Your search returned 55 results.

Not what you expected? Check for suggestions
|
Maximum security : [a hacker's guide to protecting your internet site and network] / Anonymous

Edition: 3rd ed.Publisher: Indianapolis, Ind. : Sams, c2001Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 MAX] (2).
Maximum Linux security : [a hacker's guide to protecting your Linux server and workstation] / Anonymous

by Ray, John, 1971-.

Edition: 2nd ed. / with revisions by John Ray.Publisher: Indianapolis, Ind. : Sams, c2001Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 MAX] (1).
Multimedia security technologies for digital rights management / edited by Wenjun Zeng, Heather Yu, Ching-Yung Lin.

by Zeng, Wenjun, 1967- | Yu, Hong Heather, 1967- | Lin, Ching-Yung.

Publisher: Boston : Academic Press, c2006Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 MUL] (1).
Hack attacks testing : how to conduct your own security audit / John Chirillo

by Chirillo, John, 1970-.

Publisher: New York : Wiley, c2003Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 CHI] (1).
Applied cryptography : protocols, algorithms, and source code in C / Bruce Schneier.

by Schneier, Bruce, 1963-.

Edition: 2nd ed.Publisher: New York : Wiley, c1996Availability: Items available for loan: Taylor's Library-TU [Call number: 005.82 SCH] (3).
Security + guide to network security fundamentals / by Mark Ciampa

by Ciampa, Mark.

Edition: 2nd ed.Publisher: Boston, Mass. : Course Technology / Thomson Learning, c2005Other title: Guide to network security fundamentals. | Network security fundamentals..Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 CIA] (1).
Trust and security in collaborative computing / Xukai Zou, Yuan-Shun Dai, Yi Pan.

by Zou, Xukai, 1963- | Dai, Yuan-Shun | Pan, Yi, 1960-.

Publisher: Singapore : World Scientific, c2008Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 ZOU 2008] (1).
Windows forensic analysis DVD toolkit / Harlan Carvey; Eoghan Casey, technical editor.

by Carvey, Harlan.

Edition: 2nd ed.Publisher: Burlington, MA : Syngress Publ., c2009Availability: Items available for loan: Taylor's Library-TU [Call number: 363.250968 CAR 2009] (2).
Forensic discovery / Dan Farmer, Wietse Venema.

by Farmer, Dan | Venema, Wietse.

Publisher: Upper Saddle River, NJ : Addison-Wesley, c2005Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 FAR 2005] (1).
Virtualization and forensics : a digital forensic investigator's guide to virtual environments / Diane Barrett, Gregory Kipper.

by Barrett, Diane | Kipper, Gregory.

Publisher: Burlington, MA : Elsevier/Syngress, c2010Availability: Items available for loan: Taylor's Library-TU [Call number: 363.25968 BAR 2010] (1).
The art of software security assessment : identifying and preventing software vulnerabilities / Mark Dowd, John McDonald, Justin Schuh.

by Dowd, Mark | McDonald, John, 1977- | Schuh, Justin.

Publisher: Upper Saddle River, NJ : Addison-Wesley, c2007Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 DOW 2007] (1).
The security risk assessment handbook : a complete guide for performing security risk assessments / Douglas J. Landoll.

by Landoll, Douglas J.

Publisher: Boca Raton, FL : Auerbach Pub., 2006Availability: Items available for loan: Taylor's Library-TU [Call number: 658.47 LAN 2006] (1).
The web application hacker's handbook : discovering and exploiting security flaws / Dafydd Stuttard, Marcus Pinto.

by Stuttard, Dafydd, 1972- | Pinto, Marcus, 1978-.

Publisher: Indianapolis, IN : Wiley Pub., c2008Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 STU 2008] (1).
Dear Hacker : letters to the editor of 2600 / Emmanuel Goldstein.

by Goldstein, Emmanuel, 1959-.

Publisher: Indianapolis, IN : Wiley Pub., c2010Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 GOL 2010] (1).
24 deadly sins of software security : programming flaws and how to fix them / Michael Howard, David LeBlanc, and John Viega.

by Howard, Michael, 1965- | LeBlanc, David, 1960- | Viega, John.

Publisher: New York, NY : McGraw-Hill, c2010Other title: Twenty four deadly sins of software security.Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 HOW 2010] (1).
Handbook of information and communication security / Peter Stavroulakis, Mark Stamp, editors.

by Stavroulakis, Peter | Stamp, Mark.

Publisher: Berlin : Springer, 2010Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 HAN 2010] (1).
VMware vSphere and virtual infrastructure security : securing the virtual environment / Edward L. Haletky.

by Haletky, Edward L.

Publisher: Upper Saddle River, NJ. : Prentice Hall, c2009Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 HAL 2009] (1).
Managing cybersecurity resources : a cost-benefit analysis / by Lawrence A. Gordon and Martin P. Loeb.

by Gordon, Lawrence A | Loeb, Martin P.

Publisher: New York : McGraw-Hill, c2006Availability: Items available for loan: Taylor's Library-TU [Call number: 658.478 GOR] (1).
Moving target defense II : application of game theory and adversarial modeling / Sushil Jajodia ... [et al.], editors.

by Jajodia, Sushil.

Publisher: New York : Springer, c2013Other title: Moving target defense two.Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 MOV 2013] (1).
Professional ASP.NET 3.5 security, membership, and role management with C# and VB / Bilal Haidar, Stefan Schackow.

by Haidar, Bilal | Schackow, Stefan, 1970-.

Publisher: Indianapolis, IN : Wiley Pub., 2008Availability: Items available for loan: Taylor's Library-TU [Call number: 005.276 HAI] (1).