|
|
Hacking exposed : network security secrets and solutions / Stuart McClure, Joel Scambray and George Kurtz
by McClure, Stuart | Kurtz, George [(j.a.)] | Scambray, Joel [(j.a.)]. Edition: 3rd ed.Publisher: New York : Osborne/McGraw-Hill, c2001Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 MAC]
(1).
|
|
|
Anti-hacker tool kit / Mike Shema, Bradley C. Johnson.
by Shema, Mike | Johnson, Bradley C. Edition: 2nd ed.Publisher: New York : McGraw-Hill/Osborne, c2004Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 SHE]
(1).
|
|
|
Security + guide to network security fundamentals / by Mark Ciampa
by Ciampa, Mark. Edition: 2nd ed.Publisher: Boston, Mass. : Course Technology / Thomson Learning, c2005Other title: Guide to network security fundamentals. | Network security fundamentals..Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 CIA]
(1).
|
|
|
Securing the clicks : network security in the age of social media / Gary Bahadur, Jason Inasi, Alex de Carvalho.
by Bahadur, Gary | Inasi, Jason | Carvalho, Alex de. Publisher: New York : McGraw-Hill, c2012Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 BAH 2012]
(2).
|
|
|
24 deadly sins of software security : programming flaws and how to fix them / Michael Howard, David LeBlanc, and John Viega.
by Howard, Michael, 1965- | LeBlanc, David, 1960- | Viega, John. Publisher: New York, NY : McGraw-Hill, c2010Other title: Twenty four deadly sins of software security.Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 HOW 2010]
(1).
|
|
|
Moving target defense II : application of game theory and adversarial modeling / Sushil Jajodia ... [et al.], editors.
by Jajodia, Sushil. Publisher: New York : Springer, c2013Other title: Moving target defense two.Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 MOV 2013]
(1).
|
|
|
SIP security / Dorgham Sisalem ... [et al.].
by Sisalem, Dorgham. Publisher: Chichester, U.K. : Wiley, c2009Other title: Sesssion Initiation Protocol security.Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 SIP 2009]
(1).
|
|
|
Principles of information security / Michael E. Whitman and Herbert J. Mattord
by Whitman, Michael E, 1964- | Mattord, Herbert J. Edition: 3rd ed.Publisher: Boston, Mass. : Course Technology Cengage Learning, c2009Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 WHI 2009]
(1).
|
|
|
Security in an IPv6 environment / Daniel Minoli, Jake Kouns.
by Minoli, Daniel, 1952- | Kouns, Jake. Publisher: Boca Raton, FL : CRC Press, c2009Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 MIN 2009]
(1).
|
|
|
Anti-hacker tool kit / Mike Shema ... [et al.]
by Shema, Mike | Jones, Keith J. (Keith John). Anti-hacker tool kit. Edition: 3rd ed.Publisher: New York : McGraw-Hill/Osborne, c2006Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 ANT 2006]
(2).
|
|
|
Hacking exposed : web applications : web application security secrets and solutions / Joel Scambray, Vincent Liu, Caleb Sima.
by Scambray, Joel | Liu, Vincent | Sima, Caleb. Edition: 3rd ed.Publisher: San Francisco, CA : McGraw-Hill Companies, 2011Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 SCA 2011]
(2).
|
|
|
Security information and event management (SIEM) implementation / David R. Miller ... [et al.].
by Miller, David, 1959-. Publisher: New York : McGraw-Hill, c2011Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 SEC 2011]
(1).
|
|
|
Firewall design and analysis / Alex X. Liu.
by Liu, Alex X. Publisher: Singapore : World Scientific, c2011Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 LIU 2011]
(1).
|
|
|
Computer forensics Jumpstart / Michael Solomon, Diane Barrett, Neil Broom.
by Solomon, Michael, (Michael G.), 1963- | Barrett, Diane | Broom, Neil. Publisher: San Francisco, Calif. : Sybex, 2005Availability: Items available for loan: Taylor's Library-TU
[Call number: 363.25968 SOL 2005]
(1).
|
|
|
Implementing SSL/TLS using cryptography and PKI / Joshua Davies.
by Davies, Joshua Dennis. Edition: 1st ed.Publisher: Indianapolis, IN : Wiley Pub., c2011Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 DAV 2011]
(1).
|
|
|
Corporate computer security / Randall J. Boyle, Raymond R. Panko.
by Boyle, Randall J | Panko, Raymond R. Edition: 3rd ed.Publisher: Boston : Pearson, c2013Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 BOY 2013]
(1).
|
|
|
Applied information security : a hands-on approach / David Basin, Patrick Schaller, Michael Schläpfer.
by Basin, David | Schaller, Patrick | Schläpfer, Michael. Publisher: Heidelberg : Springer, 2011Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 BAS 2011]
(1).
|
|
|
Reverse deception : organized cyber threat counter exploitation / Sean Bodmer, Dr. Max Kilger, Gregory Carpenter, Jade Jones.
by Bodmer, Sean. Publisher: New York : McGraw-Hill, c2012Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 BOD 2012]
(2).
|
|
|
Management of information security / Michael Whitman, Herbert Mattord.
by Whitman, Michael E, 1964- | Mattord, Herbert J. Edition: 2nd ed.Publisher: Boston, MA : Course Technology, Cengage Learning, c2008Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 WHI 2008]
(1).
|
|
|
Data-driven security : analysis, visualization and dashboards / Jay Jacobs + Bob Rudis.
by Jacobs, Jay (Data analyst) | Rudis, Bob. Edition: 1st edition.Publisher: Indianapolis, IN : John Wiley & Sons Inc., [2014]Copyright date: ©2014Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 JAC 2014]
(1).
|