Your search returned 467 results.

Not what you expected? Check for suggestions
|
Cyber fraud : tactics, techniques, and procedures / editor-in-chief, James Graham ; executive editors, Rick Howard, Ralph Thomas, Steven Winterfeld ; authors and editors, Kellie Bryan ... [et al.].

by Graham, James (James J.) | Howard, Richard, 1959-.

Publisher: Boca Raton, FL : CRC Press, c2009Availability: Items available for loan: Taylor's Library-TU [Call number: 364.168 CYB 2009] (1).
Official (ISC)2 guide to the CISSP CBK / edited by Harold F. Tipton ; contributors, Paul Baker ... [et al.].

by Tipton, Harold F.

Edition: 2nd ed.Publisher: Boca Raton, FL : CRC Press, c2010Other title: Official (ISC)2 guide to the CISSP CBK.Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 OFF 2010] (2).
Official (ISC)2 guide to the ISSAP CBK / edited by Harold F. Tipton.

by Tipton, Harold F | International Information Systems Security Certification Consortium.

Publisher: Boca Raton, FL : CRC Press, c2011Availability: Items available for loan: Taylor's Library-TU [Call number: 004 OFF 2011] (1).
Introduction to computer security / Michael T. Goodrich & Roberto Tamassia.

by Goodrich, Michael T | Tamassia, Roberto, 1960-.

Publisher: Boston : Addison-Wesley, c2011Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 GOO 2011] (1).
Digital security : cyber terror and cyber security / Ananda Mitra

by Mitra, Ananda, 1960-.

Publisher: New York : Chelsea House, c2010Availability: Items available for loan: Taylor's Library-TU [Call number: 364.168 MIT 2010] (1).
IT auditing : using controls to protect information assets / Chris Davis, Mike Schiller ; with Kevin Wheeler.

by Davis, Chris (Christopher Michael) | Schiller, Mike | Wheeler, Kevin.

Edition: 2nd ed.Publisher: New York, N.Y. : McGraw-Hill, c2011Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 DAV 2011] (3).
Principles of computer security : CompTIA security+ and beyond lab manual / Vincent Nestler ... [et al.]

by Nestler, Vincent J.

Edition: 2nd ed.Publisher: San Francisco, CA : McGraw-Hill, c2011Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 PRI 2011] (1).
Engineering information security : the application of systems engineering concepts to achieve information assurance / Stuart Jacobs.

by Jacobs, Stuart.

Publisher: Hoboken, N.J. : Wiley : IEEE Press, c2011Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 JAC 2011] (2).
Computer crime, investigation, and the law / Chuck Easttom and Jeff Taylor.

by Easttom, Chuck | Taylor, Jeffrey.

Publisher: Boston, MA : Course Technology, Cengage Learning, c2011Availability: Items available for loan: Taylor's Library-TU [Call number: 364.168 EAS 2011] (1).
Fundamentals of information systems security / David Kim and Michael G. Solomon.

by Kim, David | Solomon, Michael, (Michael G.), 1963-.

Publisher: Sudbury, MA : Jones & Bartlett Learning, c2012Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 KIM 2012] (2).
Principles of information security / Michael E. Whitman, Herbert J. Mattord.

by Whitman, Michael E, 1964- | Mattord, Herbert J.

Edition: 4th ed.Publisher: Boston, MA : Course Technology/Cengage Learning, c2012Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 WHI 2012] (2).
Corporate computer security / Randall J. Boyle, Raymond R. Panko.

by Boyle, Randall J | Panko, Raymond R.

Edition: 3rd ed.Publisher: Boston : Pearson, c2013Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 BOY 2013] (1).
Communication in a wired world [videorecording] : be smart, be safe / Learning Seed, video production, Stage Fright ; writer & executive producer, Louise Welsh Schrank.

by Schrank, Louise Welsh | Porter, Olivia | Stage Fright Productions | Learning Seed Company.

Publisher: Chicago, IL : Learning Seed, c2009Other title: Be smart, be safe.Availability: Items available for loan: Taylor's Library-TU [Call number: 303.4833 COM 2009] (1).
Risk analysis and security countermeasure selection [electronic resource] / Thomas L. Norman.

by Norman, Thomas L.

Publisher: Boca Raton : CRC Press, c2010Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for reference: Taylor's Library-TU [Call number: 658.4/7] (1).
Management of information security / Michael Whitman, Herbert Mattord.

by Whitman, Michael E, 1964- | Mattord, Herbert J.

Edition: 3rd ed.Publisher: Boston : Course Technology Cengage Learning, c2010Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 WHI 2010] (2).
Building secure software : how to avoid security problems the right way / John Viega, Gary McGraw.

by Viega, John | McGraw, Gary, 1966-.

Publisher: Boston, MA : Addison-Wesley, c2002Availability: Items available for loan: Taylor's Library-TU [Call number: 005.1 VIE 2002] (1).
Computer security : principles and practice / William Stallings, Lawrie Brown ; with contributions by Mick Bauer, Michael Howard.

by Stallings, William | Brown, Lawrie | Bauer, Michael D | Howard, Michael, 1965-.

Edition: 2nd ed.Publisher: Boston, MA : Pearson, 2012Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 STA 2012] (1).
Computer security fundamentals / Chuck Easttom.

by Easttom, Chuck.

Edition: 2nd ed.Publisher: Indianapolis, IN : Pearson, c2012Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 EAS 2012] (1).
Cyber security policy guidebook / Jennifer L. Bayuk ... [et al.].

by Bayuk, Jennifer L.

Publisher: Hoboken, N.J. : John Wiley, c2012Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 CYB 2012] (1).