Your search returned 82 results.

Not what you expected? Check for suggestions
|
Windows forensic analysis DVD toolkit / Harlan Carvey; Eoghan Casey, technical editor.

by Carvey, Harlan.

Edition: 2nd ed.Publisher: Burlington, MA : Syngress Publ., c2009Availability: Items available for loan: Taylor's Library-TU [Call number: 363.250968 CAR 2009] (2).
Digital forensics for network, Internet, and cloud computing : a forensic evidence guide for moving targets and data / Terrence V. Lillard ... [et al.] ; technical editor, Jim Murray.

by Lillard, Terrence.

Publisher: Burlington, MA : Elsevier/Syngress, c2010Availability: Items available for loan: Taylor's Library-TU [Call number: 363.25968 GAR 2010] (1).
The art of software security assessment : identifying and preventing software vulnerabilities / Mark Dowd, John McDonald, Justin Schuh.

by Dowd, Mark | McDonald, John, 1977- | Schuh, Justin.

Publisher: Upper Saddle River, NJ : Addison-Wesley, c2007Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 DOW 2007] (1).
The management of network security : technology, design, and management control / Houston H. Carr, Charles A. Snyder, and Bliss N. Bailey.

by Carr, Houston H, 1937- | Snyder, Charles A | Bailey, Bliss N.

Publisher: Upper Saddle River, N.J. : Prentice Hall, c2010Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 CAR 2010] (1).
Introduction to network security / Douglas Jacobson.

by Jacobson, Douglas.

Publisher: Boca Raton : CRC Press, c2009Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 JAC 2009] (1).
Hacking wireless networks for dummies / by Kevin Beaver and Peter T. Davis ; foreword by Devin K. Akin.

by Beaver, Kevin | Davis, Peter T | Akin, Devin K.

Publisher: Indianapolis, IN : Wiley Pub., c2005Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 BEA 2005] (1).
Software security engineering : a guide for project managers / Julia H. Allen, Sean Barnum, Robert J. Ellison, Gary McGraw, Nancy R. Mead.

by Allen, Julia H [author.] | Barnum, Sean [author.] | Ellison, Robert J [author.] | McGraw, Gary, 1966- [author.] | Mead, Nancy R [author.].

Publisher: Upper Saddle River, NJ : Addison-Wesley, [2008]Publisher: ©2008Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 ALL 2008] (1).
Principles of information security / Michael E. Whitman, Herbert J. Mattord.

by Whitman, Michael E, 1964- [author.] | Mattord, Herbert J [author.].

Edition: Sixth edition.Publisher: Boston, MA : Cengage Learning, [2018]Copyright date: ©2018Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 WHI 2018] (1).
Management of information security / Michael E. Whitman, Herbert J. Mattord.

by Whitman, Michael E, 1964- [author.] | Mattord, Herbert J [author.].

Edition: Sixth edition.Publisher: Boston, MA : Cengage Learning, [2019]Copyright date: ©2019Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 WHI 2019] (1).
24 deadly sins of software security : programming flaws and how to fix them / Michael Howard, David LeBlanc, and John Viega.

by Howard, Michael, 1965- | LeBlanc, David, 1960- | Viega, John.

Publisher: New York, NY : McGraw-Hill, c2010Other title: Twenty four deadly sins of software security.Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 HOW 2010] (1).
Cryptography and network security : principles and practice / William Stallings.

by Stallings, William.

Edition: 5th ed.Publisher: Boston, MA : Prentice Hall, c2011Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 STA 2011] (2).
Moving target defense II : application of game theory and adversarial modeling / Sushil Jajodia ... [et al.], editors.

by Jajodia, Sushil.

Publisher: New York : Springer, c2013Other title: Moving target defense two.Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 MOV 2013] (1).
Hacking exposed 6 : network security secrets & solutions / Stuart McClure, Joel Scambray, George Kurtz.

by McClure, Stuart | Scambray, Joel | Kurtz, George.

Edition: 10th anniversary ed.Publisher: New York : McGraw-Hill, c2009Other title: Hacking exposed six | Hacking 6 exposed.Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 MAC] (1).
Network security bible / by Eric Cole, Ronald Krutz, James W. Conley.

by Cole, Eric | Krutz, Ronald L, 1938- | Conley, James W.

Edition: 2nd ed.Publisher: Indianapolis, IN : Wiley Pub., c2009Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 COL 2009] (1).
Principles of information security / Michael E. Whitman and Herbert J. Mattord

by Whitman, Michael E, 1964- | Mattord, Herbert J.

Edition: 3rd ed.Publisher: Boston, Mass. : Course Technology Cengage Learning, c2009Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 WHI 2009] (1).
A multidisciplinary introduction to information security / [edited by] Stig F. Mjølsnes.

by Mjølsnes, Stig F.

Publisher: Boca Raton, FL : CRC Press, c2012Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 MUL 2012] (3).