Your search returned 1226 results.

Not what you expected? Check for suggestions
|
Disappearing cryptography : information hiding : steganography & watermarking / Peter Wayner.

by Wayner, Peter, 1964-.

Edition: 3rd ed.Publisher: Burlington, MA : Elsevier/Morgan Kaufmann, c2009Availability: Items available for loan: Taylor's Library-TU [Call number: 005.82 WAY 2009] (1).
Cloud computing technologies for green enterprises / Kashif Munir, editor.

by Munir, Kashif, 1976- [editor.].

Publisher: Hershey, PA : Business Science Reference, [2018]Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for reference: Taylor's Library-TU [Call number: 004.67/82] (1).
Cryptography for dummies / by Chey Cobb.

by Cobb, Chey.

Publisher: Indianapolis, IN : Wiley Pub., c2004Availability: Items available for loan: Taylor's Library-TU [Call number: 005.82 COB 2004] (1).
Internet forensics / Robert Jones.

by Jones, Robert.

Publisher: Sebastopol, CA : O'Reilly, c2006Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 JON 2006] (1).
Security sector reform and post-conflict peacebuilding [electronic resource] / edited by Albrecht Schnabel and Hans-Georg Ehrhart.

by Schnabel, Albrecht | Ehrhart, Hans-Georg, 1955-.

Publisher: Tokyo : Bristol : United Nations University Press ; University Presses Marketing [distributor], 2005Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan: [Call number: 327.172] (1).
Digital forensics for network, Internet, and cloud computing : a forensic evidence guide for moving targets and data / Terrence V. Lillard ... [et al.] ; technical editor, Jim Murray.

by Lillard, Terrence.

Publisher: Burlington, MA : Elsevier/Syngress, c2010Availability: Items available for loan: Taylor's Library-TU [Call number: 363.25968 GAR 2010] (1).
Virtualization and forensics : a digital forensic investigator's guide to virtual environments / Diane Barrett, Gregory Kipper.

by Barrett, Diane | Kipper, Gregory.

Publisher: Burlington, MA : Elsevier/Syngress, c2010Availability: Items available for loan: Taylor's Library-TU [Call number: 363.25968 BAR 2010] (1).
The art of software security assessment : identifying and preventing software vulnerabilities / Mark Dowd, John McDonald, Justin Schuh.

by Dowd, Mark | McDonald, John, 1977- | Schuh, Justin.

Publisher: Upper Saddle River, NJ : Addison-Wesley, c2007Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 DOW 2007] (1).
The security risk assessment handbook : a complete guide for performing security risk assessments / Douglas J. Landoll.

by Landoll, Douglas J.

Publisher: Boca Raton, FL : Auerbach Pub., 2006Availability: Items available for loan: Taylor's Library-TU [Call number: 658.47 LAN 2006] (1).
The management of network security : technology, design, and management control / Houston H. Carr, Charles A. Snyder, and Bliss N. Bailey.

by Carr, Houston H, 1937- | Snyder, Charles A | Bailey, Bliss N.

Publisher: Upper Saddle River, N.J. : Prentice Hall, c2010Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 CAR 2010] (1).
Network security assessment / Chris McNab.

by McNab, Chris (Chris R.), 1980-.

Edition: 2nd ed.Publisher: Sebastopol, Calif. : O'Reilly, c2008Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 MAC 2008] (1).
Introduction to network security / Douglas Jacobson.

by Jacobson, Douglas.

Publisher: Boca Raton : CRC Press, c2009Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 JAC 2009] (1).
Computer security basics / Rick Lehtinen, Deborah Russell and G.T. Gangemi, Sr.

by Lehtinen, Rick | Russell, Deborah | Gangemi, G. T | Russell, Deborah. Computer security basics.

Edition: 2nd ed.Publisher: Sebastopol, CA : O'Reilly, c2006Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 LEH 2006] (1).
Security in computing / Charles P. Pfleeger, Shari Lawrence Pfleeger.

by Pfleeger, Charles P, 1948- | Pfleeger, Shari Lawrence.

Edition: 4th ed.Publisher: Upper Saddle River, NJ : Prentice Hall, c2007Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 PFL 2007] (1).
Hardware-based computer security techniques to defeat hackers : from biometrics to quantum cryptography / Roger Dube.

by Dube, Roger.

Publisher: Hoboken, N.J. : John Wiley, c2008Other title: Computer security techniques to defeat hackers.Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 DUB 2008] (1).
China's techno-warriors [electronic resource] : national security and strategic competition from the nuclear to the information age / Evan A. Feigenbaum.

by Feigenbaum, Evan A, 1969- | ebrary, Inc.

Publisher: Stanford, Calif. : Stanford University Press, 2003Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan: [Call number: 355/.033051] (1).