Your search returned 1226 results.

Not what you expected? Check for suggestions
|
Securing PHP web applications / Tricia Ballad, William Ballad.

by Ballad, Tricia | Ballad, Bill.

Publisher: Upper Saddle River, NJ : Addison-Wesley, c2009Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 BAL 2009] (2).
Information security : theory and practice / Dhiren R. Patel.

by Patel, Dhiren R.

Publisher: New Delhi : Prentice-Hall of India Private Limited, c2008Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 INF 2008] (1).
Hacking exposed computer forensics / Aaron Philipp, David Cowen, Chris Davis.

by Philipp, Aaron | Cowen, David | Davis, Chris (Christopher Michael).

Edition: 2nd ed.Publisher: New York : McGraw-Hill, c2010Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 PHI 2010] (2).
Hacking exposed Linux : Linux security secrets & solutions / ISECOM.

by ISECOM (Organization).

Edition: 3rd ed.Publisher: New York : McGraw-Hill, c2008Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 HAC 2008] (1).
Mobile application security / Himanshu Dwivedi, Chris Clark, David Thiel.

by Dwivedi, Himanshu | Clark, Chris, 1980- | Thiel, David V.

Publisher: New York : McGraw-Hill, c2010Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 DWI 2010] (2).
Principles of computer security : CompTIA security+ and beyond / Wm. Arthur Conklin ... [et al.].

by Conklin, Wm. Arthur (William Arthur).

Edition: 2nd ed.Publisher: New York : McGraw-Hill, c2010Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 PRI 2010] (4).
Internet security : hacking, counterhacking, and society / [edited by] Kenneth Einar Himma.

by Himma, Kenneth Einar.

Publisher: Sudbury, Mass. : Jones and Bartlett Publishers, c2007Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 INT 2007] (1).
Modelling cyber security : approaches, methodology, strategies / edited by Umberto Gori.

by NATO Advanced Research Workshop on Operational Network Intelligence: Today and Tomorrow (2009 Venice, Italy).

Publisher: Amsterdam : IOS Press, c2009Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 NAT 2009] (1).
Network intrusion detection and prevention : concepts and techniques / Ali A. Ghorbani, Wei Lu, Mahbod Tavallaee.

by Ghorbani, Ali, 1954- | Lu, Wei, 1980- | Tavallaee, Mahbod.

Publisher: New York : Springer, c2010Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 GHO 2010] (1).
Securing wireless communications at the physical layer / Ruoheng Liu, Wade Trappe, editors.

by Liu, Ruoheng | Trappe, Wade.

Publisher: New York ; Dordrecht : Springer, c2010Availability: Items available for loan: Taylor's Library-TU [Call number: 621.384 SEC 2010] (1).
Advances in security technology : International Conference, SecTech 2008, and Its Special Sessions, Sanya, Hainan Island, China, December 13-15, 2008. Revised Selected Papers / Haeng-Kon Kim, Tai-Hoon Kim, Akingbehin Kiumi (eds.)

by SecTech 2008 (2008 : Sanya Shi, China) | Kim, Haeng-Kon | Kim, Tai-hoon | Kiumi, Akingbehin.

Publisher: Berlin : Springer, c2009Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 SEC 2009] (1).
Cryptology and network security : 8th international conference, CANS 2009, Kanazawa, Japan, December 12-14, 2009 : proceedings / Juan A. Garay, Atsuko Miyaji, Akira Otsuka (eds.)

by International Conference on Cryptology and Network Security (8th : 2009 : Kanazawa-shi, Japan) | Garay, Juan A | Miyaji, Atsuko | Otsuka, Akira.

Publisher: Berlin : Springer-Verlag, c2009Other title: CANS 2009..Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 INT 2009] (1).
Security and cooperation in wireless networks : thwarting malicious and selfish behavior in the age of ubiquitous computing / Levente Buttyán, Jean-Pierre Hubaux.

by Buttyán, Levente | Hubaux, Jean-Pierre.

Publisher: Cambridge : Cambridge University Press, 2008Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 BUT 2008] (1).
Security and quality of service in ad hoc wireless networks / Amitabh Mishra.

by Mishra, Amitabh M.

Publisher: Cambridge, UK ; New York : Cambridge University Press, 2008Availability: Items available for loan: Taylor's Library-TU [Call number: 621.3821 MIS 2008] (1).
Is there a new Cold War? / Stefan Kiesbye, book editor.

by Kiesbye, Stefan.

Publisher: Farmington Hills, MI : Greenhaven Press/Gale Cengage Learning, c2010Availability: Items available for loan: Taylor's Library-TU [Call number: 327.73047 IST 2010] (1).
CompTIA security+ deluxe study guide / Emmett Dulaney.

by Dulaney, Emmett A.

Edition: 2nd ed.Publisher: Indianapolis : Wiley, c2011Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 DUL 2011] (2).
Risk analysis and security countermeasure selection / Thomas L. Norman.

by Norman, Thomas L.

Publisher: Boca Raton, FL : CRC Press, 2010Availability: Items available for loan: Taylor's Library-TU [Call number: 658.47 NOR 2010] (1).
Intelligence cooperation and the war on terror : Anglo-American security relations after 9/11 / Adam D.M. Svendsen.

by Svendsen, Adam D.M.

Publisher: Abingdon, Oxon ; New York : Routledge, c2010Availability: Items available for loan: Taylor's Library-TU [Call number: 363.325163 SVE 2010] (1).
Distributed systems security : issues, processes and solutions / by Abhijit Belapurkar ... [et al.].

by Belapurkar, Abhijit.

Publisher: Hoboken, NJ : John Wiley, c2009Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 DIS 2009] (1).
Exploiting online games : cheating massively distributed systems / Greg Hoglund, Gary McGraw.

by Hoglund, Greg | McGraw, Gary, 1966-.

Publisher: Upper Saddle River, NJ : Addison-Wesley, c2008Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 HOG 2008] (1).