Your search returned 1225 results.

Not what you expected? Check for suggestions
|
Hacking exposed : network security secrets and solutions / Stuart McClure, Joel Scambray and George Kurtz

by McClure, Stuart | Kurtz, George [(j.a.)] | Scambray, Joel [(j.a.)].

Edition: 3rd ed.Publisher: New York : Osborne/McGraw-Hill, c2001Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 MAC] (1).
Intrusion signatures and analysis / Stephen Northcutt ... [et al.]

by Northcutt, Stephen.

Edition: 1st ed.Publisher: Indianapolis, Ind. : New Riders, c2001Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 INT] (1).
Maximum security : [a hacker's guide to protecting your internet site and network] / Anonymous

Edition: 3rd ed.Publisher: Indianapolis, Ind. : Sams, c2001Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 MAX] (2).
Maximum Linux security : [a hacker's guide to protecting your Linux server and workstation] / Anonymous

by Ray, John, 1971-.

Edition: 2nd ed. / with revisions by John Ray.Publisher: Indianapolis, Ind. : Sams, c2001Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 MAX] (1).
The computer incident response planning handbook : executable plans for potecting information at risk / N.K. McCarthy.

by McCarthy, N. K.

Publisher: New York : McGraw-Hill, c2012Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 MAC 2012] (2).
Dealing with difficult people in the library / Mark R. Willis

by Willis, Mark R.

Publisher: Chicago, Ill. : American Library Association, c1999Availability: Items available for loan: Taylor's Library-TU [Call number: 025.5 WIL] (1).
The disaster recovery handbook : a step-by-step plan to ensure business continuity and protect vital operations, facilities, and assets / Michael Wallace, Lawrence Webber.

by Wallace, Michael, 1960- | Webber, Larry.

Edition: 2nd ed.Publisher: New York, N.Y. : American Management Association, c2011Availability: Items available for loan: Taylor's Library-TU [Call number: 658.477 WAL 2011] (2).
Countering terrorism : can we meet the threat of global violence? / Michael Chandler and Rohan Gunaratna.

by Chandler, Michael, 1938- | Gunaratna, Rohan, 1961-.

Publisher: London : Reaktion, 2007Availability: Items available for loan: Taylor's Library-TU [Call number: 363.325 CHA] (1).
NISER ICT security survey for Malaysia 2000/2001.

by ACNielsen | National ICT Security and Emergency Response Centre (NISER).

Publisher: [Kuala Lumpur] : NISER, c2002Availability: Items available for loan: Taylor's Library-TC [Call number: 005.8 NIS 2002] (1).
Webster's new world hacker dictionary / Bernadette Schell and Clemens Martin.

by Schell, Bernadette H. (Bernadette Hlubik), 1952- | Martin, Clemens.

Publisher: Indianapolis, IN : Wiley Pub., c2006Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8003 SCH] (1).
Multimedia security technologies for digital rights management / edited by Wenjun Zeng, Heather Yu, Ching-Yung Lin.

by Zeng, Wenjun, 1967- | Yu, Hong Heather, 1967- | Lin, Ching-Yung.

Publisher: Boston : Academic Press, c2006Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 MUL] (1).
Developer's guide to web application security / Michael Cross.

by Cross, Michael.

Publisher: Rockland, Mass. : Syngress Publishing, c2007Other title: Web application security..Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 CRO] (1).
Climate change and food security in South Asia / Rattan Lal ... [et al.], editors.

by Lal, R | International Symposium on Climate Change and Food Security in South Asia (2008 : Dhaka, Bangladesh).

Publisher: Dordrecht : Springer, c2011Availability: Items available for loan: Taylor's Library-TU [Call number: 363.8 CLI 2011] (1).
Malaysian critical issues / Kua Kia Soong.

by Kua, Kia Soong.

Publisher: Petaling Jaya : Strategic Information Research Development, c2002Availability: Items available for loan: Taylor's Library-TC [Call number: 959.5 KUA 2002] (4).
Internet security : cryptographic principles, algorithms, and protocols / Man Young Rhee

by Rhee, Man Young.

Publisher: Chichester, England : John Wiley, c2003Availability: Items available for loan: Taylor's Library-TU [Call number: 005.82 RHE] (1).