Your search returned 243 results.

Not what you expected? Check for suggestions
|
Security in an IPv6 environment / Daniel Minoli, Jake Kouns.

by Minoli, Daniel, 1952- | Kouns, Jake.

Publisher: Boca Raton, FL : CRC Press, c2009Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 MIN 2009] (1).
A multidisciplinary introduction to information security / [edited by] Stig F. Mjølsnes.

by Mjølsnes, Stig F.

Publisher: Boca Raton, FL : CRC Press, c2012Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 MUL 2012] (3).
Practical risk management for the CIO / Mark Scherling.

by Scherling, Mark.

Publisher: Boca Raton, FL : Auerbach Publications, c2011Availability: Items available for loan: Taylor's Library-TU [Call number: 658.478 SCH 2011] (1).
Virtual honeypots : from botnet tracking to intrusion detection / Niels Provos, Thorsten Holz.

by Provos, Niels | Holz, Thorsten.

Publisher: Upper Saddle River, NJ : Addison-Wesley, c2008Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 PRO 2008] (1).
Practical intrusion analysis : prevention and detection for the twenty-first century / Ryan Trost.

by Trost, Ryan.

Publisher: Upper Saddle River, NJ : Addison-Wesley, 2010Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 TRO 2010] (1).
Anti-hacker tool kit / Mike Shema ... [et al.]

by Shema, Mike | Jones, Keith J. (Keith John). Anti-hacker tool kit.

Edition: 3rd ed.Publisher: New York : McGraw-Hill/Osborne, c2006Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 ANT 2006] (2).
Hacking exposed : web applications : web application security secrets and solutions / Joel Scambray, Vincent Liu, Caleb Sima.

by Scambray, Joel | Liu, Vincent | Sima, Caleb.

Edition: 3rd ed.Publisher: San Francisco, CA : McGraw-Hill Companies, 2011Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 SCA 2011] (2).
Security information and event management (SIEM) implementation / David R. Miller ... [et al.].

by Miller, David, 1959-.

Publisher: New York : McGraw-Hill, c2011Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 SEC 2011] (1).
Intrusion detection : a machine learning approach / Zhenwei Yu, Jeffrey J. P. Tsai.

by Yu, Zhenwei | Tsai, Jeffrey J. P.

Publisher: London : Imperial College Press, 2011Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 YUZ 2011] (1).
Firewall design and analysis / Alex X. Liu.

by Liu, Alex X.

Publisher: Singapore : World Scientific, c2011Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 LIU 2011] (1).
Guide to firewalls and network security : intrusion detection and VPNs / Michael E. Whitman ... [et al.]

by Whitman, Michael E, 1964- | Holden, Greg. Guide to firewalls and network security.

Edition: 2nd ed.Publisher: Boston, Mass. : Course Technology/Cengage Learning, 2009Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 HOL 2009] (1).
Computer forensics Jumpstart / Michael Solomon, Diane Barrett, Neil Broom.

by Solomon, Michael, (Michael G.), 1963- | Barrett, Diane | Broom, Neil.

Publisher: San Francisco, Calif. : Sybex, 2005Availability: Items available for loan: Taylor's Library-TU [Call number: 363.25968 SOL 2005] (1).
Digital security : cyber terror and cyber security / Ananda Mitra

by Mitra, Ananda, 1960-.

Publisher: New York : Chelsea House, c2010Availability: Items available for loan: Taylor's Library-TU [Call number: 364.168 MIT 2010] (1).
IT auditing : using controls to protect information assets / Chris Davis, Mike Schiller ; with Kevin Wheeler.

by Davis, Chris (Christopher Michael) | Schiller, Mike | Wheeler, Kevin.

Edition: 2nd ed.Publisher: New York, N.Y. : McGraw-Hill, c2011Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 DAV 2011] (3).
Privacy online : perspectives on privacy and self-disclosure in the social web / Sabine Trepte, Leonard Reinecke, editors.

by Trepte, Sabine | Reinecke, Leonard.

Publisher: Heidelberg : Springer, 2011Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 PRI 2011] (1).
Principles of information security / Michael E. Whitman, Herbert J. Mattord.

by Whitman, Michael E, 1964- | Mattord, Herbert J.

Edition: 4th ed.Publisher: Boston, MA : Course Technology/Cengage Learning, c2012Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 WHI 2012] (2).
Corporate computer security / Randall J. Boyle, Raymond R. Panko.

by Boyle, Randall J | Panko, Raymond R.

Edition: 3rd ed.Publisher: Boston : Pearson, c2013Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 BOY 2013] (1).
Management of information security / Michael Whitman, Herbert Mattord.

by Whitman, Michael E, 1964- | Mattord, Herbert J.

Edition: 3rd ed.Publisher: Boston : Course Technology Cengage Learning, c2010Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 WHI 2010] (2).
Computer security fundamentals / Chuck Easttom.

by Easttom, Chuck.

Edition: 2nd ed.Publisher: Indianapolis, IN : Pearson, c2012Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 EAS 2012] (1).
Defense against the black arts : how hackers do what they do and how to protect against it / Jesse Varsalone, Matthew McFadden ; with Sean Morrissey ... [et al.] ; foreword by Joe McCray.

by Varsalone, Jesse | McFadden, Matthew.

Publisher: Boca Raton, FL : CRC Press, c2012Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 VAR 2012] (1).