Your search returned 35 results.

Not what you expected? Check for suggestions
|
Web security : a whitehat perspective / Wu Hanqing and Liz Zhao.

by Hanqing, Wu | Zhao, Liz.

Publisher: Boca Raton, FL : Taylor & Francis, CRC Press, [2015]Copyright date: ©2015Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 HAN 2015] (1).
Cloud computing security : foundations and challenges / editor, John R. Vacca.

by Vacca, John R, 1947-.

Publisher: Boca Raton : CRC Press, [2017]Copyright date: ©2017Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for reference: Taylor's Library-TU [Call number: 005.8 C647] (1).
Wireless networks and mobile computing / Koushik Sinha, Hewlett-Packard Labs, Bangalore, India, Sasthi C. Ghosh, Indian Statistical Institute, Kolkata, India, Bhabani P. Sinha, Indian Statistical Institute, Kolkata, India.

by Sinha, Koushik | Ghosh, Sasthi C | Sinha, Bhabani P, 1952- [author.].

Publisher: Boca Raton ; London : CRC Press, [2016]Copyright date: ©2016Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for reference: Taylor's Library-TU [Call number: 621.384 S617] (1).
Multilevel modeling of secure systems in QoP-ML / Bogdan Ksie̜żopolski.

by Ksie̜żopolski, Bogdan.

Publisher: Boca Raton : CRC Press, [2016]Copyright date: ©2016Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for reference: Taylor's Library-TU [Call number: 005.8 K949] (1).
Security without obscurity : a guide to PKI operations / J.J. Stapleton, W. Clay Epstein.

by Stapleton, Jeffrey James | Epstein, W. Clay.

Publisher: Boca Raton, Florida : CRC Press, [2016]Copyright date: ©2016Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for reference: Taylor's Library-TU [Call number: 005.8 S794] (1).
Implementing cybersecurity : a guide to the National Institute of Standards in Technology Risk Management Framework / Anne Kohnke, Dan Shoemaker, and Ken Sigler.

by Kohnke, Anne | Shoemaker, Dan | Sigler, Kenneth.

Publisher: Boca Raton, Fla. : CRC Press, 2017Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for reference: Taylor's Library-TU [Call number: 005.8 K796] (1).
Data privacy : principles and practice / Nataraj Venkataramanan, Ashwin Shriram.

by Venkataramanan, Nataraj | Shriram, Ashwin.

Publisher: Boca Raton, Fla. : CRC Press, [2017]Copyright date: ©2017Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for reference: Taylor's Library-TU [Call number: 005.8 V461] (1).
Trustworthy cyber-physical systems engineering / edited by Alexander Romanovsky, Newcastle University, UK, Fuyuki Ishikawa, National Institute of Informatics, Tokyo, Japan.

by Romanovsky, Alexander, 1954- | Ishikawa, Fuyuki.

Publisher: Boca Raton, Florida : CRC Press, [2017]Copyright date: ©2017Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for reference: Taylor's Library-TU [Call number: 005.8 T873] (1).
Computer network simulation using NS2 / Ajit Kumar Nayak, Satyananda Champati Rai, Rajib Mall.

by Nayak, Ajit Kumar | Rai, Satyananda Champati | Mall, Rajib.

Publisher: Boca Raton : CRC Press, [2016]Copyright date: ℗♭2016Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for reference: Taylor's Library-TU [Call number: 004.6028553 N331] (1).
Introduction to network security / Douglas Jacobson.

by Jacobson, Douglas.

Publisher: Boca Raton : CRC Press, c2009Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 JAC 2009] (1).
Machine learning for computer and cyber security : principles, algorithms, and practices / editors, Brij B. Gupta, Michael Sheng.

by Gupta, Brij, 1982- [editor.] | Sheng, Quan Z [editor.].

Publisher: Boca Raton : CRC Press, [2019]Copyright date: ©2019Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for reference: Taylor's Library-TU [Call number: 006.3/1] (1).
Cloud and virtual data storage networking : your journey to efficient and effective information services / Greg Schulz.

by Schulz, Greg.

Publisher: Boca Raton, FL : CRC Press, c2012Availability: Items available for loan: Taylor's Library-TU [Call number: 004.6782 SCH 2012] (1).
The industrial electronics handbook / edited by Bogdan M. Wilamowski, J. David Irwin.

by Irwin, J. David, 1939- | Wilamowski, Bogdan M.

Edition: 2nd ed.Publisher: Boca Raton, FL : CRC Press, c2011Availability: Items available for loan: Taylor's Library-TU [Call number: 621.381 IND 2011] (6).
Security in an IPv6 environment / Daniel Minoli, Jake Kouns.

by Minoli, Daniel, 1952- | Kouns, Jake.

Publisher: Boca Raton, FL : CRC Press, c2009Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 MIN 2009] (1).
Social computing and virtual communities / edited by Panayiotis Zaphiris and Chee Siang Ang.

by Zaphiris, Panayiotis | Ang, Chee Siang.

Publisher: Boca Raton : CRC Press, c2010Availability: Items available for loan: Taylor's Library-TU [Call number: 004.019 SOC 2010] (1).
A multidisciplinary introduction to information security / [edited by] Stig F. Mjølsnes.

by Mjølsnes, Stig F.

Publisher: Boca Raton, FL : CRC Press, c2012Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 MUL 2012] (3).
Bio-inspired computing and networking / edited by Yang Xiao.

by Xiao, Yang, 1966-.

Publisher: Boca Raton, FL : CRC Press, c2011Availability: Items available for loan: Taylor's Library-TU [Call number: 003.5 BIO 2011] (1).
Official (ISC)2 guide to the CISSP CBK / edited by Harold F. Tipton ; contributors, Paul Baker ... [et al.].

by Tipton, Harold F.

Edition: 2nd ed.Publisher: Boca Raton, FL : CRC Press, c2010Other title: Official (ISC)2 guide to the CISSP CBK.Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 OFF 2010] (2).
Official (ISC)2 guide to the ISSAP CBK / edited by Harold F. Tipton.

by Tipton, Harold F | International Information Systems Security Certification Consortium.

Publisher: Boca Raton, FL : CRC Press, c2011Availability: Items available for loan: Taylor's Library-TU [Call number: 004 OFF 2011] (1).