|
|
Windows forensic analysis DVD toolkit / Harlan Carvey; Eoghan Casey, technical editor.
by Carvey, Harlan. Edition: 2nd ed.Publisher: Burlington, MA : Syngress Publ., c2009Availability: Items available for loan: Taylor's Library-TU
[Call number: 363.250968 CAR 2009]
(2).
|
|
|
Digital forensics for network, Internet, and cloud computing : a forensic evidence guide for moving targets and data / Terrence V. Lillard ... [et al.] ; technical editor, Jim Murray.
by Lillard, Terrence. Publisher: Burlington, MA : Elsevier/Syngress, c2010Availability: Items available for loan: Taylor's Library-TU
[Call number: 363.25968 GAR 2010]
(1).
|
|
|
The art of software security assessment : identifying and preventing software vulnerabilities / Mark Dowd, John McDonald, Justin Schuh.
by Dowd, Mark | McDonald, John, 1977- | Schuh, Justin. Publisher: Upper Saddle River, NJ : Addison-Wesley, c2007Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 DOW 2007]
(1).
|
|
|
The management of network security : technology, design, and management control / Houston H. Carr, Charles A. Snyder, and Bliss N. Bailey.
by Carr, Houston H, 1937- | Snyder, Charles A | Bailey, Bliss N. Publisher: Upper Saddle River, N.J. : Prentice Hall, c2010Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 CAR 2010]
(1).
|
|
|
Introduction to network security / Douglas Jacobson.
by Jacobson, Douglas. Publisher: Boca Raton : CRC Press, c2009Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 JAC 2009]
(1).
|
|
|
Hacking wireless networks for dummies / by Kevin Beaver and Peter T. Davis ; foreword by Devin K. Akin.
by Beaver, Kevin | Davis, Peter T | Akin, Devin K. Publisher: Indianapolis, IN : Wiley Pub., c2005Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 BEA 2005]
(1).
|
|
|
Software security engineering : a guide for project managers / Julia H. Allen, Sean Barnum, Robert J. Ellison, Gary McGraw, Nancy R. Mead.
by Allen, Julia H [author.] | Barnum, Sean [author.] | Ellison, Robert J [author.] | McGraw, Gary, 1966- [author.] | Mead, Nancy R [author.]. Publisher: Upper Saddle River, NJ : Addison-Wesley, [2008]Publisher: ©2008Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 ALL 2008]
(1).
|
|
|
Principles of information security / Michael E. Whitman, Herbert J. Mattord.
by Whitman, Michael E, 1964- [author.] | Mattord, Herbert J [author.]. Edition: Sixth edition.Publisher: Boston, MA : Cengage Learning, [2018]Copyright date: ©2018Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 WHI 2018]
(1).
|
|
|
Management of information security / Michael E. Whitman, Herbert J. Mattord.
by Whitman, Michael E, 1964- [author.] | Mattord, Herbert J [author.]. Edition: Sixth edition.Publisher: Boston, MA : Cengage Learning, [2019]Copyright date: ©2019Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 WHI 2019]
(1).
|
|
|
24 deadly sins of software security : programming flaws and how to fix them / Michael Howard, David LeBlanc, and John Viega.
by Howard, Michael, 1965- | LeBlanc, David, 1960- | Viega, John. Publisher: New York, NY : McGraw-Hill, c2010Other title: Twenty four deadly sins of software security.Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 HOW 2010]
(1).
|
|
|
Cryptography and network security : principles and practice / William Stallings.
by Stallings, William. Edition: 5th ed.Publisher: Boston, MA : Prentice Hall, c2011Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 STA 2011]
(2).
|
|
|
Moving target defense II : application of game theory and adversarial modeling / Sushil Jajodia ... [et al.], editors.
by Jajodia, Sushil. Publisher: New York : Springer, c2013Other title: Moving target defense two.Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 MOV 2013]
(1).
|
|
|
Hacking exposed 6 : network security secrets & solutions / Stuart McClure, Joel Scambray, George Kurtz.
by McClure, Stuart | Scambray, Joel | Kurtz, George. Edition: 10th anniversary ed.Publisher: New York : McGraw-Hill, c2009Other title: Hacking exposed six | Hacking 6 exposed.Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 MAC]
(1).
|
|
|
Network security bible / by Eric Cole, Ronald Krutz, James W. Conley.
by Cole, Eric | Krutz, Ronald L, 1938- | Conley, James W. Edition: 2nd ed.Publisher: Indianapolis, IN : Wiley Pub., c2009Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 COL 2009]
(1).
|
|
|
Principles of information security / Michael E. Whitman and Herbert J. Mattord
by Whitman, Michael E, 1964- | Mattord, Herbert J. Edition: 3rd ed.Publisher: Boston, Mass. : Course Technology Cengage Learning, c2009Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 WHI 2009]
(1).
|
|
|
A multidisciplinary introduction to information security / [edited by] Stig F. Mjølsnes.
by Mjølsnes, Stig F. Publisher: Boca Raton, FL : CRC Press, c2012Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 MUL 2012]
(3).
|