Your search returned 467 results.

Not what you expected? Check for suggestions
|
Network security assessment [electronic resource] : from vulnerability to patch / Steve Manzuik, André Gold, Chris Gatford ; [foreword by Mudge].

by Manzuik, Steve | Gatford, Chris | Gold, Andre | ebrary, Inc.

Publisher: Rockland, MA : Syngress Pub., c2007Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan: [Call number: 005.8] (1).
(ISC)2 CISSP certified information systems security professional : official study guide / Mike Chapple, James Michael Stewart, Darril Gibson.

by Chapple, Mike, 1975- [author.] | Stewart, James Michael [author.] | Gibson, Darril [author.].

Edition: Eighth edition.Publisher: Indianapolis, Indiana : John Wiley & Sons, [2018]Copyright date: ©2018Other title: CISSP certified information systems security professional official study guide | Certified information systems security professional official study guide | CISSP official study guide.Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8076 CHA 2018] (2).
Techno security's guide to e-discovery and digital forensics [electronic resource] / Jack Wiles, lead author ; Tammy Alexander ... [et al.].

by Wiles, Jack | ebrary, Inc.

Publisher: Burlington, Mass. : Syngress Publishing, c2007Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan: [Call number: 363.25968] (1).
Microsoft windows security fundamentals [electronic resource] / Jan De Clercq, Guido Grillenmeier.

by Clercq, Jan de, 1968- | Grillenmeier, Guido | ebrary, Inc.

Publisher: Burlington, MA : Elsevier Digital Press, c2007Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan: [Call number: 005.8] (1).
Trusted platform module basics [electronic resource] : using TPM in embedded systems / by Steven Kinney.

by Kinney, Steven | ebrary, Inc.

Publisher: Amsterdam ; Boston : Elsevier Newnes, c2006Online access: An electronic book accessible through the World Wide Web; click to view Availability: No items available
Principles of information security / Michael E. Whitman, Herbert J. Mattord.

by Whitman, Michael E, 1964- [author.] | Mattord, Herbert J [author.].

Edition: Sixth edition.Publisher: Boston, MA : Cengage Learning, [2018]Copyright date: ©2018Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 WHI 2018] (1).
Cybersecurity operations handbook [electronic resource] / John W. Rittinghouse, William M. Hancock.

by Rittinghouse, John W | Hancock, Bill, 1957- | ebrary, Inc.

Publisher: Amsterdam ; Boston : Elsevier Digital Press, c2003Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan: [Call number: 005.8] (1).
CISSP [electronic resource] : Certified Information Systems Security Professional study guide / James Michael Stewart, Ed Tittel, Mike Chapple.

by Stewart, James Michael | Tittel, Ed | Chapple, Mike | Tittel, Ed. CISSP | ebrary, Inc.

Edition: 3rd ed.Publisher: San Francisco : Sybex, c2005Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan: [Call number: 005.8] (1).
Combating spyware in the enterprise [electronic resource] / Brian Baskin ... [et al.] ; Tony Piltzecker, technical editor.

by Baskin, Brian | Piltzecker, Tony, 1975- | ebrary, Inc.

Publisher: Rockland, MA : Syngress, 2006Other title: Spyware in the enterprise.Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan: [Call number: 005.8] (1).
Essential computer security [electronic resource] : everyone's guide to e-mail, internet, and wireless security / Tony Bradley, Harlan Carvey.

by Bradley, Tony | Carvey, Harlan A | ebrary, Inc.

Publisher: Rockland, MA : Syngress Publishing, c2006Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan: [Call number: 005.8] (1).
Cloud computing : from beginning to end, cloud technology, design, and migration methodologies explained / Ray Rafaels.

by Rafaels, Ray [author.].

Edition: 2nd edition.Publisher: [Scotts Valley, California] : [CreateSpace Independent Publishing Platform], [2018]Copyright date: ©2018Availability: Items available for loan: Taylor's Library-TU [Call number: 004.6782 RAF 2018] (4).
Information assurance handbook : effective computer security and risk management strategies / Corey Schou, Steven Hernandez.

by Schou, Corey [author.] | Hernandez, Steven [author.].

Publisher: New York : McGraw-Hill Education, [2015]Copyright date: ©2015Availability: Items available for loan: Taylor's Library-TU [Call number: 658.478 SCH 2015] (2).
Mastering network security [electronic resource] / Chris Brenton, Cameron Hunt.

by Brenton, Chris | Hunt, Cameron | ebrary, Inc.

Edition: 2nd ed.Publisher: San Francisco : Sybex, c2003Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan: [Call number: 005.8] (1).
Management of information security / Michael E. Whitman, Herbert J. Mattord.

by Whitman, Michael E, 1964- [author.] | Mattord, Herbert J [author.].

Edition: Sixth edition.Publisher: Boston, MA : Cengage Learning, [2019]Copyright date: ©2019Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 WHI 2019] (1).
Intelligent watermarking techniques [electronic resource] / editors, Jeng-Shyang Pan, Hsiang-Cheh Huang, Lakhmi C. Jain.

by Pan, Jeng-Shyang | Huang, Hsiang-Cheh | Jain, L. C | ebrary, Inc.

Publisher: River Edge, N.J. : World Scientific, c2004Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan: [Call number: 005.8/2] (1).
Bluetooth security [electronic resource] / Christian Gehrmann, Joakim Persson, Ben Smeets.

by Gehrmann, Christian | Persson, Joakim | Smeets, Ben | ebrary, Inc.

Publisher: Boston : Artech House, c2004Online access: An electronic book accessible through the World Wide Web; click to view Availability: No items available
User's guide to cryptography and standards [electronic resource] / Alexander W. Dent, Chris J. Mitchell.

by Dent, Alexander W | Mitchell, Chris | ebrary, Inc.

Publisher: Boston : Artech House, c2005Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan: [Call number: 005.8] (1).
Privacy protection and computer forensics [electronic resource] / Michael A. Caloyannides.

by Caloyannides, Michael A | Caloyannides, Michael A. Computer forensics and privacy | ebrary, Inc.

Edition: 2nd ed.Publisher: Boston : Artech House, c2004Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan: [Call number: 005.8] (1).
Techniques and applications of digital watermarking and content protection [electronic resource] / Michael Arnold, Martin Schmucker, Stephen D. Wolthusen.

by Arnold, Michael (Michael Konrad), 1964- | Schmucker, Martin | Wolthusen, Stephen D | ebrary, Inc.

Publisher: Boston : Artech House, c2003Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan: [Call number: 005.8] (1).
Security technologies for the World Wide Web [electronic resource] / Rolf Oppliger.

by Oppliger, Rolf | ebrary, Inc.

Edition: 2nd ed.Publisher: Boston ; London : Artech House, c2003Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan: [Call number: 005.8] (1).