Your search returned 21 results.

Not what you expected? Check for suggestions
|
Intrusion signatures and analysis / Stephen Northcutt ... [et al.]

by Northcutt, Stephen.

Edition: 1st ed.Publisher: Indianapolis, Ind. : New Riders, c2001Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 INT] (1).
Security assessment [electronic resource] : case studies for implementing the NSA lAM / Russ Rogers.

by Rogers, Russ | ebrary, Inc.

Edition: 3rd ed.Publisher: Rockland, MA : Syngress Publishing, c2004Online access: An electronic book accessible through the World Wide Web; click to view Availability: No items available
IT ethics handbook [electronic resource] : right and wrong for IT professionals / Stephen Northcutt.

by Northcutt, Stephen | Northcutt, Stephen | ebrary, Inc.

Publisher: Rockland, MA. : Syngress Pub., c2004Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for reference: Taylor's Library-TU (1).
Identity and access management solutions [electronic resource] : using WebSphere Portal V5.1, Tivoli Identity Manager V4.5.1, and Tivoli Access Manager V5.1 / John Ganci ... [et al.].

by Ganci, John | International Business Machines Corporation. International Technical Support Organization | ebrary, Inc.

Edition: 1st ed.Publisher: Research Triangle Park, N.C. : IBM, International Technical Support Organization, 2005Online access: An electronic book accessible through the World Wide Web; click to view Availability: No items available
Role-based access control [electronic resource] / David F. Ferraiolo, D. Richard Kuhn, Ramaswamy Chandramouli.

by Ferraiolo, David | Chandramouli, Ramaswamy | Kuhn, D. Richard | ebrary, Inc.

Edition: 2nd ed.Publisher: Boston : Artech House, c2007Online access: An electronic book accessible through the World Wide Web; click to view Availability: No items available
Integrated security systems design [electronic resource] : concepts, specifications, and implementation / Thomas Norman.

by Norman, Thomas L | ebrary, Inc.

Publisher: Amsterdam ; London : Elsevier/Butterworth-Heinemann, c2007Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan: [Call number: 005.8] (1).
Role-based access control [electronic resource] / David F. Ferraiolo, D. Richard Kuhn, Ramaswamy Chandramouli.

by Ferraiolo, David | Kuhn, D. Richard | Chandramouli, Ramaswamy | ebrary, Inc.

Publisher: Boston : Artech House, c2003Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan: [Call number: 005.8] (1).
Modern cryptography : theory and practice / Wenbo Mao.

by Mao, Wenbo.

Publisher: Upper Saddle River, N.J. : Prentice Hall PTR, c2004Availability: Items available for loan: Taylor's Library-TU [Call number: 005.82 MAO 2004] (1).
Linux firewalls [electronic resource] : attack detection and response with iptables, psad, and fwsnort / Michael Rash.

by Rash, Michael | ebrary, Inc.

Publisher: San Francisco : No Starch Press, c2007Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan: [Call number: 005.8] (1).
Check Point NG [electronic resource] : next generation security administration / Drew Simonis ... [et al.].

by Simonis, Drew | ebrary, Inc.

Publisher: Rockland, Mass. : Syngress Publishing, Inc., c2002Other title: Check Point Next Generation | CheckPoint NG.Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan: [Call number: 005.8] (1).
A multidisciplinary introduction to information security / [edited by] Stig F. Mjølsnes.

by Mjølsnes, Stig F.

Publisher: Boca Raton, FL : CRC Press, c2012Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 MUL 2012] (3).
Practical intrusion analysis : prevention and detection for the twenty-first century / Ryan Trost.

by Trost, Ryan.

Publisher: Upper Saddle River, NJ : Addison-Wesley, 2010Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 TRO 2010] (1).
Security information and event management (SIEM) implementation / David R. Miller ... [et al.].

by Miller, David, 1959-.

Publisher: New York : McGraw-Hill, c2011Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 SEC 2011] (1).
Oracle Identity and Access Manager 11g for administrators [electronic resource] : administer Oracle Identity and Access Management: installation, configuration, and day-to-day tasks / Atul Kumar.

by Kumar, Atul | ebrary, Inc.

Publisher: Birmingham, U.K. : Packt Pub., 2011Online access: An electronic book accessible through the World Wide Web; click to view Availability: No items available
BackTrack 5 wireless penetration testing [electronic resource] : beginner's guide : master bleeding edge wireless testing techniques with BackTrack 5 / Vivek Ramachandran.

by Ramachandran, Vivek | ebrary, Inc.

Publisher: Birmingham [U.K.] : Packt Pub. Ltd., 2011Online access: An electronic book accessible through the World Wide Web; click to view Availability: No items available
The state of the art in intrusion prevention and detection / edited by Al-Sakib Khan Pathan.

by Pathan, Al-Sakib Khan [editor,, author.].

Publisher: Boca Raton : CRC Press, Taylor & Francis Group, [2014]Copyright date: ©2014Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for reference: Taylor's Library-TU [Call number: 005.8] (1).