Your search returned 1226 results.

Not what you expected? Check for suggestions
|
The fiancée caper / Maureen Child.

by Child, Maureen.

Publisher: Don Mills, Ontario : Harlequin Enterprises Limited, [2014]Copyright date: ©2014Availability: Items available for loan: Taylor's Library-TU [Call number: 813.54 CHI 2014] (1).
Data-driven security : analysis, visualization and dashboards / Jay Jacobs + Bob Rudis.

by Jacobs, Jay (Data analyst) | Rudis, Bob.

Edition: 1st edition.Publisher: Indianapolis, IN : John Wiley & Sons Inc., [2014]Copyright date: ©2014Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 JAC 2014] (1).
Anti-hacker tool kit / Mike Shema.

by Shema, Mike.

Edition: Fourth edition.Publisher: New York : McGraw-Hill Education, [2014]Copyright date: ©2014Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 SHE 2014] (1).
Android hacker's handbook / Joshua J. Drake [and five others].

by Drake, Joshua J.

Publisher: Indiana, IN : John Wiley & Sons, Inc., [2014]Copyright date: ©2014Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 DRA 2014] (1).
Network security through data analysis : building situational awareness / Michael Collins.

by Collins, Michael (Michael S.).

Edition: First edition.Publisher: Sebastopol, CA : O'Reilly, [2014]Copyright date: ©2014Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 COL 2014] (1).
Ethical hacking and penetration testing guide / Rafay Baloch.

by Baloch, Rafay.

Publisher: Boca Raton : CRC Press, 2014Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 BAL 2014] (1).
Penetration testing : a hands-on introduction to hacking / by Georgia Weidman.

by Weidman, Georgia.

Publisher: San Francisco : No Starch Press, [2014]Copyright date: ©2014Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8092 WEI 2014] (1).
Cyber attack : the truth about digital crime, cyber warfare and goverment snooping / Paul Day.

by Day, Paul (Computer security expert).

Publisher: London : Carlton Books, 2014Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 DAY 2014] (1).
Security for multihop wireless networks / [edited by] Shafiullah Khan and Jaime Lloret Mauri.

by Khan, Shafiullah | Lloret Mauri, Jaime.

Publisher: Boca Raton, FL : CRC Press, Taylor & Francis Group, [2014]Copyright date: ©2014Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 SEC 2014] (1).
Secure data provenance and inference control with semantic web / Bhavani Thuraisingham, Tyrone Cadenhead, Murat Kantarcioglu, Vaibhav Khadilkar.

by Thuraisingham, Bhavani M | Cadenhead, Tyrone | Kantarcioglu, Murat | Khadilkar, Vaibhav.

Publisher: Boca Raton : CRC Press, Taylor & Francis Group, [2015]Copyright date: ©2015Availability: Items available for loan: Taylor's Library-TU [Call number: 025.0427028558 THU 2015] (1).
The secure information society [electronic resource] : ethical, legal and political challenges / Jörg Krüger, Bertram Nickolay, Sandro Gaycken, editors.

by Krüger, Jörg | Nickolay, Bertram | Gaycken, Sandro, 1973-.

Publisher: London ; New York : Springer, c2013Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for reference: Taylor's Library-TU [Call number: 005.8] (1).
The way of the knife : the CIA, a secret army, and a war at the ends of the Earth / Mark Mazzetti.

by Mazzetti, Mark.

Publisher: New York : Penguin Books, 2014Copyright date: ©2013Availability: Items available for loan: Taylor's Library-TU [Call number: 356.160973 MAZ 2014] (1).
Cybersecurity and cyberwar : what everyone needs to know / Peter W. Singer, Allan Friedman.

by Singer, P. W. (Peter Warren) | Friedman, Allan.

Publisher: New York : Oxford University Press, USA, [2014]Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for reference: Taylor's Library-TU [Call number: 005.8] (1).
Data security, data mining and data management : technologies and challenges / Serge O'Byrne, editor.

by O'Byrne, Serge [editor of compilation.].

Publisher: [Hauppauge] New York : Novinka, [2013]Copyright date: ©2013Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for reference: Taylor's Library-TU [Call number: 005.8] (1).
Intelligent systems for security informatics [electronic resource] / Christopher C. Yang ... [et al.].

by Yang, Christopher C.

Publisher: Oxford ; Waltham, MA : Academic Press, c2013Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for reference: Taylor's Library-TU [Call number: 005.8] (1).
Theory and practice of cryptography solutions for secure information systems [electronic resource] / Atilla Elci, Josef Pieprzyk, Alexander G. Chefranov, Mehmet A. Orgun, Huaxiong Wang and Rajan Shankaran, editors.

by Elçi, Atilla [editor of compilation.].

Publisher: Hershey, PA : Information Science Reference, 2013Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for reference: Taylor's Library-TU [Call number: 005.8] (1).
Security engineering for cloud computing [electronic resource] : approaches and tools / David G. Rosado, Daniel Mellado, Eduardo Fernandez-Medina, and Mario Piattini, editors.

by Rosado, David G, 1977- | IGI Global.

Publisher: Hershey, Pa. : IGI Global (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA), ©2013Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for reference: Taylor's Library-TU [Call number: 005.8] (1).
IT security governance innovations [electronic resource] : theory and research / Daniel Mellado ... [et al.], editors.

by Mellado, Daniel, 1980-.

Publisher: Hershey, Pa. : Information Science Reference, 2013Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for reference: Taylor's Library-TU [Call number: 005.8] (1).
Image encryption : a communication perspective / Fathi E. Abd El-Samie,Hossam Eldin H. Ahmed,Ibrahim F. Elashry,Mai H. Shahieen,Osama S. Faragallah, El-Sayed M. El-Rabaie,Saleh A. Alshebeili.

by Abd el-Samie, Fathi E.

Publisher: Boca Raton, [Florida] : CRC Press, [2013]Copyright date: ©2014Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for reference: Taylor's Library-TU [Call number: 006.6] (1).
Trustworthy execution on mobile devices / Amit Vasudevan, Jonathan M. McCune, James Newsome.

by Vasudevan, Amit [author.] | McCune, Jonathan M [author.] | Newsome, James [author.].

Publisher: New York, NY : Springer, [2013?]Copyright date: ©2014Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for reference: Taylor's Library-TU [Call number: 005.8] (1).