Your search returned 1225 results.

Not what you expected? Check for suggestions
|
Network security for dummies / by Chey Cobb.

by Cobb, Chey.

Publisher: Indianapolis, IN : Wiley Pub. c2003Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 COB] (1).
Terrorism : opposing viewpoints / Laura K. Egendorf, book editor.

by Egendorf, Laura K, 1973-.

Publisher: Farmington Hills, Mich. : Greenhaven Press, c2004Availability: Items available for loan: TC External Storage [Call number: 303.625 TER] (1).
Computer forensics for dummies / Linda Volonino and Reynaldo Anzaldua.

by Volonino, Linda | Anzaldua, Reynaldo.

Publisher: Indianapolis, IN : Wiley Pub., c2008Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 VOL 2008] (1).
Digital fortress / Dan Brown.

by Brown, Dan, 1964-.

Publisher: London : Corgi Books, 2004Availability: Items available for loan: Taylor's Library-TU [Call number: 813.54 BRO 2004] (3).
Anti-hacker tool kit / Mike Shema, Bradley C. Johnson.

by Shema, Mike | Johnson, Bradley C.

Edition: 2nd ed.Publisher: New York : McGraw-Hill/Osborne, c2004Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 SHE] (1).
Information security management handbook / Harold F. Tipton, Micki Krause, editors.

by Tipton, Harold F | Krause, Micki.

Edition: 5th ed.Publisher: Boca Raton, Fl : Auerbach, 2003Availability: Items available for loan: Taylor's Library-TU [Call number: 658.0558 INF] (1).
Guide to network defense and countermeasures / Greg Holden.

by Holden, Greg.

Publisher: Boston, Mass. : Thomson/Course Technology, c2003Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 HOL] (1).
Malaysia : 45 years under the ISA : detention without trial / Koh Swe Yong ; translated by Agnes Khoo.

by Koh, Swe Yong | Khoo, Agnes [(tr.)].

Publisher: Petaling Jaya, Malaysia : Strategic Information Research Development, 2004Other title: Malaysia : forty five years under the ISA : detention without trial 45 years under the Internal Security Act..Availability: Items available for loan: Taylor's Library-TU [Call number: 345.5950231 KOH] (2).
Security + guide to network security fundamentals / by Mark Ciampa

by Ciampa, Mark.

Edition: 2nd ed.Publisher: Boston, Mass. : Course Technology / Thomson Learning, c2005Other title: Guide to network security fundamentals. | Network security fundamentals..Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 CIA] (1).
Cryptography and network security : principles and practice / William Stallings.

by Stallings, William.

Edition: 3rd ed.Publisher: Upper Saddle River, N.J. : Prentice Hall, c2003Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 STA] (1).
Lessons from U.S. allies in security cooperation with third countries [electronic resource] : the cases of Australia, France, and the United Kingdom / Jennifer D.P. Moroney ... [et al.].

by Moroney, Jennifer D. P, 1973- | Project Air Force (U.S.) | United States. Air Force | Rand Corporation | ebrary, Inc.

Publisher: Santa Monica, Calif. : Rand, 2011Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan: [Call number: 355/.031] (1).
Hacking exposed computer forensics : secrets & solutions / Chris Davis, David Cowen, Aaron Philipp.

by Davis, Chris (Christopher Michael) | Cowen, David | Philipp, Aaron.

Publisher: New York : McGraw-Hill/Osborne, c2005Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 DAV] (1).
Fundamentals of Mobile and Wireless Security / Tan Hock Guan, Ng Yaw Tong, Fabian

by Tan, Hock Guan | Ng Yaw Hock, Fabian.

Publisher: Singapore : Pearson / Prentice Hall, c2005Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 TAN] (1).
Hacking exposed 7 : network security secrets & solutions / Stuart Mcclure, Joel Scambray, George Kurtz.

by McClure, Stuart | McClure, Stuart | Scambray, Joel | Kurtz, George.

Publisher: New York : McGraw-Hill, c2012Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 MAC 2012] (2).
Gray hat hacking : the ethical hacker's handbook / Shon Harris ... [et al.].

by Harris, Shon.

Edition: 2nd ed.Publisher: New York : McGraw-Hill, c2008Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 GRA 2008] (2).