Your search returned 336 results.

Not what you expected? Check for suggestions
|
Hack proofing Linux : a guide to open source security / James Stanger, Patrick T. Lane

by Stanger, James | Lane, Patrick T.

Publisher: Rockland, Mass : Syngress, c2001Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 STA] (1).
Intrusion signatures and analysis / Stephen Northcutt ... [et al.]

by Northcutt, Stephen.

Edition: 1st ed.Publisher: Indianapolis, Ind. : New Riders, c2001Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 INT] (1).
Maximum security : [a hacker's guide to protecting your internet site and network] / Anonymous

Edition: 3rd ed.Publisher: Indianapolis, Ind. : Sams, c2001Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 MAX] (2).
Maximum Linux security : [a hacker's guide to protecting your Linux server and workstation] / Anonymous

by Ray, John, 1971-.

Edition: 2nd ed. / with revisions by John Ray.Publisher: Indianapolis, Ind. : Sams, c2001Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 MAX] (1).
Multimedia security technologies for digital rights management / edited by Wenjun Zeng, Heather Yu, Ching-Yung Lin.

by Zeng, Wenjun, 1967- | Yu, Hong Heather, 1967- | Lin, Ching-Yung.

Publisher: Boston : Academic Press, c2006Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 MUL] (1).
Developer's guide to web application security / Michael Cross.

by Cross, Michael.

Publisher: Rockland, Mass. : Syngress Publishing, c2007Other title: Web application security..Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 CRO] (1).
Computer security : art and science / Matt Bishop

by Bishop, Matthew.

Publisher: Boston, Mass. : Addison-Wesley, c2003Other title: Computer security.Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 BIS] (1).
Hack attacks testing : how to conduct your own security audit / John Chirillo

by Chirillo, John, 1970-.

Publisher: New York : Wiley, c2003Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 CHI] (1).
Guide to computer forensics and investigation / Bill Nelson ... [et al.].

by Nelson, Bill.

Publisher: Boston : Thomson/Course Technology, c2004Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 GUI] (1).
Applied cryptography : protocols, algorithms, and source code in C / Bruce Schneier.

by Schneier, Bruce, 1963-.

Edition: 2nd ed.Publisher: New York : Wiley, c1996Availability: Items available for loan: Taylor's Library-TU [Call number: 005.82 SCH] (3).
Sams teach yourself Linux Security basics in 24 hours / Aron Hsiao.

by Hsiao, Aron.

Publisher: Indianapolis, IN : Sams, c2001Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 HSI] (1).