Your search returned 243 results.

Not what you expected? Check for suggestions
|
Applied information security : a hands-on approach / David Basin, Patrick Schaller, Michael Schläpfer.

by Basin, David | Schaller, Patrick | Schläpfer, Michael.

Publisher: Heidelberg : Springer, 2011Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 BAS 2011] (1).
Information security : a practical approach / S.M. Bhaskar, S.I. Ahson.

by Bhaskar, S. M | Ahson, S. I.

Publisher: Oxford : Alpha Science Int., c2008Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 BHA 2008] (1).
Handbook of security and networks / editors, Yang Xiao, Frank H Li, Hui Chen.

by Xiao, Yang, 1966- | Li, Frank Haizhon | Chen, Hui, 972-.

Publisher: Singapore : World Scientific, 2011Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 HAN 2011] (1).
Web commerce security : design and development / Hadi Nahari, Ronald L. Krutz.

by Nahari, Hadi | Krutz, Ronald L.

Publisher: Indianapolis : John Wiley, c2011Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 NAH 2011] (1).
Reverse deception : organized cyber threat counter exploitation / Sean Bodmer, Dr. Max Kilger, Gregory Carpenter, Jade Jones.

by Bodmer, Sean.

Publisher: New York : McGraw-Hill, c2012Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 BOD 2012] (2).
Applied cyber security and the smart grid : implementing security controls into the modern power infrastructure / Eric D. Knapp, Raj Samani.

by Knapp, Eric D | Samani, Raj.

Publisher: Waltham, MA : Elsevier/Syngress, c2013Availability: Items available for loan: Taylor's Library-TU [Call number: 621.31028558 KNA 2013] (1).
Management of information security / Michael Whitman, Herbert Mattord.

by Whitman, Michael E, 1964- | Mattord, Herbert J.

Edition: 2nd ed.Publisher: Boston, MA : Course Technology, Cengage Learning, c2008Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 WHI 2008] (1).
Cryptography and network security : principles and practice / William Stallings.

by Stallings, William.

Edition: 7th ed.Publisher: Boston, MA : Pearson, c2014Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 STA 2014] (2).
Network security essentials : applications and standards / William Stallings.

by Stallings, William | Chandavarkar, B. R.

Edition: Fifth edition.International edition. / contributions by B.R. Chandavarker.Publisher: Harlow : Pearson Education Limited, [2014]Copyright date: ©2014Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 STA 2014] (1).
Data-driven security : analysis, visualization and dashboards / Jay Jacobs + Bob Rudis.

by Jacobs, Jay (Data analyst) | Rudis, Bob.

Edition: 1st edition.Publisher: Indianapolis, IN : John Wiley & Sons Inc., [2014]Copyright date: ©2014Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 JAC 2014] (1).
Anti-hacker tool kit / Mike Shema.

by Shema, Mike.

Edition: Fourth edition.Publisher: New York : McGraw-Hill Education, [2014]Copyright date: ©2014Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 SHE 2014] (1).
Network security through data analysis : building situational awareness / Michael Collins.

by Collins, Michael (Michael S.).

Edition: First edition.Publisher: Sebastopol, CA : O'Reilly, [2014]Copyright date: ©2014Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 COL 2014] (1).
Management of information security / Michael E. Whitman, Herbert J. Mattord.

by Whitman, Michael E, 1964- | Mattord, Herbert J.

Edition: Fourth edition.Publisher: Stamford, CT : Cengage Learning, [2014]Copyright date: ©2014Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 WHI 2014] (2).
Information security / Mark Rhodes-Ousley.

by Rhodes-Ousley, Mark | Bragg, Roberta. Network security.

Edition: Second edition.Publisher: New York : McGraw-Hill Education, [2013]Copyright date: ©2013Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 RHO 2013] (1).
How to cheat at securing Linux / Mohan Krishnamurthy ... [et al.].

by Krishnamurthy Madwachar, Mohan.

Publisher: Burlington, MA : Syngress, c2008Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 HOW] (1).
Designing network security / Merike Kaeo.

by KAEO, Marike.

Publisher: Indianapolis, Ind. : Macmillan Technical Pub., c1999Other title: Designing network security : a practical guide to creating a secure network infrastructure..Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 KAE] (2).
Network security essentials : applications and standards / William Stallings.

by Stallings, William.

Publisher: Upper Saddle River, N.J. : Prentice Hall, c2000Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 STA] (1).
Web security sourcebook / Aviel D. Rubin, Daniel Geer, Marcus J. Ranum.

by Rubin, Aviel D | Geer, Daniel | Ranum, Marcus J.

Publisher: New York : John Wiley, c1997Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 RUB] (2).
Hacking exposed : network security secrets and solutions / Stuart McClure, Joel Scrambray, George Kurtz

by McClure, Stuart | Kurtz, George [(j.a.).] | Scrambray, Joel [(j.a.).].

Publisher: Berkeley, Calif. : Osborne/McGrawHill , c1999Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 MCC] (1).
Cryptography and network security : principles and practice / William Stallings.

by Stallings, William [author.].

Edition: Seventh edition.Publisher: Hoboken, New Jersey : Pearson Education, Inc., [2017]Copyright date: ©2017Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 STA 2017] (1).