Your search returned 467 results.

Not what you expected? Check for suggestions
|
A cyberworm that knows no boundaries [electronic resource] / Isaac R. Porche III, Jerry M. Sollinger, Shawn McKay.

by Porche, Isaac, 1968- | Sollinger, Jerry M | McKay, Shawn | ebrary, Inc.

Publisher: Santa Monica, Calif. : Rand Corp., 2011Online access: An electronic book accessible through the World Wide Web; click to view Availability: No items available
CompTIA security+ certification boxed set : exam SY0-301 / Glen E. Clarke, Daniel Lachance.

by Clarke, Glen E | Lachance, Daniel, 1960-.

Publisher: Emeryville, CA ; London : McGraw-Hill, c2012Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8076 CLA 2012] (5).
Cyber-physical-social systems and constructs in electric power engineering [electronic resource] / Suryanarayanan, Hansen, Roche (eds); suryanarayanan@gmail.com.

by Suryanarayanan, Siddharth | Roche, Robin | Hansen, Timothy M.

Publisher: Stevenage : IET, 2016Online access: An electronic book accessible through the World Wide Web; click to view Availability: No items available
Oracle Identity and Access Manager 11g for administrators [electronic resource] : administer Oracle Identity and Access Management: installation, configuration, and day-to-day tasks / Atul Kumar.

by Kumar, Atul | ebrary, Inc.

Publisher: Birmingham, U.K. : Packt Pub., 2011Online access: An electronic book accessible through the World Wide Web; click to view Availability: No items available
BackTrack 5 wireless penetration testing [electronic resource] : beginner's guide : master bleeding edge wireless testing techniques with BackTrack 5 / Vivek Ramachandran.

by Ramachandran, Vivek | ebrary, Inc.

Publisher: Birmingham [U.K.] : Packt Pub. Ltd., 2011Online access: An electronic book accessible through the World Wide Web; click to view Availability: No items available
Spyware and adware [electronic resource] / by John Aycock.

by Aycock, John Daniel, 1970-.

Publisher: New York : Springer Science+Business Media, LLC, 2011Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for reference: Taylor's Library-TU [Call number: 005.8] (1).
Security de-engineering : solving the problems in information risk management / Ian Tibble.

by Tibble, Ian.

Publisher: Boca Raton, FL : CRC Press, c2012Availability: Items available for loan: Taylor's Library-TU [Call number: 658.478 TIB 2012] (1).
Computer forensics and cyber crime : an introduction / Marjie T. Britz.

by Britz, Marjie [author.].

Edition: Third Edition.Publisher: Boston : Pearson, [2013]Copyright date: ©2013Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 BRI 2013] (1).
Cybersecurity : the essential body of knowledge / Dan Shoemaker, Wm. Arthur Conklin.

by Shoemaker, Dan | Conklin, Wm. Arthur (William Arthur).

Publisher: Boston, MA : Course Technology, Cengage Learning, c2012Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 SHO 2012] (1).
Management of information security / Michael Whitman, Herbert Mattord.

by Whitman, Michael E, 1964- | Mattord, Herbert J.

Edition: 2nd ed.Publisher: Boston, MA : Course Technology, Cengage Learning, c2008Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 WHI 2008] (1).
EnCase computer forensics : the official EnCE : EnCase certified examiner : study guide / Steve Bunting.

by Bunting, Steve.

Edition: 3rd ed.Publisher: Indianapolis, Ind. : John Wiley, c2012Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 BUN 2012] (2).
Security engineering : a guide to building dependable distributed systems / Ross J. Anderson.

by Anderson, Ross, 1956-.

Edition: 2nd ed.Publisher: Indianapolis, IN : Wiley, c2008Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 AND 2008] (5).
Cryptography and network security : principles and practice / William Stallings.

by Stallings, William.

Edition: 7th ed.Publisher: Boston, MA : Pearson, c2014Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 STA 2014] (2).
Security policies and implementation issues / Rob Johnson with Mike Merkow.

by Johnson, Rob (Robert) | Merkow, Mark S.

Publisher: Burlington, MA : Jones & Bartlett Learning, c2011Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 JOH 2011] (1).
Secure software design / Theodor Richardson, Charles N. Thies.

by Richardson, Theodor | Thies, Charles.

Publisher: Burlington, MA : Jones & Bartlett Learning, c2013Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 RIC 2013] (1).
The basics of web hacking : tools and techniques to attack the Web / Josh Pauli ; Scott White, technical editor.

by Pauli, Joshua J.

Publisher: Waltham, MA : Syngress, an imprint of Elsevier, [2013]Copyright date: ©2013Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 PAU 2013] (1).
Data-driven security : analysis, visualization and dashboards / Jay Jacobs + Bob Rudis.

by Jacobs, Jay (Data analyst) | Rudis, Bob.

Edition: 1st edition.Publisher: Indianapolis, IN : John Wiley & Sons Inc., [2014]Copyright date: ©2014Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 JAC 2014] (1).
Android hacker's handbook / Joshua J. Drake [and five others].

by Drake, Joshua J.

Publisher: Indiana, IN : John Wiley & Sons, Inc., [2014]Copyright date: ©2014Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 DRA 2014] (1).
Ethical hacking and penetration testing guide / Rafay Baloch.

by Baloch, Rafay.

Publisher: Boca Raton : CRC Press, 2014Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 BAL 2014] (1).
Penetration testing : a hands-on introduction to hacking / by Georgia Weidman.

by Weidman, Georgia.

Publisher: San Francisco : No Starch Press, [2014]Copyright date: ©2014Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8092 WEI 2014] (1).