Your search returned 467 results.

Not what you expected? Check for suggestions
|
Google Hacking for Penetration Testers [electronic resource] / Johnny Long.

by Long, Johnny | Cantrell, Christopher | Killion, Dave | Russell, Kevin | Tam, Kenneth | ebrary, Inc.

Publisher: Rockland, MA : Syngress Publishing, c2005Online access: An electronic book accessible through the World Wide Web; click to view Availability: No items available
Security and access control using biometric technologies / Robert Newman.

by Newman, Robert.

Publisher: Boston, MA : Course Technology/Cengage Learning, c2010Availability: Items available for loan: Taylor's Library-TU [Call number: 006.4 NEW 2010] (1).
A practical guide to managing information security [electronic resource] / Steve Purser.

by Purser, Steve | ebrary, Inc.

Publisher: Boston, MA : Artech House, 2004Online access: An electronic book accessible through the World Wide Web; click to view Availability: No items available
Cyber spying [electronic resource] : tracking your family's (sometimes) secret online lives / Ted Fair, Michael Nordfelt, Sandra Ring, Eric Cole, technical editor.

by Fair, Ted | Cole, Eric | Nordfelt, Michael | Ring, Sandra | ebrary, Inc.

Publisher: Rockland, MA : Syngress Publishing, c2005Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan: [Call number: 004.678] (1).
Security+ guide to network security fundamentals / by Mark Ciampa.

by Ciampa, Mark D.

Edition: 3rd ed.Publisher: Boston, MA. : Course Technology/ Cengage Learning, c2009Other title: Security plus guide to network security fundamentals, Network security fundamentals.Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 CIA 2009] (4).
Smarter energy [electronic resource] : from smart metering to the smart grid / Hongjian Sun, Hongjian.sun@durham.ac.uk; Nikolaos Hatziargyriou, nh@power.ece.ntua.gr; H. Vincent Poor, poor@princeton.edu; Industry editor (to be confirmed) (Eds).

by Sun, Hongjian | Hatziargyriou, Nikos D | Poor, H. Vincent | Carpanini, Laurence | Sǹchez Forni,̌ Miguel Angel.

Publisher: Stevenage : IET, 2016Online access: An electronic book accessible through the World Wide Web; click to view Availability: No items available
Security awareness : applying practical security in your world / Mark Ciampa.

by Ciampa, Mark D.

Edition: 2nd ed.Publisher: Boston, Mass. : Thomson/Course Technology, 2007Availability: Items available for loan: Taylor's Library-TU [Call number: 658.478 CIA] (1).
Engineering secure internet of things systems [electronic resource] / Benjamin Aziz; benjamin.aziz@port.ac.uk Alvaro Arenas; alvaro.arenas@ie.edu Bruno Crispo; crispo@disi.unitn.it.

by Aziz, Benjamin | Arenas, Alvaro | Crispo, Bruno.

Publisher: Stevenage : IET, 2016Online access: An electronic book accessible through the World Wide Web; click to view Availability: No items available
Moving target defense II : application of game theory and adversarial modeling / Sushil Jajodia ... [et al.], editors.

by Jajodia, Sushil.

Publisher: New York : Springer, c2013Other title: Moving target defense two.Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 MOV 2013] (1).
Hack proofing Linux: a guide to open source security [electronic resource] : the only way to stop a hacker is to think like one / James Stanger, Patrick T. Lane.

by Stanger, James | Lane, Patrick T | ebrary, Inc.

Publisher: Rockland, Mass. : London : Syngress Media ; International Thomson, c2001Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan: [Call number: 005.8] (1).
Configuring ISA server 2000 [electronic resource] : building firewalls for windows 2000 / [Thomas W. Shinder, Debra Littlejohn Shinder ; Martin Grasdal, technical editor].

by Shinder, Thomas W | Shinder, Debra Littlejohn | Grasdal, Martin | ebrary, Inc.

Publisher: Rockland, Mass. ; [Great Britain] : Syngress, c2001Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan: [Call number: 005.8] (1).
Hack proofing ColdFusion [electronic resource] / Greg Meyer ... [et al.].

by Meyer, Greg [aut] | ebrary, Inc.

Publisher: Rockland, Mass. : Syngress Publishing, Inc., c2002Other title: Hackproofing ColdFusion.Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan: [Call number: 005.75/8] (1).
Hack proofing Sun Solaris 8 [electronic resource] / Thomas Vincent.

by Vincent, Thomas | ebrary, Inc.

Publisher: Rockland, Mass. : London : Syngress Media ; International Thomson, 2001Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan: [Call number: 005.8] (1).
Hack proofing XML [electronic resource] / Neal O'Farrell.

by O'Farrell, Neal | ebrary, Inc.

Publisher: Rockland, Mass. : Syngress Media, 2002Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan: [Call number: 005.8] (1).
Hack proofing your Web applications [electronic resource] : the only way to stop a hacker is to think like one / [Jeff Forristal [ ... [et al.]] ; Julie Traxler, technical editor].

by Forristal, Jeff | ebrary, Inc.

Publisher: Rockland, Mass. : London : Syngress Media ; International Thomson, c2001Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan: [Call number: 005.8] (1).
Applied public key infrastructure [electronic resource] : 4th International Workshop : IWAP 2005 / edited by Jianying Zhou ... [et al.].

by International Workshop for Applied PKI (4th : 2005 : Singapore) | Zhou, Jianying | ebrary, Inc.

Publisher: Amsterdam ; Washington, DC : IOS Press, c2005Other title: IWAP 2005.Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan: [Call number: 005.8/2] (1).
Verification of infinite-state systems with applications to security [electronic resource] / edited by Edmund Clarke, Marius Minea and Ferucio Laurenţiu Ţiplea.

by NATO Advanced Research Workshop on Verification of Infinite-state Systems with Applications to Security (2005 March 17-22 : Timasoara, Romania) | Clarke, Edmund | Minea, Marius | Tiplea, Ferucio Laurentiu | ebrary, Inc.

Publisher: Amsterdam ; Washington, D.C. : IOS Press, c2006Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan: [Call number: 005.8] (1).
Practical embedded security [electronic resource] : building secure resource-constrained systems / by Timothy Stapko.

by Stapko, Timothy John | ebrary, Inc.

Publisher: Amsterdam ; Boston : Elsevier/Newnes, c2008Online access: An electronic book accessible through the World Wide Web; click to view Availability: No items available
IET information security [electronic resource].

by Institution of Engineering and Technology.

Source: Computers & Applied Sciences CompletePublisher: Stevenage [Herts., U.K.] : Institution of Engineering and Technology, c2007-Other title: Information security.Online access: Full text available: Mar 2007-. (Due to publisher restrictions, the most recent 12 months are not available.). Available on EBSCOhost. Availability: No items available