|
|
Intrusion signatures and analysis / Stephen Northcutt ... [et al.]
by Northcutt, Stephen. Edition: 1st ed.Publisher: Indianapolis, Ind. : New Riders, c2001Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 INT]
(1).
|
|
|
Security assessment [electronic resource] : case studies for implementing the NSA lAM / Russ Rogers.
by Rogers, Russ | ebrary, Inc. Edition: 3rd ed.Publisher: Rockland, MA : Syngress Publishing, c2004Online access: An electronic book accessible through the World Wide Web; click to view Availability: No items available
|
|
|
IT ethics handbook [electronic resource] : right and wrong for IT professionals / Stephen Northcutt.
by Northcutt, Stephen | Northcutt, Stephen | ebrary, Inc. Publisher: Rockland, MA. : Syngress Pub., c2004Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for reference: Taylor's Library-TU (1).
|
|
|
Identity and access management solutions [electronic resource] : using WebSphere Portal V5.1, Tivoli Identity Manager V4.5.1, and Tivoli Access Manager V5.1 / John Ganci ... [et al.].
by Ganci, John | International Business Machines Corporation. International Technical Support Organization | ebrary, Inc. Edition: 1st ed.Publisher: Research Triangle Park, N.C. : IBM, International Technical Support Organization, 2005Online access: An electronic book accessible through the World Wide Web; click to view Availability: No items available
|
|
|
Role-based access control [electronic resource] / David F. Ferraiolo, D. Richard Kuhn, Ramaswamy Chandramouli.
by Ferraiolo, David | Chandramouli, Ramaswamy | Kuhn, D. Richard | ebrary, Inc. Edition: 2nd ed.Publisher: Boston : Artech House, c2007Online access: An electronic book accessible through the World Wide Web; click to view Availability: No items available
|
|
|
Integrated security systems design [electronic resource] : concepts, specifications, and implementation / Thomas Norman.
by Norman, Thomas L | ebrary, Inc. Publisher: Amsterdam ; London : Elsevier/Butterworth-Heinemann, c2007Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan:
[Call number: 005.8]
(1).
|
|
|
Role-based access control [electronic resource] / David F. Ferraiolo, D. Richard Kuhn, Ramaswamy Chandramouli.
by Ferraiolo, David | Kuhn, D. Richard | Chandramouli, Ramaswamy | ebrary, Inc. Publisher: Boston : Artech House, c2003Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan:
[Call number: 005.8]
(1).
|
|
|
Modern cryptography : theory and practice / Wenbo Mao.
by Mao, Wenbo. Publisher: Upper Saddle River, N.J. : Prentice Hall PTR, c2004Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.82 MAO 2004]
(1).
|
|
|
Linux firewalls [electronic resource] : attack detection and response with iptables, psad, and fwsnort / Michael Rash.
by Rash, Michael | ebrary, Inc. Publisher: San Francisco : No Starch Press, c2007Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan:
[Call number: 005.8]
(1).
|
|
|
Check Point NG [electronic resource] : next generation security administration / Drew Simonis ... [et al.].
by Simonis, Drew | ebrary, Inc. Publisher: Rockland, Mass. : Syngress Publishing, Inc., c2002Other title: Check Point Next Generation | CheckPoint NG.Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan:
[Call number: 005.8]
(1).
|
|
|
A multidisciplinary introduction to information security / [edited by] Stig F. Mjølsnes.
by Mjølsnes, Stig F. Publisher: Boca Raton, FL : CRC Press, c2012Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 MUL 2012]
(3).
|
|
|
Practical intrusion analysis : prevention and detection for the twenty-first century / Ryan Trost.
by Trost, Ryan. Publisher: Upper Saddle River, NJ : Addison-Wesley, 2010Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 TRO 2010]
(1).
|
|
|
Security information and event management (SIEM) implementation / David R. Miller ... [et al.].
by Miller, David, 1959-. Publisher: New York : McGraw-Hill, c2011Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 SEC 2011]
(1).
|
|
|
Oracle Identity and Access Manager 11g for administrators [electronic resource] : administer Oracle Identity and Access Management: installation, configuration, and day-to-day tasks / Atul Kumar.
by Kumar, Atul | ebrary, Inc. Publisher: Birmingham, U.K. : Packt Pub., 2011Online access: An electronic book accessible through the World Wide Web; click to view Availability: No items available
|
|
|
BackTrack 5 wireless penetration testing [electronic resource] : beginner's guide : master bleeding edge wireless testing techniques with BackTrack 5 / Vivek Ramachandran.
by Ramachandran, Vivek | ebrary, Inc. Publisher: Birmingham [U.K.] : Packt Pub. Ltd., 2011Online access: An electronic book accessible through the World Wide Web; click to view Availability: No items available
|
|
|
The state of the art in intrusion prevention and detection / edited by Al-Sakib Khan Pathan.
by Pathan, Al-Sakib Khan [editor,, author.]. Publisher: Boca Raton : CRC Press, Taylor & Francis Group, [2014]Copyright date: ©2014Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for reference: Taylor's Library-TU
[Call number: 005.8]
(1).
|