|
|
Intrusion signatures and analysis / Stephen Northcutt ... [et al.]
by Northcutt, Stephen. Edition: 1st ed.Publisher: Indianapolis, Ind. : New Riders, c2001Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 INT]
(1).
|
|
|
Maximum security : [a hacker's guide to protecting your internet site and network] / Anonymous Edition: 3rd ed.Publisher: Indianapolis, Ind. : Sams, c2001Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 MAX]
(2).
|
|
|
Maximum Linux security : [a hacker's guide to protecting your Linux server and workstation] / Anonymous
by Ray, John, 1971-. Edition: 2nd ed. / with revisions by John Ray.Publisher: Indianapolis, Ind. : Sams, c2001Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 MAX]
(1).
|
|
|
Developer's guide to web application security / Michael Cross.
by Cross, Michael. Publisher: Rockland, Mass. : Syngress Publishing, c2007Other title: Web application security..Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 CRO]
(1).
|
|
|
Guide to computer forensics and investigation / Bill Nelson ... [et al.].
by Nelson, Bill. Publisher: Boston : Thomson/Course Technology, c2004Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 GUI]
(1).
|
|
|
Applied cryptography : protocols, algorithms, and source code in C / Bruce Schneier.
by Schneier, Bruce, 1963-. Edition: 2nd ed.Publisher: New York : Wiley, c1996Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.82 SCH]
(3).
|
|
|
Sams teach yourself Linux Security basics in 24 hours / Aron Hsiao.
by Hsiao, Aron. Publisher: Indianapolis, IN : Sams, c2001Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 HSI]
(1).
|
|
|
Computer forensics for dummies / Linda Volonino and Reynaldo Anzaldua.
by Volonino, Linda | Anzaldua, Reynaldo. Publisher: Indianapolis, IN : Wiley Pub., c2008Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 VOL 2008]
(1).
|
|
|
Guide to network defense and countermeasures / Greg Holden.
by Holden, Greg. Publisher: Boston, Mass. : Thomson/Course Technology, c2003Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 HOL]
(1).
|
|
|
Cryptography and network security : principles and practice / William Stallings.
by Stallings, William. Edition: 3rd ed.Publisher: Upper Saddle River, N.J. : Prentice Hall, c2003Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 STA]
(1).
|
|
|
Hacking exposed computer forensics : secrets & solutions / Chris Davis, David Cowen, Aaron Philipp.
by Davis, Chris (Christopher Michael) | Cowen, David | Philipp, Aaron. Publisher: New York : McGraw-Hill/Osborne, c2005Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 DAV]
(1).
|
|
|
Unofficial guide to ethical hacking / Ankit Fadia.
by Fadia, Ankit, 1985-. Edition: 2nd ed.Publisher: Boston, MA : Thomson/Course Technology, c2006Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 FAD]
(1).
|