|
|
Maximum security : [a hacker's guide to protecting your internet site and network] / Anonymous Edition: 3rd ed.Publisher: Indianapolis, Ind. : Sams, c2001Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 MAX]
(2).
|
|
|
Developer's guide to web application security / Michael Cross.
by Cross, Michael. Publisher: Rockland, Mass. : Syngress Publishing, c2007Other title: Web application security..Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 CRO]
(1).
|
|
|
Information security for managers / Michael Workman, Daniel C. Phelps, John N. Gathegi.
by Workman, Michael D, 1957- | Phelps, Daniel C | Gathegi, John Ng'ang'a. Publisher: Burlington, MA : Jones & Bartlett Learning, c2013Availability: Items available for loan: Taylor's Library-TU
[Call number: 658.478 WOR 2013]
(1).
|
|
|
Guide to network defense and countermeasures / Greg Holden.
by Holden, Greg. Publisher: Boston, Mass. : Thomson/Course Technology, c2003Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 HOL]
(1).
|
|
|
Security + guide to network security fundamentals / by Mark Ciampa
by Ciampa, Mark. Edition: 2nd ed.Publisher: Boston, Mass. : Course Technology / Thomson Learning, c2005Other title: Guide to network security fundamentals. | Network security fundamentals..Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 CIA]
(1).
|
|
|
Cryptography and network security : principles and practice / William Stallings.
by Stallings, William. Edition: 3rd ed.Publisher: Upper Saddle River, N.J. : Prentice Hall, c2003Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 STA]
(1).
|
|
|
Hacking exposed 7 : network security secrets & solutions / Stuart Mcclure, Joel Scambray, George Kurtz.
by McClure, Stuart | McClure, Stuart | Scambray, Joel | Kurtz, George. Publisher: New York : McGraw-Hill, c2012Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 MAC 2012]
(2).
|
|
|
How to cheat at Configuring ISA Server 2004 [electronic resource] / Dr. Thomas W. Shinder.
by Shinder, Dr. Thomas W | ebrary, Inc. Publisher: Rockland, MA : Syngress Publishing, c2004Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan:
[Call number: 005.8]
(1).
|
|
|
Intrusion prevention and active response [electronic resource] : deploying network and host IPS / Michael Rash ... [et al.] ; technical reviewer, Anne Henmi.
by Henmi, Anne [rev] | Rash, Michael [aut] | ebrary, Inc. Publisher: Rockland, Mass. : Syngress Publishing, c2005Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan:
[Call number: 005.8]
(1).
|
|
|
Configuring SonicWALL firewalls [electronic resource] / Chris Lathem et al.
by Lathem, Chris | Bendell, Daniel H | Fortenberry, Benjamin W | Lynn, Kevin | Reed, Joshua | ebrary, Inc. Publisher: Rockland, MA : Syngress Publishing, c2006Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan:
[Call number: 005.8]
(1).
|
|
|
The misuse of information systems [electronic resource] : the impact of security countermeasures / John P. D'Arcy.
by D'Arcy, John P, 1975- | ebrary, Inc. Publisher: New York : LFB Scholarly Pub., 2007Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan:
[Call number: 005.8]
(1).
|
|
|
Management of information security / Michael Whitman, Herbert Mattord.
by Whitman, Michael E, 1964- | Mattord, Herbert J. Edition: Fifth edition.Publisher: Boston, MA : Cengage Learning, [2017]Copyright date: ©2017Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 WHI 2017]
(2).
|
|
|
Threat modeling : designing for security / Adam Shostack.
by Shostack, Adam [author.]. Publisher: Indianapolis, IN : John Wiley and Sons, [2014]Copyright date: ©2014Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan:
[Call number: 005.8]
(1).
|
|
|
Nessus, Snort, & Ethereal power tools [electronic resource] : customizing open source security applications / Neil Archibald, Gilbert Ramirez, Noam Rathaus ; Josh Burke, Brian Caswell, Renaud Deraison,technical editor[s].
by Archibald, Neil | Burke, Josh | Caswell, Brian | Deraison, Renaud | Ramirez, Gilbert | Rathaus, Noam | ebrary, Inc. Publisher: Rockland, Mass. : Syngress Pub., c2005Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan:
[Call number: 005.8]
(1).
|
|
|
Insider threat [electronic resource] : protecting the enterprise from sabotage, spying, and theft / Eric Cole, Sandra Ring.
by Cole, Eric | Ring, Sandra | ebrary, Inc. Publisher: Rockland, Mass. : [S.l.] : Syngress ; Distributed by O'Reilly Media, 2006Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan:
[Call number: 005.8]
(1).
|