|
|
Maximum security : [a hacker's guide to protecting your internet site and network] / Anonymous Edition: 3rd ed.Publisher: Indianapolis, Ind. : Sams, c2001Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 MAX]
(2).
|
|
|
The computer incident response planning handbook : executable plans for potecting information at risk / N.K. McCarthy.
by McCarthy, N. K. Publisher: New York : McGraw-Hill, c2012Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 MAC 2012]
(2).
|
|
|
Security + guide to network security fundamentals / by Mark Ciampa
by Ciampa, Mark. Edition: 2nd ed.Publisher: Boston, Mass. : Course Technology / Thomson Learning, c2005Other title: Guide to network security fundamentals. | Network security fundamentals..Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 CIA]
(1).
|
|
|
Trust and security in collaborative computing / Xukai Zou, Yuan-Shun Dai, Yi Pan.
by Zou, Xukai, 1963- | Dai, Yuan-Shun | Pan, Yi, 1960-. Publisher: Singapore : World Scientific, c2008Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 ZOU 2008]
(1).
|
|
|
Windows forensic analysis DVD toolkit / Harlan Carvey; Eoghan Casey, technical editor.
by Carvey, Harlan. Edition: 2nd ed.Publisher: Burlington, MA : Syngress Publ., c2009Availability: Items available for loan: Taylor's Library-TU
[Call number: 363.250968 CAR 2009]
(2).
|
|
|
The art of software security assessment : identifying and preventing software vulnerabilities / Mark Dowd, John McDonald, Justin Schuh.
by Dowd, Mark | McDonald, John, 1977- | Schuh, Justin. Publisher: Upper Saddle River, NJ : Addison-Wesley, c2007Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 DOW 2007]
(1).
|
|
|
24 deadly sins of software security : programming flaws and how to fix them / Michael Howard, David LeBlanc, and John Viega.
by Howard, Michael, 1965- | LeBlanc, David, 1960- | Viega, John. Publisher: New York, NY : McGraw-Hill, c2010Other title: Twenty four deadly sins of software security.Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 HOW 2010]
(1).
|
|
|
Security in a Web 2.0+ world : a standards based approach / C. Solari and contributors.
by Solari, C. (Carlos). Publisher: Chichester, West Sussex : John Wiley c2009Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 SOL 2009]
(1).
|
|
|
Security+ guide to network security fundamentals / by Mark Ciampa.
by Ciampa, Mark D. Edition: 3rd ed.Publisher: Boston, MA. : Course Technology/ Cengage Learning, c2009Other title: Security plus guide to network security fundamentals, Network security fundamentals.Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 CIA 2009]
(4).
|
|
|
Moving target defense II : application of game theory and adversarial modeling / Sushil Jajodia ... [et al.], editors.
by Jajodia, Sushil. Publisher: New York : Springer, c2013Other title: Moving target defense two.Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 MOV 2013]
(1).
|
|
|
Principles of information security / Michael E. Whitman and Herbert J. Mattord
by Whitman, Michael E, 1964- | Mattord, Herbert J. Edition: 3rd ed.Publisher: Boston, Mass. : Course Technology Cengage Learning, c2009Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 WHI 2009]
(1).
|
|
|
Principles of computer security : CompTIA security+ and beyond / Wm. Arthur Conklin ... [et al.].
by Conklin, Wm. Arthur (William Arthur). Edition: 2nd ed.Publisher: New York : McGraw-Hill, c2010Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 PRI 2010]
(4).
|
|
|
A multidisciplinary introduction to information security / [edited by] Stig F. Mjølsnes.
by Mjølsnes, Stig F. Publisher: Boca Raton, FL : CRC Press, c2012Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 MUL 2012]
(3).
|
|
|
Hacking exposed : web applications : web application security secrets and solutions / Joel Scambray, Vincent Liu, Caleb Sima.
by Scambray, Joel | Liu, Vincent | Sima, Caleb. Edition: 3rd ed.Publisher: San Francisco, CA : McGraw-Hill Companies, 2011Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 SCA 2011]
(2).
|
|
|
iPad & iPhone administrator's guide : [enterprise deployment strategies and security solutions] / Guy Hart-Davis.
by Hart-Davis, Guy. Publisher: New York : McGraw-Hill, c2011Other title: iPad and iPhone administrator's guide.Availability: Items available for loan: Taylor's Library-TU
[Call number: 004.1675068 HAR 2011]
(1).
|
|
|
Firewall design and analysis / Alex X. Liu.
by Liu, Alex X. Publisher: Singapore : World Scientific, c2011Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 LIU 2011]
(1).
|
|
|
Computer forensics Jumpstart / Michael Solomon, Diane Barrett, Neil Broom.
by Solomon, Michael, (Michael G.), 1963- | Barrett, Diane | Broom, Neil. Publisher: San Francisco, Calif. : Sybex, 2005Availability: Items available for loan: Taylor's Library-TU
[Call number: 363.25968 SOL 2005]
(1).
|
|
|
Official (ISC)2 guide to the CISSP CBK / edited by Harold F. Tipton ; contributors, Paul Baker ... [et al.].
by Tipton, Harold F. Edition: 2nd ed.Publisher: Boca Raton, FL : CRC Press, c2010Other title: Official (ISC)2 guide to the CISSP CBK.Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 OFF 2010]
(2).
|
|
|
Official (ISC)2 guide to the ISSAP CBK / edited by Harold F. Tipton.
by Tipton, Harold F | International Information Systems Security Certification Consortium. Publisher: Boca Raton, FL : CRC Press, c2011Availability: Items available for loan: Taylor's Library-TU
[Call number: 004 OFF 2011]
(1).
|
|
|
Principles of information security / Michael E. Whitman, Herbert J. Mattord.
by Whitman, Michael E, 1964- | Mattord, Herbert J. Edition: 4th ed.Publisher: Boston, MA : Course Technology/Cengage Learning, c2012Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 WHI 2012]
(2).
|