Your search returned 13 results.

Not what you expected? Check for suggestions
|
Internet denial of service : attack and defense mechanisms / Jelena Mirkovic ... [et al.].

by Mirkovic, Jelena.

Publisher: Upper Saddle River, N.J. : Prentice Hall Professional Technical Reference, c2005Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 INT] (1).
Zen and the art of information security [electronic resource] / Ira Winkler.

by Winkler, Ira | ebrary, Inc.

Publisher: Rockland, MA : Syngress, c2007Other title: Ira Winkler's zen of security.Online access: An electronic book accessible through the World Wide Web; click to view Availability: No items available
Honeypots and routers : collecting internet attacks / Mohssen Mohammed, Habib-ur Rehman.

by Mohammed, Mohssen, 1982- [author.] | Rehman, Habib-ur.

Publisher: Boca Raton ; London : CRC Press, [2016]Copyright date: ©2016Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for reference: Taylor's Library-TU [Call number: 005.8 M697] (1).
Handbook of research on information and cyber security in the fourth industrial revolution / Ziska Fields, editor.

by Fields, Ziska, 1970- [editor.] | IGI Global [publisher.].

Publisher: Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) : IGI Global, [2018]Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for reference: Taylor's Library-TU [Call number: 658.4/78] (1).
Hardware-based computer security techniques to defeat hackers : from biometrics to quantum cryptography / Roger Dube.

by Dube, Roger.

Publisher: Hoboken, N.J. : John Wiley, c2008Other title: Computer security techniques to defeat hackers.Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 DUB 2008] (1).
Managing the human factor in information security [electronic resource] : how to win over staff and influence business managers / David Lacey.

by Lacey, David.

Publisher: Chichester, England ; Hoboken, N.J. : Wiley, c2009Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for reference: Taylor's Library-TU [Call number: 658.4/78] (1).
The global cybercrime industry : economic, institutional and strategic perspectives / Nir Kshetri.

by Kshetri, Nir.

Publisher: Heidelberg : Springer, c2010Availability: Items available for loan: Taylor's Library-TU [Call number: 364.168 KSH 2010] (1).
Security metrics : a beginner's guide / Caroline Wong.

by Wong, Caroline.

Publisher: New York : McGraw-Hill, c2012Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 WON 2012] (3).
Cyber fraud : tactics, techniques, and procedures / editor-in-chief, James Graham ; executive editors, Rick Howard, Ralph Thomas, Steven Winterfeld ; authors and editors, Kellie Bryan ... [et al.].

by Graham, James (James J.) | Howard, Richard, 1959-.

Publisher: Boca Raton, FL : CRC Press, c2009Availability: Items available for loan: Taylor's Library-TU [Call number: 364.168 CYB 2009] (1).
Reverse deception : organized cyber threat counter exploitation / Sean Bodmer, Dr. Max Kilger, Gregory Carpenter, Jade Jones.

by Bodmer, Sean.

Publisher: New York : McGraw-Hill, c2012Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 BOD 2012] (2).
The basics of web hacking : tools and techniques to attack the Web / Josh Pauli ; Scott White, technical editor.

by Pauli, Joshua J.

Publisher: Waltham, MA : Syngress, an imprint of Elsevier, [2013]Copyright date: ©2013Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 PAU 2013] (1).
Cyber threat! : how to manage the growing risk of cyber attacks / N. MacDonnell Ulsch.

by Ulsch, N. MacDonnell, 1951-.

Publisher: Hoboken, New Jersey : Wiley, 2014Copyright date: ©2014Availability: Items available for loan: Taylor's Library-TU [Call number: 658.478 ULS 2014] (1).
Targeted cyber attacks : multi-staged attacks driven by exploits and malware / Aditya K Sood, Richard Enbody.

by Sood, Aditya K [author.] | Enbody, Richard [author.].

Publisher: Amsterdam ; Boston : Syngress, 2014Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan: [Call number: 005.8] (1).