|
|
Targeted cyber attacks : multi-staged attacks driven by exploits and malware / Aditya K Sood, Richard Enbody.
by Sood, Aditya K [author.] | Enbody, Richard [author.]. Publisher: Amsterdam ; Boston : Syngress, 2014Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan:
[Call number: 005.8]
(1).
|
|
|
What every engineer should know about cyber security and digital forensics / Joanna F. DeFranco.
by DeFranco, Joanna F [author.]. Publisher: Boca Raton : CRC Press, [2013]Copyright date: ©2014Other title: Cyber security and digital forensics.Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan:
[Call number: 005.8]
(1).
|
|
|
Network anomaly detection [electronic resource] : a machine learning perspective / authors, Dhruba Kumar Bhattacharyya, Jugal Kumar Kalita.
by Bhattacharyya, Dhruba K. Publisher: Boca Raton : CRC Press, 2013Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for reference: Taylor's Library-TU
[Call number: 005.8]
(1).
|
|
|
Network security through data analysis : building situational awareness, 1 million log records at a time / by Michael Collins.
by Collins, Michael (Michael Patrick) [author.]. Publisher: Beijing : O'Reilly, 2014Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for reference: Taylor's Library-TU
[Call number: 005.8]
(1).
|
|
|
Security for cloud storage systems [electronic resource] / Kan Yang, Xiaohua Jia.
by Yang, Kan | Jia, Xiaohua. Publisher: New York : Springer-Verlag, c2014Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for reference: Taylor's Library-TU
[Call number: 005.8]
(1).
|
|
|
Management of information security / Michael E. Whitman, Herbert J. Mattord.
by Whitman, Michael E, 1964- | Mattord, Herbert J. Edition: Fourth edition.Publisher: Stamford, CT : Cengage Learning, [2014]Copyright date: ©2014Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 WHI 2014]
(2).
|
|
|
Information security / Mark Rhodes-Ousley.
by Rhodes-Ousley, Mark | Bragg, Roberta. Network security. Edition: Second edition.Publisher: New York : McGraw-Hill Education, [2013]Copyright date: ©2013Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 RHO 2013]
(1).
|
|
|
Principles of information security / Michael E. Whitman, Herbert J. Mattord.
by Whitman, Michael E, 1964-. Edition: Fourth edition.Publisher: Australia : Course Technology, Cengage Learning, [2012]Copyright date: ©2012Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 PRI 2012 | 005.8 WHI 2012]
(2).
|
|
|
How to cheat at securing Linux / Mohan Krishnamurthy ... [et al.].
by Krishnamurthy Madwachar, Mohan. Publisher: Burlington, MA : Syngress, c2008Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 HOW]
(1).
|
|
|
Implementing 802.1X security solutions for wired and wireless networks [electronic resource] / Jim Geier.
by Geier, James T | ebrary, Inc. Publisher: Indianapolis, IN : Wiley, c2008Online access: An electronic book accessible through the World Wide Web; click to view Availability: No items available
|
|
|
Designing network security / Merike Kaeo.
by KAEO, Marike. Publisher: Indianapolis, Ind. : Macmillan Technical Pub., c1999Other title: Designing network security : a practical guide to creating a secure network infrastructure..Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 KAE]
(2).
|
|
|
Network security essentials : applications and standards / William Stallings.
by Stallings, William. Publisher: Upper Saddle River, N.J. : Prentice Hall, c2000Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 STA]
(1).
|
|
|
Web security sourcebook / Aviel D. Rubin, Daniel Geer, Marcus J. Ranum.
by Rubin, Aviel D | Geer, Daniel | Ranum, Marcus J. Publisher: New York : John Wiley, c1997Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 RUB]
(2).
|
|
|
Hacking exposed : network security secrets and solutions / Stuart McClure, Joel Scrambray, George Kurtz
by McClure, Stuart | Kurtz, George [(j.a.).] | Scrambray, Joel [(j.a.).]. Publisher: Berkeley, Calif. : Osborne/McGrawHill , c1999Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 MCC]
(1).
|
|
|
Cryptography and network security : principles and practice / William Stallings.
by Stallings, William [author.]. Edition: Seventh edition.Publisher: Hoboken, New Jersey : Pearson Education, Inc., [2017]Copyright date: ©2017Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 STA 2017]
(1).
|
|
|
Network security essentials : applications and standards / William Stallings.
by Stallings, William [author.]. Edition: Sixth edition.Publisher: Hoboken, New Jersey : Pearson Education, Inc., [2017]Publisher: ©2017Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 STA 2017]
(1).
|
|
|
Java network security / Robert MacGregor ... [et al.]
by MacGregor, Robert S. Publisher: Upper Saddle River, N.J. : Prentice Hall PTR, c1998Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 JAV]
(2).
|
|
|
Java 2 network security / Marco Pistoia ... [et al.]
by Pistoia, Marco. Edition: 2nd ed.Publisher: Upper Saddle River, N.J. : Prentice Hall PTR, c1999Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 JAV]
(1).
|
|
|
IT compliance and controls [electronic resource] : best practices for implementation / James J. DeLuccia IV.
by DeLuccia, James J, 1977- | ebrary, Inc. Publisher: Hoboken, N.J. : John Wiley, c2008Online access: An electronic book accessible through the World Wide Web; click to view Availability: No items available
|
|
|
Hacking exposed : network security secrets & solutions / Joel Scambray, Stuart McClure, George Kurtz
by Scambray, Joel | Kurtz, George [(j.a.)] | McClure, Stuart [(j.a.)]. Edition: 2nd ed.Publisher: Berkeley, Calif. : Osborne/McGraw-Hill, c2001Availability: Items available for loan: TC External Storage
[Call number: 005.8 SCA]
(1).
|