Your search returned 467 results.

Not what you expected? Check for suggestions
|
Internet fraud casebook : the World Wide Web of deceit / edited by Joseph T. Wells.

by Wells, Joseph T.

Publisher: Hoboken, N.J. : John Wiley, c2010Availability: Items available for loan: Taylor's Library-TU [Call number: 364.163 INT 2010] (1).
Security metrics : a beginner's guide / Caroline Wong.

by Wong, Caroline.

Publisher: New York : McGraw-Hill, c2012Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 WON 2012] (3).
A multidisciplinary introduction to information security / [edited by] Stig F. Mjølsnes.

by Mjølsnes, Stig F.

Publisher: Boca Raton, FL : CRC Press, c2012Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 MUL 2012] (3).
Introduction to modern cryptography / Jonathan Katz, Yehuda Lindell.

by Katz, Jonathan, 1974- | Lindell, Yehuda.

Publisher: Boca Raton : Chapman & Hall/CRC, c2008Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 KAT 2008] (1).
Certified ethical hacker / Michael Gregg.

by Gregg, Michael (Michael C.).

Publisher: [Indianapolis, IN.] : Que Certification, 2010Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 GRE 2010] (1).
Virtual honeypots : from botnet tracking to intrusion detection / Niels Provos, Thorsten Holz.

by Provos, Niels | Holz, Thorsten.

Publisher: Upper Saddle River, NJ : Addison-Wesley, c2008Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 PRO 2008] (1).
Practical intrusion analysis : prevention and detection for the twenty-first century / Ryan Trost.

by Trost, Ryan.

Publisher: Upper Saddle River, NJ : Addison-Wesley, 2010Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 TRO 2010] (1).
Hacking exposed : web applications : web application security secrets and solutions / Joel Scambray, Vincent Liu, Caleb Sima.

by Scambray, Joel | Liu, Vincent | Sima, Caleb.

Edition: 3rd ed.Publisher: San Francisco, CA : McGraw-Hill Companies, 2011Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 SCA 2011] (2).
iPad & iPhone administrator's guide : [enterprise deployment strategies and security solutions] / Guy Hart-Davis.

by Hart-Davis, Guy.

Publisher: New York : McGraw-Hill, c2011Other title: iPad and iPhone administrator's guide.Availability: Items available for loan: Taylor's Library-TU [Call number: 004.1675068 HAR 2011] (1).
Intrusion detection : a machine learning approach / Zhenwei Yu, Jeffrey J. P. Tsai.

by Yu, Zhenwei | Tsai, Jeffrey J. P.

Publisher: London : Imperial College Press, 2011Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 YUZ 2011] (1).
Firewall design and analysis / Alex X. Liu.

by Liu, Alex X.

Publisher: Singapore : World Scientific, c2011Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 LIU 2011] (1).
Guide to firewalls and network security : intrusion detection and VPNs / Michael E. Whitman ... [et al.]

by Whitman, Michael E, 1964- | Holden, Greg. Guide to firewalls and network security.

Edition: 2nd ed.Publisher: Boston, Mass. : Course Technology/Cengage Learning, 2009Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 HOL 2009] (1).
Computer security / Dieter Gollmann.

by Gollmann, Dieter.

Edition: 3rd ed.Publisher: Chichester, West Sussex : Wiley, 2011Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 GOL 2011] (1).
Computer forensics Jumpstart / Michael Solomon, Diane Barrett, Neil Broom.

by Solomon, Michael, (Michael G.), 1963- | Barrett, Diane | Broom, Neil.

Publisher: San Francisco, Calif. : Sybex, 2005Availability: Items available for loan: Taylor's Library-TU [Call number: 363.25968 SOL 2005] (1).
Malware analyst's cookbook and DVD : tools and techniques for fighting malicious code / Michael Hale Ligh ... [et al.]

by Ligh, Michael Hale.

Publisher: Indianapolis, IN : Wiley Pub., c2011Other title: Tools and techniques for fighting malicious code.Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 MAL 2011] (2).
Security 2020 : reduce security risks this decade / Doug Howard and Kevin Prince.

by Howard, Doug | Prince, Kevin.

Edition: 1st ed.Publisher: Indianapolis, IN : Wiley Pub., c2011Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 HOW 2011] (1).
Introduction to computer security / Michael T. Goodrich, Roberto Tamassia.

by Goodrich, Michael T | Tamassia, Roberto, 1960-.

Edition: International ed.Publisher: Boston, MA : Pearson Education, c2011Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 GOO 2011] (1).
Mobile device security : a comprehensive guide to securing your information in a moving world / Stephen Fried.

by Fried, Stephen, 1962-.

Publisher: Boca Raton, FL : CRC Press, 2010Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 FRI 2010] (2).