Your search returned 467 results.

Not what you expected? Check for suggestions
|
Security in a Web 2.0+ world : a standards based approach / C. Solari and contributors.

by Solari, C. (Carlos).

Publisher: Chichester, West Sussex : John Wiley c2009Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 SOL 2009] (1).
Host integrity monitoring [electronic resource] : using Osiris and Samhain / Brian Wotring ; Bruce Potter, technical editor ; for[e]word by Marcus J. Ranum.

by Wotring, Brian | Potter, Bruce | ebrary, Inc.

Publisher: Rockland, Mass. : Syngress Pub., c2005Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan: [Call number: 005.8] (1).
Programmer's ultimate security deskref [electronic resource] / James C. Foster, Stephen C. Foster.

by Foster, James | Foster, Stephen C | ebrary, Inc.

Publisher: Rockland, MA : Syngress Publishing, c2004Online access: An electronic book accessible through the World Wide Web; click to view Availability: No items available
Network interdiction and stochastic integer programming [electronic resource] / edited by David L. Woodruff.

by Woodruff, David L | ebrary, Inc.

Publisher: Boston : Kluwer Academic Publishers, 2003Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan: [Call number: 005.8] (1).
Implementing database security and auditing [electronic resource] / Roy [i.e. Ron] Ben Natan.

by Ben-Natan, Ron | ebrary, Inc.

Publisher: Boston : Digital Press, 2005Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan: [Call number: 005.8] (1).
Managing cybersecurity resources : a cost-benefit analysis / by Lawrence A. Gordon and Martin P. Loeb.

by Gordon, Lawrence A | Loeb, Martin P.

Publisher: New York : McGraw-Hill, c2006Availability: Items available for loan: Taylor's Library-TU [Call number: 658.478 GOR] (1).
Toward a safer and more secure cyberspace [electronic resource] / Committee on Improving Cybersecurity Research in the United States, Computer Science and Telecommunications Board, Division on Engineering and Physical Sciences, National Research Council of the National Academies ; Seymour E. Goodman and Herbert S. Lin, editors.

by Goodman, Seymour E | Lin, Herbert | ebrary, Inc | National Research Council (U.S.). Committee on Improving Cybersecurity Research in the United States.

Publisher: Washington, DC : National Academies Press, c2007Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan: [Call number: 005.8] (1).
Linux firewalls [electronic resource] : attack detection and response with iptables, psad, and fwsnort / Michael Rash.

by Rash, Michael | ebrary, Inc.

Publisher: San Francisco : No Starch Press, c2007Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan: [Call number: 005.8] (1).
Security data visualization [electronic resource] : graphical techniques for network analysis / Greg Conti.

by Conti, Greg | ebrary, Inc.

Publisher: San Francisco : No Starch Press, c2007Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan: [Call number: 005.8] (1).
Cyber adversary characterization [electronic resource] : auditing the hacker mind / Tom Parker ... [et al.] ; foreword by Jeff Moss.

by Parker, Tom | ebrary, Inc.

Publisher: Rockland, MA : Syngress, c2004Online access: An electronic book accessible through the World Wide Web; click to view Availability: No items available
Homeland security techniques and technologies [electronic resource] / Jesus Mena.

by Mena, Jesus | ebrary, Inc.

Publisher: Hingham, MA : Charles River Media, c2004Online access: An electronic book accessible through the World Wide Web; click to view Availability: No items available
Technological turf wars [electronic resource] : a case study of the computer antivirus industry / Jessica Johnston.

by Johnston, Jessica R, 1952- | ebrary, Inc.

Publisher: Philadelphia : Temple University Press, 2009Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan: [Call number: 005.8] (1).
Aggressive network self-defense [electronic resource] / Neil R. Wyler.

by Wyler, Neil R | ebrary, Inc.

Publisher: Rockland, MA : Syngress Publishing, c2005Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan: [Call number: 005.8] (1).
Buffer overflow attacks [electronic resource] : detect, exploit, prevent / James C. Foster, Vitaly Osipov, Nish Bhalla, Neils Heinen.

by Foster, James C | Bhalla, Nish | Heinen, Neils | Osipov, Vitaly | ebrary, Inc.

Publisher: Rockland, MA : Syngress Publishing, c2005Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan: [Call number: 005.8] (1).
Black hat physical device security [electronic resource] : exploiting hardware and software / Drew Miller.

by Miller, Drew | ebrary, Inc.

Publisher: Rockland, MA : Syngress Publishing, c2005Online access: An electronic book accessible through the World Wide Web; click to view Availability: No items available
The official CHFI exam 312-49 study guide [electronic resource] : for computer hacking forensics investigators.

by Kleiman, Dave | ebrary, Inc.

Publisher: Burlington, Mass. : Syngress Pub., c2007Other title: Exam 312-49 study guide.Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan: [Call number: 005.8] (1).
Summary of discussions at a planning meeting on cyber-security and the insider threat to classified information [electronic resource] / Computer Science and Telecommunications Board.

by National Research Council (U.S.). Computer Science and Telecommunications Board | ebrary, Inc.

Publisher: Washington, D.C. : National Academy Press, c2000Online access: An electronic book accessible through the World Wide Web; click to view Availability: No items available
Network security foundations [electronic resource] / Matthew Strebe.

by Strebe, Matthew | ebrary, Inc.

Publisher: San Francisco : Sybex, c2004Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan: [Call number: 005.8] (1).
Dr. Tom Shinder's configuring ISA Server 2004 [electronic resource] / Thomas W. Shinder, Debra Littlejohn Shinder ; technical editor, Martin Grasdal.

by Shinder, Thomas W | Shinder, Debra Littlejohn [aut] | Grasdal, Martin [edt] | ebrary, Inc.

Publisher: Rockland, Mass. : Syngress Publishing, c2005Other title: Configuring ISA Server 2004 | ISA Server 2004.Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan: [Call number: 005.8] (1).
Configuring NetScreen Firewalls [electronic resource] / Rob Cameron, Christopher Cantrell, Dave Killion, Kevin Russell, Kenneth Tam.

by Cameron, Rob | Cantrell, Christopher | Killion, Dave | Russell, Kevin | Tam, Kenneth | ebrary, Inc.

Publisher: Rockland, MA : Syngress Publishing, c2005Online access: An electronic book accessible through the World Wide Web; click to view Availability: No items available