Your search returned 243 results.

Not what you expected? Check for suggestions
|
Counter hack : a step-by-step guide to computer attacks and effective defenses / Ed Skoudis

by Skoudis, Ed.

Publisher: Upper Saddle River, N.J. : Prentice Hall PTR, c2002Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 SKO] (1).
Hacking exposed : network security secrets and solutions / Stuart McClure, Joel Scambray and George Kurtz

by McClure, Stuart | Kurtz, George [(j.a.)] | Scambray, Joel [(j.a.)].

Edition: 3rd ed.Publisher: New York : Osborne/McGraw-Hill, c2001Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 MAC] (1).
Maximum security : [a hacker's guide to protecting your internet site and network] / Anonymous

Edition: 3rd ed.Publisher: Indianapolis, Ind. : Sams, c2001Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 MAX] (2).
Developer's guide to web application security / Michael Cross.

by Cross, Michael.

Publisher: Rockland, Mass. : Syngress Publishing, c2007Other title: Web application security..Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 CRO] (1).
Information security for managers / Michael Workman, Daniel C. Phelps, John N. Gathegi.

by Workman, Michael D, 1957- | Phelps, Daniel C | Gathegi, John Ng'ang'a.

Publisher: Burlington, MA : Jones & Bartlett Learning, c2013Availability: Items available for loan: Taylor's Library-TU [Call number: 658.478 WOR 2013] (1).
Network security illustrated / Jason Albanese, Wes Sonnenreich.

by Albanese, Jason | Sonnenreich, Wes, 1974-.

Publisher: New York : McGraw-Hill, c2004Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 ALB] (1).
Wars of disruption and resilience [electronic resource] : cybered conflict, power, and national security / Chris C. Demchak.

by Demchak, Chris C | ebrary, Inc.

Publisher: Athens : University of Georgia Press, c2011Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan: [Call number: 363.325] (1).
Anti-hacker tool kit / Mike Shema, Bradley C. Johnson.

by Shema, Mike | Johnson, Bradley C.

Edition: 2nd ed.Publisher: New York : McGraw-Hill/Osborne, c2004Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 SHE] (1).
Guide to network defense and countermeasures / Greg Holden.

by Holden, Greg.

Publisher: Boston, Mass. : Thomson/Course Technology, c2003Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 HOL] (1).
Security + guide to network security fundamentals / by Mark Ciampa

by Ciampa, Mark.

Edition: 2nd ed.Publisher: Boston, Mass. : Course Technology / Thomson Learning, c2005Other title: Guide to network security fundamentals. | Network security fundamentals..Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 CIA] (1).
Cryptography and network security : principles and practice / William Stallings.

by Stallings, William.

Edition: 3rd ed.Publisher: Upper Saddle River, N.J. : Prentice Hall, c2003Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 STA] (1).
Hacking exposed 7 : network security secrets & solutions / Stuart Mcclure, Joel Scambray, George Kurtz.

by McClure, Stuart | McClure, Stuart | Scambray, Joel | Kurtz, George.

Publisher: New York : McGraw-Hill, c2012Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 MAC 2012] (2).