo, John, 1970-. Publisher: New York : Wiley, c2003Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 CHI]
(1).
|
|
|
Security + guide to network security fundamentals / by Mark Ciampa
by Ciampa, Mark. Edition: 2nd ed.Publisher: Boston, Mass. : Course Technology / Thomson Learning, c2005Other title: Guide to network security fundamentals. | Network security fundamentals..Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 CIA]
(1).
|
|
|
Forensic discovery / Dan Farmer, Wietse Venema.
by Farmer, Dan | Venema, Wietse. Publisher: Upper Saddle River, NJ : Addison-Wesley, c2005Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 FAR 2005]
(1).
|
|
|
Virtualization and forensics : a digital forensic investigator's guide to virtual environments / Diane Barrett, Gregory Kipper.
by Barrett, Diane | Kipper, Gregory. Publisher: Burlington, MA : Elsevier/Syngress, c2010Availability: Items available for loan: Taylor's Library-TU
[Call number: 363.25968 BAR 2010]
(1).
|
|
|
The security risk assessment handbook : a complete guide for performing security risk assessments / Douglas J. Landoll.
by Landoll, Douglas J. Publisher: Boca Raton, FL : Auerbach Pub., 2006Availability: Items available for loan: Taylor's Library-TU
[Call number: 658.47 LAN 2006]
(1).
|
|
|
The web application hacker's handbook : discovering and exploiting security flaws / Dafydd Stuttard, Marcus Pinto.
by Stuttard, Dafydd, 1972- | Pinto, Marcus, 1978-. Publisher: Indianapolis, IN : Wiley Pub., c2008Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 STU 2008]
(1).
|
|
|
Dear Hacker : letters to the editor of 2600 / Emmanuel Goldstein.
by Goldstein, Emmanuel, 1959-. Publisher: Indianapolis, IN : Wiley Pub., c2010Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 GOL 2010]
(1).
|
|
|
24 deadly sins of software security : programming flaws and how to fix them / Michael Howard, David LeBlanc, and John Viega.
by Howard, Michael, 1965- | LeBlanc, David, 1960- | Viega, John. Publisher: New York, NY : McGraw-Hill, c2010Other title: Twenty four deadly sins of software security.Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 HOW 2010]
(1).
|
|
|
Handbook of information and communication security / Peter Stavroulakis, Mark Stamp, editors.
by Stavroulakis, Peter | Stamp, Mark. Publisher: Berlin : Springer, 2010Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 HAN 2010]
(1).
|
|
|
VMware vSphere and virtual infrastructure security : securing the virtual environment / Edward L. Haletky.
by Haletky, Edward L. Publisher: Upper Saddle River, NJ. : Prentice Hall, c2009Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 HAL 2009]
(1).
|
|
|
Managing cybersecurity resources : a cost-benefit analysis / by Lawrence A. Gordon and Martin P. Loeb.
by Gordon, Lawrence A | Loeb, Martin P. Publisher: New York : McGraw-Hill, c2006Availability: Items available for loan: Taylor's Library-TU
[Call number: 658.478 GOR]
(1).
|
|
|
Moving target defense II : application of game theory and adversarial modeling / Sushil Jajodia ... [et al.], editors.
by Jajodia, Sushil. Publisher: New York : Springer, c2013Other title: Moving target defense two.Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 MOV 2013]
(1).
|
|
|
Professional ASP.NET 3.5 security, membership, and role management with C# and VB / Bilal Haidar, Stefan Schackow.
by Haidar, Bilal | Schackow, Stefan, 1970-. Publisher: Indianapolis, IN : Wiley Pub., 2008Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.276 HAI]
(1).
|
|
|
Principles of information security / Michael E. Whitman and Herbert J. Mattord
by Whitman, Michael E, 1964- | Mattord, Herbert J. Edition: 3rd ed.Publisher: Boston, Mass. : Course Technology Cengage Learning, c2009Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 WHI 2009]
(1).
|
|
|
Risk analysis and security countermeasure selection / Thomas L. Norman.
by Norman, Thomas L. Publisher: Boca Raton, FL : CRC Press, 2010Availability: Items available for loan: Taylor's Library-TU
[Call number: 658.47 NOR 2010]
(1).
|
|
|
Distributed systems security : issues, processes and solutions / by Abhijit Belapurkar ... [et al.].
by Belapurkar, Abhijit. Publisher: Hoboken, NJ : John Wiley, c2009Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 DIS 2009]
(1).
|
|
|
Hacking exposed : web applications : web application security secrets and solutions / Joel Scambray, Vincent Liu, Caleb Sima.
by Scambray, Joel | Liu, Vincent | Sima, Caleb. Edition: 3rd ed.Publisher: San Francisco, CA : McGraw-Hill Companies, 2011Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 SCA 2011]
(2).
|
|
|
Computer forensics Jumpstart / Michael Solomon, Diane Barrett, Neil Broom.
by Solomon, Michael, (Michael G.), 1963- | Barrett, Diane | Broom, Neil. Publisher: San Francisco, Calif. : Sybex, 2005Availability: Items available for loan: Taylor's Library-TU
[Call number: 363.25968 SOL 2005]
(1).
|
|
|
Security 2020 : reduce security risks this decade / Doug Howard and Kevin Prince.
by Howard, Doug | Prince, Kevin. Edition: 1st ed.Publisher: Indianapolis, IN : Wiley Pub., c2011Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 HOW 2011]
(1).
|
|
|
Corporate computer security / Randall J. Boyle, Raymond R. Panko.
by Boyle, Randall J | Panko, Raymond R. Edition: 3rd ed.Publisher: Boston : Pearson, c2013Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 BOY 2013]
(1).
|