|
|
Maximum security : [a hacker's guide to protecting your internet site and network] / Anonymous Edition: 3rd ed.Publisher: Indianapolis, Ind. : Sams, c2001Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 MAX]
(2).
|
|
|
Maximum Linux security : [a hacker's guide to protecting your Linux server and workstation] / Anonymous
by Ray, John, 1971-. Edition: 2nd ed. / with revisions by John Ray.Publisher: Indianapolis, Ind. : Sams, c2001Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 MAX]
(1).
|
|
|
Multimedia security technologies for digital rights management / edited by Wenjun Zeng, Heather Yu, Ching-Yung Lin.
by Zeng, Wenjun, 1967- | Yu, Hong Heather, 1967- | Lin, Ching-Yung. Publisher: Boston : Academic Press, c2006Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 MUL]
(1).
|
|
|
Hack attacks testing : how to conduct your own security audit / John Chirillo
by Chirillo, John, 1970-. Publisher: New York : Wiley, c2003Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 CHI]
(1).
|
|
|
Applied cryptography : protocols, algorithms, and source code in C / Bruce Schneier.
by Schneier, Bruce, 1963-. Edition: 2nd ed.Publisher: New York : Wiley, c1996Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.82 SCH]
(3).
|
|
|
Security + guide to network security fundamentals / by Mark Ciampa
by Ciampa, Mark. Edition: 2nd ed.Publisher: Boston, Mass. : Course Technology / Thomson Learning, c2005Other title: Guide to network security fundamentals. | Network security fundamentals..Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 CIA]
(1).
|
|
|
Trust and security in collaborative computing / Xukai Zou, Yuan-Shun Dai, Yi Pan.
by Zou, Xukai, 1963- | Dai, Yuan-Shun | Pan, Yi, 1960-. Publisher: Singapore : World Scientific, c2008Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 ZOU 2008]
(1).
|
|
|
Windows forensic analysis DVD toolkit / Harlan Carvey; Eoghan Casey, technical editor.
by Carvey, Harlan. Edition: 2nd ed.Publisher: Burlington, MA : Syngress Publ., c2009Availability: Items available for loan: Taylor's Library-TU
[Call number: 363.250968 CAR 2009]
(2).
|
|
|
Forensic discovery / Dan Farmer, Wietse Venema.
by Farmer, Dan | Venema, Wietse. Publisher: Upper Saddle River, NJ : Addison-Wesley, c2005Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 FAR 2005]
(1).
|
|
|
Virtualization and forensics : a digital forensic investigator's guide to virtual environments / Diane Barrett, Gregory Kipper.
by Barrett, Diane | Kipper, Gregory. Publisher: Burlington, MA : Elsevier/Syngress, c2010Availability: Items available for loan: Taylor's Library-TU
[Call number: 363.25968 BAR 2010]
(1).
|
|
|
The art of software security assessment : identifying and preventing software vulnerabilities / Mark Dowd, John McDonald, Justin Schuh.
by Dowd, Mark | McDonald, John, 1977- | Schuh, Justin. Publisher: Upper Saddle River, NJ : Addison-Wesley, c2007Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 DOW 2007]
(1).
|
|
|
The security risk assessment handbook : a complete guide for performing security risk assessments / Douglas J. Landoll.
by Landoll, Douglas J. Publisher: Boca Raton, FL : Auerbach Pub., 2006Availability: Items available for loan: Taylor's Library-TU
[Call number: 658.47 LAN 2006]
(1).
|
|
|
The web application hacker's handbook : discovering and exploiting security flaws / Dafydd Stuttard, Marcus Pinto.
by Stuttard, Dafydd, 1972- | Pinto, Marcus, 1978-. Publisher: Indianapolis, IN : Wiley Pub., c2008Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 STU 2008]
(1).
|
|
|
Dear Hacker : letters to the editor of 2600 / Emmanuel Goldstein.
by Goldstein, Emmanuel, 1959-. Publisher: Indianapolis, IN : Wiley Pub., c2010Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 GOL 2010]
(1).
|
|
|
24 deadly sins of software security : programming flaws and how to fix them / Michael Howard, David LeBlanc, and John Viega.
by Howard, Michael, 1965- | LeBlanc, David, 1960- | Viega, John. Publisher: New York, NY : McGraw-Hill, c2010Other title: Twenty four deadly sins of software security.Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 HOW 2010]
(1).
|
|
|
Handbook of information and communication security / Peter Stavroulakis, Mark Stamp, editors.
by Stavroulakis, Peter | Stamp, Mark. Publisher: Berlin : Springer, 2010Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 HAN 2010]
(1).
|
|
|
VMware vSphere and virtual infrastructure security : securing the virtual environment / Edward L. Haletky.
by Haletky, Edward L. Publisher: Upper Saddle River, NJ. : Prentice Hall, c2009Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 HAL 2009]
(1).
|
|
|
Managing cybersecurity resources : a cost-benefit analysis / by Lawrence A. Gordon and Martin P. Loeb.
by Gordon, Lawrence A | Loeb, Martin P. Publisher: New York : McGraw-Hill, c2006Availability: Items available for loan: Taylor's Library-TU
[Call number: 658.478 GOR]
(1).
|
|
|
Moving target defense II : application of game theory and adversarial modeling / Sushil Jajodia ... [et al.], editors.
by Jajodia, Sushil. Publisher: New York : Springer, c2013Other title: Moving target defense two.Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 MOV 2013]
(1).
|
|
|
Professional ASP.NET 3.5 security, membership, and role management with C# and VB / Bilal Haidar, Stefan Schackow.
by Haidar, Bilal | Schackow, Stefan, 1970-. Publisher: Indianapolis, IN : Wiley Pub., 2008Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.276 HAI]
(1).
|