Your search returned 55 results.

Not what you expected? Check for suggestions
|
Principles of information security / Michael E. Whitman and Herbert J. Mattord

by Whitman, Michael E, 1964- | Mattord, Herbert J.

Edition: 3rd ed.Publisher: Boston, Mass. : Course Technology Cengage Learning, c2009Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 WHI 2009] (1).
Hacking exposed computer forensics / Aaron Philipp, David Cowen, Chris Davis.

by Philipp, Aaron | Cowen, David | Davis, Chris (Christopher Michael).

Edition: 2nd ed.Publisher: New York : McGraw-Hill, c2010Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 PHI 2010] (2).
Principles of computer security : CompTIA security+ and beyond / Wm. Arthur Conklin ... [et al.].

by Conklin, Wm. Arthur (William Arthur).

Edition: 2nd ed.Publisher: New York : McGraw-Hill, c2010Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 PRI 2010] (4).
Risk analysis and security countermeasure selection / Thomas L. Norman.

by Norman, Thomas L.

Publisher: Boca Raton, FL : CRC Press, 2010Availability: Items available for loan: Taylor's Library-TU [Call number: 658.47 NOR 2010] (1).
Distributed systems security : issues, processes and solutions / by Abhijit Belapurkar ... [et al.].

by Belapurkar, Abhijit.

Publisher: Hoboken, NJ : John Wiley, c2009Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 DIS 2009] (1).
A multidisciplinary introduction to information security / [edited by] Stig F. Mjølsnes.

by Mjølsnes, Stig F.

Publisher: Boca Raton, FL : CRC Press, c2012Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 MUL 2012] (3).
Hacking exposed : web applications : web application security secrets and solutions / Joel Scambray, Vincent Liu, Caleb Sima.

by Scambray, Joel | Liu, Vincent | Sima, Caleb.

Edition: 3rd ed.Publisher: San Francisco, CA : McGraw-Hill Companies, 2011Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 SCA 2011] (2).
Computer forensics Jumpstart / Michael Solomon, Diane Barrett, Neil Broom.

by Solomon, Michael, (Michael G.), 1963- | Barrett, Diane | Broom, Neil.

Publisher: San Francisco, Calif. : Sybex, 2005Availability: Items available for loan: Taylor's Library-TU [Call number: 363.25968 SOL 2005] (1).
Security 2020 : reduce security risks this decade / Doug Howard and Kevin Prince.

by Howard, Doug | Prince, Kevin.

Edition: 1st ed.Publisher: Indianapolis, IN : Wiley Pub., c2011Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 HOW 2011] (1).
Mobile device security : a comprehensive guide to securing your information in a moving world / Stephen Fried.

by Fried, Stephen, 1962-.

Publisher: Boca Raton, FL : CRC Press, 2010Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 FRI 2010] (2).
Principles of information security / Michael E. Whitman, Herbert J. Mattord.

by Whitman, Michael E, 1964- | Mattord, Herbert J.

Edition: 4th ed.Publisher: Boston, MA : Course Technology/Cengage Learning, c2012Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 WHI 2012] (2).
Corporate computer security / Randall J. Boyle, Raymond R. Panko.

by Boyle, Randall J | Panko, Raymond R.

Edition: 3rd ed.Publisher: Boston : Pearson, c2013Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 BOY 2013] (1).
Building secure software : how to avoid security problems the right way / John Viega, Gary McGraw.

by Viega, John | McGraw, Gary, 1966-.

Publisher: Boston, MA : Addison-Wesley, c2002Availability: Items available for loan: Taylor's Library-TU [Call number: 005.1 VIE 2002] (1).
Applied information security : a hands-on approach / David Basin, Patrick Schaller, Michael Schläpfer.

by Basin, David | Schaller, Patrick | Schläpfer, Michael.

Publisher: Heidelberg : Springer, 2011Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 BAS 2011] (1).
Cybersecurity : the essential body of knowledge / Dan Shoemaker, Wm. Arthur Conklin.

by Shoemaker, Dan | Conklin, Wm. Arthur (William Arthur).

Publisher: Boston, MA : Course Technology, Cengage Learning, c2012Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 SHO 2012] (1).
Management of information security / Michael Whitman, Herbert Mattord.

by Whitman, Michael E, 1964- | Mattord, Herbert J.

Edition: 2nd ed.Publisher: Boston, MA : Course Technology, Cengage Learning, c2008Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 WHI 2008] (1).
Security engineering : a guide to building dependable distributed systems / Ross J. Anderson.

by Anderson, Ross, 1956-.

Edition: 2nd ed.Publisher: Indianapolis, IN : Wiley, c2008Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 AND 2008] (5).
Security policies and implementation issues / Rob Johnson with Mike Merkow.

by Johnson, Rob (Robert) | Merkow, Mark S.

Publisher: Burlington, MA : Jones & Bartlett Learning, c2011Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 JOH 2011] (1).
Data-driven security : analysis, visualization and dashboards / Jay Jacobs + Bob Rudis.

by Jacobs, Jay (Data analyst) | Rudis, Bob.

Edition: 1st edition.Publisher: Indianapolis, IN : John Wiley & Sons Inc., [2014]Copyright date: ©2014Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 JAC 2014] (1).
Android hacker's handbook / Joshua J. Drake [and five others].

by Drake, Joshua J.

Publisher: Indiana, IN : John Wiley & Sons, Inc., [2014]Copyright date: ©2014Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 DRA 2014] (1).