Your search returned 1226 results.

Not what you expected? Check for suggestions
|
Cruise industry safety and security : developments and consideratons / Brennan T. Preston, editor.

by Preston, Brennan T [editor.].

Publisher: New York : Nova Publishers, 2014Copyright date: ©2014Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for reference: Taylor's Library-TU [Call number: 910.45] (1).
What every engineer should know about cyber security and digital forensics / Joanna F. DeFranco.

by DeFranco, Joanna F [author.].

Publisher: Boca Raton : CRC Press, [2013]Copyright date: ©2014Other title: Cyber security and digital forensics.Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan: [Call number: 005.8] (1).
Network anomaly detection [electronic resource] : a machine learning perspective / authors, Dhruba Kumar Bhattacharyya, Jugal Kumar Kalita.

by Bhattacharyya, Dhruba K.

Publisher: Boca Raton : CRC Press, 2013Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for reference: Taylor's Library-TU [Call number: 005.8] (1).
Network security through data analysis : building situational awareness, 1 million log records at a time / by Michael Collins.

by Collins, Michael (Michael Patrick) [author.].

Publisher: Beijing : O'Reilly, 2014Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for reference: Taylor's Library-TU [Call number: 005.8] (1).
Security for cloud storage systems [electronic resource] / Kan Yang, Xiaohua Jia.

by Yang, Kan | Jia, Xiaohua.

Publisher: New York : Springer-Verlag, c2014Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for reference: Taylor's Library-TU [Call number: 005.8] (1).
Introduction to modern cryptography / Jonathan Katz, University of Maryland, College Park, MD, USA, Yehuda Lindell, Bar-llan University, Ramat Gan, Israel.

by Katz, Jonathan, 1974- | Lindell, Yehuda.

Edition: Second edition.Publisher: Boca Raton : CRC Press/Taylor & Francis, [2015]Copyright date: ©2015Availability: Items available for loan: Taylor's Library-TU [Call number: 005.82 KAT 2015] (1).
Management of information security / Michael E. Whitman, Herbert J. Mattord.

by Whitman, Michael E, 1964- | Mattord, Herbert J.

Edition: Fourth edition.Publisher: Stamford, CT : Cengage Learning, [2014]Copyright date: ©2014Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 WHI 2014] (2).
IT governance : an international guide to data security and ISO27001/ISO27002 / Alan Calder and Steve Watkins.

by Calder, Alan, 1957- | Watkins, Steve, 1970-.

Edition: Fifth edition.Publisher: London ; Philadelphia : Kogan Page, 2012Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 CAL 2012] (2).
Information security / Mark Rhodes-Ousley.

by Rhodes-Ousley, Mark | Bragg, Roberta. Network security.

Edition: Second edition.Publisher: New York : McGraw-Hill Education, [2013]Copyright date: ©2013Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 RHO 2013] (1).
Cloud management and security / Imad M. Abbadi.

by Abbadi, Imad M.

Publisher: Chichester, West Sussex, United Kingdom : Wiley, 2014Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for reference: Taylor's Library-TU [Call number: 004.67/82] (1).
Incident response & computer forensics / Jason T. Luttgens, Matthew Pepe, and Kevin Mandia.

by Pepe, Matthew.

Edition: Third edition.Publisher: New York : McGraw-Hill Education, [2014]Copyright date: ©2014Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 PEP 2014] (3).
Technology disaster response and recovery planning : a LITA guide / edited by Mary Mallery.

by Mallery, Mary.

Publisher: Chicago : ALA TechSource, an imprint of the American Library Association, 2015Availability: Items available for loan: Taylor's Library-TU [Call number: 025.82 TEC 2015] (1).
Social media security [electronic resource] : leveraging social networking while mitigating risk / by Michael Cross.

by Cross, Michael, 1965-.

Publisher: Rockland : Syngress, 2014Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for reference: Taylor's Library-TU [Call number: 658.472] (1).
Want, waste or war? : the global resource nexus and the struggle for land, energy, food, water and minerals / Philip Andrews-Speed, Raimund Bleischwitz, Tim Boersma, Corey Johnson, Geoffrey Kemp and Stacy D. Vandeveer.

by Andrews-Speed, C. P | Bleischwitz, Raimund | Boersma, Tim | Johnson, Corey, 1975- | Kemp, Geoffrey | VanDeveer, Stacy D.

Publisher: London ; New York : Routledge, Taylor & Francis Group, 2015Availability: Items available for loan: Taylor's Library-TU [Call number: 333.7 AND 2015] (1).
Cyberterrorism : understanding, assessment, and response / Thomas M. Chen, Lee Jarvis, Stuart Macdonald, editors.

by Chen, Thomas M [editor.] | Jarvis, Lee, 1979- [editor.] | Macdonald, Stuart [editor.].

Publisher: New York, NY : Springer, 2014Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for reference: Taylor's Library-TU [Call number: 364.168] (1).
Cyber reconnaissance, surveillance, and defense [electronic resource] / Robert Shimonski ; Allison Bishop, technical editor.

by Shimonski, Robert.

Publisher: Amsterdam : Elsevier/Syngress, 2014Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for reference: Taylor's Library-TU [Call number: 327.12] (1).
Hacking and penetration testing with low power devices [electronic resource] / Philip Polstra.

by Polstra, Philip.

Publisher: Burlington : Elsevier Science, 2014Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for reference: Taylor's Library-TU [Call number: 005.8] (1).
Secure development for mobile apps : how to design and code secure mobile applications with PHP and JavaScript / J.D. Glaser ; foreword by Jeremiah Grossman.

by Glaser, J. D [author.] | Grossman, Jeremiah [author of introduction, etc.].

Publisher: Boca Raton, Florida : CRC Press, [2015]Copyright date: ©2015Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for reference: Taylor's Library-TU [Call number: 005.75] (1).
Trusted communications with physical layer security for 5G and beyond [electronic resource] / Prof. Trung Q. Duong (trung.q.duong@qub.ac.uk)*; Dr. Xiangyun (Sean) Zhou (xiangyun.zhou@anu.edu.au); Prof. H. Vincent Poor (poor@princeton.edu) [Eds].

by Duong, Trung Q | Zhou, Xiangyun | Poor, H. Vincent.

Publisher: Stevenage : IET, 2017Online access: An electronic book accessible through the World Wide Web; click to view Availability: No items available
Want, waste or war? : the global resource nexus and the struggle for land, energy, food, water and minerals / Philip Andrews-Speed [and others].

by Andrews-Speed, C. P.

Publisher: Abingdon, Oxon ; New York, NY : Routledge, 2015Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for reference: Taylor's Library-TU [Call number: 333.7] (1).