Your search returned 467 results.

Not what you expected? Check for suggestions
|
ExamInsight for CompTIA Security+ certification exam SY0-101 [electronic resource] / Tcat Houser ; with Helen O'Boyle, Ian Kayne and Angella Hebert, Michael Woznicki and Alex Moreno, Jr.

by Catura-Houser, Tim | O'Boyle, Helen | Kayne, Ian | Hebert, Angella | Woznicki, Michael | Moreno, Alex | ebrary, Inc.

Edition: 2nd ed.Publisher: Friendswood, Tex. : TotalRecall Publications, Inc., c2002Other title: Exam Insight for CompTIA Security+ certification Examination SY0-101 | CompTIA Security+ certification exam SY0-101.Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan: [Call number: 005.8/076] (1).
Intrusion prevention and active response [electronic resource] : deploying network and host IPS / Michael Rash ... [et al.] ; technical reviewer, Anne Henmi.

by Henmi, Anne [rev] | Rash, Michael [aut] | ebrary, Inc.

Publisher: Rockland, Mass. : Syngress Publishing, c2005Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan: [Call number: 005.8] (1).
Software system reliability and security [electronic resource] / edited by Manfred Broy, Johannes Grünbauer and Tony Hoare.

by Broy, M, 1949- | Grunbauer, Johannes | Hoare, C. A. R. (Charles Antony Richard), 1934- | ebrary, Inc.

Publisher: Amsterdam ; Washington, DC : IOS Press, c2007Online access: An electronic book accessible through the World Wide Web; click to view Availability: No items available
Configuring SonicWALL firewalls [electronic resource] / Chris Lathem et al.

by Lathem, Chris | Bendell, Daniel H | Fortenberry, Benjamin W | Lynn, Kevin | Reed, Joshua | ebrary, Inc.

Publisher: Rockland, MA : Syngress Publishing, c2006Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan: [Call number: 005.8] (1).
Web security : a whitehat perspective / Wu Hanqing and Liz Zhao.

by Hanqing, Wu | Zhao, Liz.

Publisher: Boca Raton, FL : Taylor & Francis, CRC Press, [2015]Copyright date: ©2015Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 HAN 2015] (1).
Guide to computer forensics and investigations : processing digital evidence.

by Nelson, Bill | Steuart, Christopher | Phillips, Amelia.

Edition: Fifth edition / Bill Nelson, Amelia Phillips, Christopher Steuart.Publisher: Boston, MA : Cengage Learning, [2016]Copyright date: ©2016Availability: Items available for loan: Taylor's Library-TU [Call number: 363.25968 NEL 2016] (4).
The misuse of information systems [electronic resource] : the impact of security countermeasures / John P. D'Arcy.

by D'Arcy, John P, 1975- | ebrary, Inc.

Publisher: New York : LFB Scholarly Pub., 2007Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan: [Call number: 005.8] (1).
MCSE designing security for a Windows Server 2003 network : exam 70-298 [electronic resource] : study guide & DVD training system / Elias N. Khnaser ... [et al.].

by Khnaser, Elias N | ebrary, Inc.

Publisher: Rockland, MA : Syngress Pub., c2004Other title: Microsoft Certified System Engineer designing security for a Windows Server 2003 network : exam 70-298.Online access: An electronic book accessible through the World Wide Web; click to view Availability: No items available
Ethereal [electronic resource] : packet sniffing / Angela Orebaugh with Greg Morris, Ed Warnicke, Gilbert Ramirez.

by Orebaugh, Angela | Morris, Greg | Warnicke, Ed | Ramirez, Gilbert | ebrary, Inc.

Publisher: Rockland, MA : Syngress Pub., c2004Other title: Ethereal packet sniffing.Online access: An electronic book accessible through the World Wide Web; click to view Availability: No items available
Formal logical methods for system security and correctness [electronic resource] / edited by Orna Grumberg, Tobias Nipkow and Christian Pfaller.

by NATO Advanced Study Institute on Formal Logical Methods for System Security and Correctness (2007 : Marktoberdorf, Germany) | Grumberg, Orna | Nipkow, Tobias, 1958- | Pfaller, Christian | ebrary, Inc.

Publisher: Amsterdam, Netherlands ; Washington, DC : IOS Press, c2008Online access: An electronic book accessible through the World Wide Web; click to view Availability: No items available
Management of information security / Michael Whitman, Herbert Mattord.

by Whitman, Michael E, 1964- | Mattord, Herbert J.

Edition: Fifth edition.Publisher: Boston, MA : Cengage Learning, [2017]Copyright date: ©2017Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 WHI 2017] (2).
Information security [electronic resource] : policy, processes, and practices / Detmar W. Straub, Seymour Goodman, Richard L. Baskerville, editors.

by Straub, Detmar W | Goodman, Seymour E | Baskerville, Richard | ebrary, Inc.

Publisher: Armonk, N.Y. : M.E. Sharpe, c2008Online access: An electronic book accessible through the World Wide Web; click to view Availability: No items available
IT ethics handbook [electronic resource] : right and wrong for IT professionals / Stephen Northcutt.

by Northcutt, Stephen | Northcutt, Stephen | ebrary, Inc.

Publisher: Rockland, MA. : Syngress Pub., c2004Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for reference: Taylor's Library-TU (1).
Critical information infrastructure protection and the law [electronic resource] : an overview of key issues / Committee on Critical Information Infrastructure and the Law, Computer Science and Telecommunications Board, National Academy of Engineering, National Research Council of the National Academies ; Stewart D. Personick and Cynthia A. Patterson, editors.

by Personick, Stewart D | Patterson, Cynthia A | ebrary, Inc.

Publisher: Washington, D.C. : National Academies Press, c2003Online access: An electronic book accessible through the World Wide Web; click to view Availability: No items available
Who goes there? [electronic resource] : authentication through the lens of privacy / Committee on Authentication Technologies and Their Privacy Implications, Computer Science and Telecommunications Board, Division on Engineering and Physical Sciences, National Research Council of the National Academies ; Stephen T. Kent and Lynette I. Millett, editors.

by Kent, Stephen T. (Stephen Thomas) | Millett, Lynette I | ebrary, Inc.

Publisher: Washington, D.C. : National Academies Press, c2003Other title: Authentication through the lens of privacy.Online access: An electronic book accessible through the World Wide Web; click to view Availability: No items available
Threat modeling : designing for security / Adam Shostack.

by Shostack, Adam [author.].

Publisher: Indianapolis, IN : John Wiley and Sons, [2014]Copyright date: ©2014Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan: [Call number: 005.8] (1).
Zen and the art of information security [electronic resource] / Ira Winkler.

by Winkler, Ira | ebrary, Inc.

Publisher: Rockland, MA : Syngress, c2007Other title: Ira Winkler's zen of security.Online access: An electronic book accessible through the World Wide Web; click to view Availability: No items available
Security [electronic resource] : secrets, intruders and ID tags.

by ebrary, Inc.

Publisher: [Boston] : Technology Research News, 2003Online access: An electronic book accessible through the World Wide Web; click to view Availability: No items available
Nessus, Snort, & Ethereal power tools [electronic resource] : customizing open source security applications / Neil Archibald, Gilbert Ramirez, Noam Rathaus ; Josh Burke, Brian Caswell, Renaud Deraison,technical editor[s].

by Archibald, Neil | Burke, Josh | Caswell, Brian | Deraison, Renaud | Ramirez, Gilbert | Rathaus, Noam | ebrary, Inc.

Publisher: Rockland, Mass. : Syngress Pub., c2005Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan: [Call number: 005.8] (1).