Your search returned 467 results.

Not what you expected? Check for suggestions
|
Cryptography and network security : principles and practice / William Stallings.

by Stallings, William.

Edition: 4th ed.Publisher: New Delhi : Prentice Hall of India, 2008Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 STA 2008] (1).
Security without obscurity : a guide to PKI operations / J.J. Stapleton, W. Clay Epstein.

by Stapleton, Jeffrey James | Epstein, W. Clay.

Publisher: Boca Raton, Florida : CRC Press, [2016]Copyright date: ©2016Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for reference: Taylor's Library-TU [Call number: 005.8 S794] (1).
Introduction to certificateless cryptography / Hu Xiong, Zhen Qin, and Athanasios V. Vasilakos.

by Xiong, Hu | Qin, Zhen, 1982- [author.] | Vasilakos, Athanasios.

Publisher: Boca Raton : Taylor & Francis, a CRC title, part of the Taylor & Francis imprint, a member of the Taylor & Francis Group, the academic division of T&F Informa, plc, [2017]Copyright date: ©2017Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for reference: Taylor's Library-TU [Call number: 005.82 X6] (1).
Implementing cybersecurity : a guide to the National Institute of Standards in Technology Risk Management Framework / Anne Kohnke, Dan Shoemaker, and Ken Sigler.

by Kohnke, Anne | Shoemaker, Dan | Sigler, Kenneth.

Publisher: Boca Raton, Fla. : CRC Press, 2017Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for reference: Taylor's Library-TU [Call number: 005.8 K796] (1).
Best damn firewall book period [electronic resource] / Thomas W. Shinder, Cheri Amon, Robert J. Shimonski, Debra Littlejohn Shinder.

by Shinder, Thomas W | Amon, Cheri | Shimonski, Robert | Shinder, Debra Littlejohn | ebrary, Inc.

Publisher: Rockland, Mass. : Syngress, 2003Online access: An electronic book accessible through the World Wide Web; click to view Availability: No items available
Hacking [electronic resource] : the art of exploitation / by Jon Erickson.

by Erickson, Jon (Jon Mark), 1977- | ebrary, Inc.

Publisher: San Francisco : No Starch Press, c2003Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan: [Call number: 005.8] (1).
Hacking the code [electronic resource] : ASP. NET web application security / Mark M. Burnett; James C. Foster.

by Burnett, Mark (Mark M.) | Foster, James C | ebrary, Inc.

Publisher: Rockland, MA : Syngress, 2004Online access: An electronic book accessible through the World Wide Web; click to view Availability: No items available
How to cheat at designing security for a Windows Server 2003 network [electronic resource] / Rob Amini ... [et al.] ; Laura E. Hunter, technical editor.

by Amini, Rob [aut] | Hunter, Laura E [edt] | ebrary, Inc.

Publisher: Rockland, Mass. : Syngress Pub., c2006Other title: Designing security.Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan: [Call number: 005.8] (1).
zSeries Trusted Key Entry (TKE) version 4.2 update [electronic resource] / [Patrick Kappeler, Pekka Hanninen].

by Kappeler, Patrick | Hanninen, Pekka | International Business Machines Corporation. International Technical Support Organization | ebrary, Inc.

Edition: 1st ed.Publisher: [S.l.] : IBM, International Technical Support Organization, c2004Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan: [Call number: 005.8] (1).
Securing information and communications systems [electronic resource] : principles, technologies, and applications / Steven M. Furnell ... [et al.], editors.

by Furnell, Steven, 1970- | ebrary, Inc.

Publisher: Boston : Artech House, c2008Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan: [Call number: 005.8] (1).
Introduction to identity-based encryption [electronic resource] / Luther Martin.

by Martin, Luther | ebrary, Inc.

Publisher: Boston : Artech House, c2008Online access: An electronic book accessible through the World Wide Web; click to view Availability: No items available
Trust and security in collaborative computing / Xukai Zou, Yuan-Shun Dai, Yi Pan.

by Zou, Xukai, 1963- | Dai, Yuan-Shun | Pan, Yi, 1960-.

Publisher: Singapore : World Scientific, c2008Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 ZOU 2008] (1).
Papers from the first European workshop on technological & security issues in digital rights management (EuDiRights) [electronic resource] / guest editor Mariemma Yagüe.

by Yague, Mariemma | ebrary, Inc.

Publisher: Bradford, England : Emerald Group Pub, c2007Online access: An electronic book accessible through the World Wide Web; click to view Availability: No items available
CCSP complete study guide [electronic resource] : 642-501, 642-511, 642-521, 642-531, 642-541 / Wade Edwards ... [et al.].

by ebrary, Inc.

Publisher: Alameda, Calif. : Sybex, c2005Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan: [Call number: 004.6] (1).
Information [electronic resource] : getting, protecting and using data.

by ebrary, Inc.

Publisher: Boston, Mass. : Technology Research News, 2003Online access: An electronic book accessible through the World Wide Web; click to view Availability: No items available
Role-based access control [electronic resource] / David F. Ferraiolo, D. Richard Kuhn, Ramaswamy Chandramouli.

by Ferraiolo, David | Chandramouli, Ramaswamy | Kuhn, D. Richard | ebrary, Inc.

Edition: 2nd ed.Publisher: Boston : Artech House, c2007Online access: An electronic book accessible through the World Wide Web; click to view Availability: No items available
Mastering FreeBSD and OpenBSD security [electronic resource] / Yanek Korff, Paco Hope, and Bruce Potter.

by Korff, Yanek | Hope, Paco | Potter, Bruce | Safari Tech Books Online.

Edition: 1st ed.Publisher: Sebastopol, CA : O'Reilly, c2005Availability: No items available
Hacking exposed Windows : Windows security secrets and solutions / Joel Scambray, Stuart McClure.

by Scambray, Joel | McClure, Stuart.

Edition: 3rd ed.Publisher: New York, NY : McGraw-Hill, 2008Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 SCA 2008] (1).
Securing HP NonStop servers in an open systems world [electronic resource] : TCP/IP, OSS & SQL / XYPRO Technology.

by XYPRO Technology Corporation | ebrary, Inc.

Publisher: Burlington, MA : Elsevier Digital Press, c2006Online access: An electronic book accessible through the World Wide Web; click to view Availability: No items available