Your search returned 243 results.

Not what you expected? Check for suggestions
|
Handbook of research on information and cyber security in the fourth industrial revolution / Ziska Fields, editor.

by Fields, Ziska, 1970- [editor.] | IGI Global [publisher.].

Publisher: Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) : IGI Global, [2018]Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for reference: Taylor's Library-TU [Call number: 658.4/78] (1).
Network security essentials : applications and standards / William Stallings.

by Stallings, William.

Edition: 4th ed.Publisher: Upper Saddle River, N.J. : Pearson, c2011Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 STA 2011] (2).
The art of software security assessment : identifying and preventing software vulnerabilities / Mark Dowd, John McDonald, Justin Schuh.

by Dowd, Mark | McDonald, John, 1977- | Schuh, Justin.

Publisher: Upper Saddle River, NJ : Addison-Wesley, c2007Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 DOW 2007] (1).
The management of network security : technology, design, and management control / Houston H. Carr, Charles A. Snyder, and Bliss N. Bailey.

by Carr, Houston H, 1937- | Snyder, Charles A | Bailey, Bliss N.

Publisher: Upper Saddle River, N.J. : Prentice Hall, c2010Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 CAR 2010] (1).
Hacking wireless networks for dummies / by Kevin Beaver and Peter T. Davis ; foreword by Devin K. Akin.

by Beaver, Kevin | Davis, Peter T | Akin, Devin K.

Publisher: Indianapolis, IN : Wiley Pub., c2005Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 BEA 2005] (1).
Configuring Symantec Antivirus, Corporate Edition [electronic resource] / Laura E. Hunter ... [et al.] ; Robert J. Shimonski, technical editor.

by Hunter, Laura E | Shimonski, Robert | ebrary, Inc.

Publisher: Rockland, Mass. : Syngress, c2003Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan: [Call number: 005.8] (1).
Integrated security systems design [electronic resource] : concepts, specifications, and implementation / Thomas Norman.

by Norman, Thomas L | ebrary, Inc.

Publisher: Amsterdam ; London : Elsevier/Butterworth-Heinemann, c2007Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan: [Call number: 005.8] (1).
Trust and security in collaborative computing [electronic resource] / Xukai Zou, Yuan-Shun Dai, Yi Pan.

by Zou, Xukai, 1963- | Dai, Yuan-Shun | Pan, Yi, 1960- | ebrary, Inc.

Publisher: Hackensack, NJ : World Scientific, c2008Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan: [Call number: 005.8] (1).
The Internet under crisis conditions [electronic resource] : learning from September 11 / Committee on the Internet Under Crisis Conditions: Learning from September 11, Computer Science and Telecommunications Board, Division on Engineering and Physical Sciences, National Research Council of the National Academies.

by ebrary, Inc.

Publisher: Washington, D.C. : National Academies Press, c2003Online access: An electronic book accessible through the World Wide Web; click to view Availability: No items available
Software security engineering : a guide for project managers / Julia H. Allen, Sean Barnum, Robert J. Ellison, Gary McGraw, Nancy R. Mead.

by Allen, Julia H [author.] | Barnum, Sean [author.] | Ellison, Robert J [author.] | McGraw, Gary, 1966- [author.] | Mead, Nancy R [author.].

Publisher: Upper Saddle River, NJ : Addison-Wesley, [2008]Publisher: ©2008Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 ALL 2008] (1).
Network security assessment [electronic resource] : from vulnerability to patch / Steve Manzuik, André Gold, Chris Gatford ; [foreword by Mudge].

by Manzuik, Steve | Gatford, Chris | Gold, Andre | ebrary, Inc.

Publisher: Rockland, MA : Syngress Pub., c2007Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan: [Call number: 005.8] (1).
Techno security's guide to e-discovery and digital forensics [electronic resource] / Jack Wiles, lead author ; Tammy Alexander ... [et al.].

by Wiles, Jack | ebrary, Inc.

Publisher: Burlington, Mass. : Syngress Publishing, c2007Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan: [Call number: 363.25968] (1).
Cybersecurity operations handbook [electronic resource] / John W. Rittinghouse, William M. Hancock.

by Rittinghouse, John W | Hancock, Bill, 1957- | ebrary, Inc.

Publisher: Amsterdam ; Boston : Elsevier Digital Press, c2003Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan: [Call number: 005.8] (1).
Learning-based vanet communication and security techniques / Liang Xiao, Weihua Zhuang, Sheng Zhou, Cailian Chen.

by Xiao, Liang, 1980- [author.] | Zhuang, Weihua [author.] | Zhou, Sheng [author.] | Chen, Cailian [author.].

Publisher: Cham, Switzerland : Springer, [2019]Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for reference: Taylor's Library-TU [Call number: 004.68] (1).
Introduction to communication electronic warfare systems [electronic resource] / Richard Poisel.

by Poisel, Richard | ebrary, Inc.

Publisher: Boston, MA : Artech House, c2002Online access: An electronic book accessible through the World Wide Web; click to view Availability: No items available
Defense and detection strategies against Internet worms [electronic resource] / Jose Nazario.

by Nazario, Jose | ebrary, Inc.

Publisher: Boston : Artech House, c2004Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan: [Call number: 005.8] (1).
Hacking [electronic resource] : the art of exploitation / Jon Erickson.

by Erickson, Jon, 1977- | ebrary, Inc.

Edition: 2nd ed.Publisher: San Francisco, Calif. : No Starch Press, c2008Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan: [Call number: 005.8] (1).
Developer's guide to web application security [electronic resource] / Michael Cross.

by Cross, Michael | ebrary, Inc.

Publisher: Rockland, MA : Syngress Publishing, c2007Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan: [Call number: 005.8] (1).
Cloud security and privacy / Tim Mather, Subra Kumaraswamy, and Shahed Latif.

by Mather, Tim | Kumaraswamy, Subra | Latif, Shahed.

Edition: 1st ed.Publisher: Sebastopol, CA : O'Reilly, c2009Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 MAT 2009] (1).
Artificial intelligence and security challenges in emerging networks / Ryma Abassi, editor.

by Abassi, Ryma, 1980- [editor.].

Publisher: Hershey, PA : Engineering Science Reference, [2019]Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for reference: Taylor's Library-TU [Call number: 006.3] (1).