Your search returned 467 results.

Not what you expected? Check for suggestions
|
zSeries crypto guide update [electronic resource] / [Chris Rayns ... et al.].

by Rayns, Chris | International Business Machines Corporation. International Technical Support Organization | ebrary, Inc.

Edition: 1st ed.Publisher: [S.l.] : IBM, International Technical Support Organization, 2003Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan: [Call number: 005.8/2] (1).
An introduction to security in a CSM 1.3 for AIX 5L environment [electronic resource] / [Octavian Lascu ... et al.].

by Lascu, Octavian | International Business Machines Corporation. International Technical Support Organization | ebrary, Inc.

Edition: 1st ed.Publisher: [S.l.] : IBM International Technical Support Organization, 2002Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan: [Call number: 005.8] (1).
The disaster recovery handbook [electronic resource] : a step-by-step plan to ensure business continuity and protect vital operations, facilities, and assets / Michael Wallace and Lawrence Webber.

by Wallace, Michael, 1960- | Webber, Larry | ebrary, Inc.

Publisher: New York : American Management Association, c2004Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan: [Call number: 658.4/77] (1).
Multilevel security and DB2 row-level security revealed [electronic resource] / [Chris Rayns ... et al.].

by Rayns, Chris | International Business Machines Corporation. International Technical Support Organization | ebrary, Inc.

Edition: 1st ed.Publisher: San Jose, CA : IBM, International Technical Support Organization, c2005Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan: [Call number: 005.8] (1).
Secure computer and network systems [electronic resource] : modeling, analysis and design / Nong Ye.

by Ye, Nong | ebrary, Inc.

Publisher: Chichester, England ; Hoboken, NJ : J. Wiley, c2008Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan: [Call number: 005.8] (1).
Cybersecurity today and tomorrow [electronic resource] : pay now or pay later / Computer Science and Telecommunications Board, Division of Engineering and Physical Sciences, National Research Council.

by ebrary, Inc.

Publisher: Washington, D.C. : National Academy Press, c2002Other title: Cyber security today and tomorrow.Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan: [Call number: 005.8] (1).
19 deadly sins of software security : programming flaws and how to fix them / Michael Howard, David LeBlanc and John Viega

by Howard, Michael, 1965- | LeBlanc, David, 1960- | Viega, John.

Publisher: Emeryville, California : McGraw-Hill/Osborne, c2005Other title: Nineteen deadly sins of software security..Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 HOW] (1).
Algorithms, architectures and information systems security [electronic resource] / editors, Bhargab B. Bhattacharya ... [et al.].

by Bhattacharya, Bhargab B | ebrary, Inc | International Conference on Information Systems Security (2nd : 2006 : Calcutta, India) | International Conference on Computing: Theory and Applications (2007 : Calcutta, India).

Publisher: New Jersey : World Scientific, c2009Online access: An electronic book accessible through the World Wide Web; click to view Availability: No items available
Fuzzing for software security testing and quality assurance [electronic resource] / Ari Takanen, Jared DeMott, Charlie Miller.

by Takanen, Ari | Demott, Jared D | Miller, Charles, 1951- | ebrary, Inc.

Publisher: Boston : Artech House, c2008Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan: [Call number: 005.8] (1).
Innocent code [electronic resource] : a security wake-up call for Web programmers / Sverre H. Huseby.

by Huseby, Sverre H | ebrary, Inc.

Publisher: New York : John Wiley, c2004Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan: [Call number: 005.8] (1).
Reversing [electronic resource] : secrets of reverse engineering / Eldad Eilam ; [foreward by Elliot Chikofsky].

by Eilam, Eldad | Chikofsky, Elliot J | ebrary, Inc.

Publisher: Indianapolis, IN : Wiley, c2005Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan: [Call number: 005.1] (1).
Security sage's guide to hardening the network infrastructure [electronic resource] / Steven Andres, Brian Kenyon.

by Andres, Steven | Kenyon, Brian | ebrary, Inc.

Publisher: Rockland, MA : Syngress, c2004Online access: An electronic book accessible through the World Wide Web; click to view Availability: No items available
Special issue on internet security [electronic resource] / Guest editors Matthew Warren, William Hutchinson and Gurpreet Dhillon.

by Dhillon, Gurpreet | Hutchinson, William | Warren, Matt | ebrary, Inc.

Publisher: Bradford, England : Emerald Group Pub, c2002Online access: An electronic book accessible through the World Wide Web; click to view Availability: No items available
Click, click, who's there? [electronic resource] : a family-based non-technical approach to help parents protect their children online / written by Koh.

by Koh | ebrary, Inc.

Publisher: Charlotte, NC : LHK Pub., c2004Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan: [Call number: 025.04] (1).
Implementing PKI Services on z/OS [electronic resource] / [Chris Rayns ... et al.].

by Rayns, Chris | International Business Machines Corporation. International Technical Support Organization | ebrary, Inc.

Edition: 1st ed.Publisher: [S.l.] : IBM, International Technical Support Organization, c2004Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan: [Call number: 005.8] (1).
Invasion of privacy! [electronic resource] : big brother and the company hackers / Michael Weber.

by Weber, Michael | ebrary, Inc.

Publisher: Boston : Premier Press, 2004Online access: An electronic book accessible through the World Wide Web; click to view Availability: No items available
Windows forensic analysis [electronic resource] : DVD toolkit, / Harlan Carvey.

by Carvey, Harlan A | ebrary, Inc.

Publisher: Burlington, MA : Syngress Pub., c2007Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan: [Call number: 363.250968] (1).
Cloud computing security : foundations and challenges / editor, John R. Vacca.

by Vacca, John R, 1947-.

Publisher: Boca Raton : CRC Press, [2017]Copyright date: ©2017Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for reference: Taylor's Library-TU [Call number: 005.8 C647] (1).
Analysis, design, and implementation of secure and interoperable distributed health information systems [electronic resource] / Bernd Blobel.

by Blobel, Bernd | ebrary, Inc.

Publisher: Amsterdam ; Washington, DC : IOS Press, c2002Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan: [Call number: 651.5/04261] (1).
Multilevel modeling of secure systems in QoP-ML / Bogdan Ksie̜żopolski.

by Ksie̜żopolski, Bogdan.

Publisher: Boca Raton : CRC Press, [2016]Copyright date: ©2016Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for reference: Taylor's Library-TU [Call number: 005.8 K949] (1).