Your search returned 467 results.

Not what you expected? Check for suggestions
|
The complete guide to internet security / Mark S. Merkow & James Breithaupt.

by Merkow, Mark S | Breithaupt, Jim, 1955-.

Publisher: New York : American Management Association, c2000Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 MER] (1).
Hacking exposed : network security secrets & solutions / Joel Scambray, Stuart McClure, George Kurtz

by Scambray, Joel | Kurtz, George [(j.a.)] | McClure, Stuart [(j.a.)].

Edition: 2nd ed.Publisher: Berkeley, Calif. : Osborne/McGraw-Hill, c2001Availability: Items available for loan: TC External Storage [Call number: 005.8 SCA] (1).
Secure electronic commerce : building the infrastructure for digital signatures and encryption / Warwick Ford, Michael S. Baum

by Ford, Warwick | Baum, Michael S [(j.a.)].

Edition: 2nd ed.Publisher: Upper Saddle River, N.J. : Prentice Hall PTR, c2001Availability: Items available for loan: Taylor's Library-TU [Call number: 658.84 FOR] (7).
A process for developing a common vocabulary in the information security area [electronic resource] / edited by Jan von Knop, Alexey A. Salnikov, and Valeriy V. Yaschenko.

by NATO Advanced Research Workshop on a Process for Developing a Common Vocabulary in the Information Security Area (2006 : Moscow, Russia) | Knop, J. V. (Jan V.) | Salʹnikov, Alexey A | IAshchenko, V. V | ebrary, Inc.

Publisher: Amsterdam ; Washington, DC : IOS Press, c2007Online access: An electronic book accessible through the World Wide Web; click to view Availability: No items available
Security and policy driven computing / Lei Liu.

by Liu, Lei, 1968-.

Publisher: Boca Raton, FL : CRC Press, c2011Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 LIU 2011] (1).
Data mining and machine learning in cybersecurity / Sumeet Dua and Xian Du.

by Dua, Sumeet | Du, Xian, Ph.D.

Publisher: Boca Raton, FL : CRC Press, c2011Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 DUA 2011] (1).
Cyberspace and cybersecurity / George K. Kostopoulos.

by Kostopoulos, George K, 1939-.

Publisher: Boca Raton, FL : CRC Press, c2013Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 KOS 2013] (2).
Cybersecurity for industrial control systems : SCADA, DCS, PLC, HMI, and SIS / Tyson Macaulay and Bryan Singer.

by Macaulay, Tyson | Singer, Bryan.

Publisher: Boca Raton, FL : CRC Press, c2012Availability: Items available for loan: Taylor's Library-TU [Call number: 658.478 MAC 2012] (1).
Elliptic curves in cryptography / I.F. Blake, G. Seroussi, N.P. Smart.

by Blake, Ian F | Seroussi, G. (Gadiel), 1955- [(j.a)] | Smart, Nigel P. (Nigel Paul), 1967- [(j.a.)].

Publisher: Cambridge, U.K. : Cambridge University Press, 1999Availability: Items available for loan: Taylor's Library-TU [Call number: 005.82 BLA] (1).
Advances in cryptology, 1981-1997 : electronic proceedings and index of the CRYPTO and EUROCRYPT Conferences, 1981-1997 / Kevin S. McCurley, Claus Dieter Ziegler (eds.)

by McCurley, Kevin S | Ziegler, Claus Dieter | CRYPTO. Advances in cryptology | EUROCRYPT. Advances in cryptology.

Publisher: Berlin : Springer-Verlag, c1998Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 ADV] (1).
CISO compass : navigating cybersecurity leadership challenges with insights from pioneers / Todd Fitzgerald.

by Fitzgerald, Todd [author.].

Publisher: Boca Raton ; London ; New York : CRC Press, Taylor & Francis Group, [2019]Copyright date: �2019Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for reference: Taylor's Library-TU [Call number: 658.4/78] (1).
Cool careers without college for people who love coding / Asher Powell.

by Powell, Asher [author.].

Publisher: New York : Rosen YA, 2018Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for reference: Taylor's Library-TU [Call number: 005.1023] (1).
Hacking the hacker : learn from the experts who take down hackers / Roger A. Grimes.

by Grimes, Roger A [author.] | International Information Systems Security Certification Consortium.

Publisher: Indianapolis, IN : John Wiley & Sons, Inc., [2017]Copyright date: ©2017Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for reference: Taylor's Library-TU [Call number: 005.8] (1).
Penetration testing essentials / Sean-Philip Oriyano.

by Oriyano, Sean-Philip [author.].

Publisher: Indianapolis, Indiana : Sybex, a Wiley brand, [2017]Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for reference: Taylor's Library-TU [Call number: 005.8] (1).
Security and privacy of electronic healthcare records: concepts, paradigms and solutions / Sudeep Tanwar, Sudhanshu Tyagi and Neeraj Kumar[Eds].

by Tanwar, Sudeep [ed.] | Tyagi, Sudhanshu [ed.] | Kumar, Neeraj [ed.].

Publisher: Stevenage : IET, 2019Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for reference: Taylor's Library - Perpetual(TU) (1).
Big data recommender systems - volume 1: algorithms, architectures, big data, security and trust / Osman Khalid, Samee U. Khan, Albert Y. Zomaya [Eds].

by Khalid, Osman [ed.] | Khan, Samee U [ed.] | Zomaya, Albert Y [ed.].

Publisher: Stevenage : IET, 2019Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for reference: Taylor's Library - Perpetual(TU) (1).
Nature-inspired cyber security and resiliency: fundamentals, techniques and applications / El-Sayed M. El-Alfy, Mohamed Eltoweissy, Errin W. Fulp, Wojciech Mazurczyk [Eds].

by El-Alfy, El-Sayed M [ed.] | Eltoweissy, Mohamed [ed.] | Fulp, Errin W [ed.] | Mazurczyk, Wojciech [ed.].

Publisher: Stevenage : IET, 2019Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for reference: Taylor's Library - Perpetual(TU) (1).
Computers, ethics, and society / edited by M. David Ermann, Michele S. Shauf.

by Ermann, M. David [editor.] | Shauf, Michele S [author.].

Edition: Third edition.Publisher: New York : Oxford University Press, 2003Availability: Items available for loan: Taylor's Library-TU [Call number: 303.4834 COM 2003] (2).
Ethical and secure computing : a concise module / Joseph Migga Kizza.

by Kizza, Joseph Migga [author.].

Edition: Second edition.Publisher: Cham, Switzerland : Springer, [2019]Copyright date: ©2019Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for reference: Taylor's Library-TU [Call number: 005.8] (1).
Introduction to networks companion guide (CCNAv7) / Cisco Networking Academy.

by Cisco Networking Academy Program [issuing body.].

Publisher: [San Jose, CA] : Cisco Systems, Inc., [2020]Availability: No items available Checked out (1).