Your search returned 121 results.

Not what you expected? Check for suggestions
|
Principles of information security / Michael E. Whitman, Herbert J. Mattord.

by Whitman, Michael E, 1964- | Mattord, Herbert J.

Edition: 4th ed.Publisher: Boston, MA : Course Technology/Cengage Learning, c2012Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 WHI 2012] (2).
Communication in a wired world [videorecording] : be smart, be safe / Learning Seed, video production, Stage Fright ; writer & executive producer, Louise Welsh Schrank.

by Schrank, Louise Welsh | Porter, Olivia | Stage Fright Productions | Learning Seed Company.

Publisher: Chicago, IL : Learning Seed, c2009Other title: Be smart, be safe.Availability: Items available for loan: Taylor's Library-TU [Call number: 303.4833 COM 2009] (1).
Management of information security / Michael Whitman, Herbert Mattord.

by Whitman, Michael E, 1964- | Mattord, Herbert J.

Edition: 3rd ed.Publisher: Boston : Course Technology Cengage Learning, c2010Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 WHI 2010] (2).
Computer security : principles and practice / William Stallings, Lawrie Brown ; with contributions by Mick Bauer, Michael Howard.

by Stallings, William | Brown, Lawrie | Bauer, Michael D | Howard, Michael, 1965-.

Edition: 2nd ed.Publisher: Boston, MA : Pearson, 2012Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 STA 2012] (1).
Computer security fundamentals / Chuck Easttom.

by Easttom, Chuck.

Edition: 2nd ed.Publisher: Indianapolis, IN : Pearson, c2012Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 EAS 2012] (1).
Defense against the black arts : how hackers do what they do and how to protect against it / Jesse Varsalone, Matthew McFadden ; with Sean Morrissey ... [et al.] ; foreword by Joe McCray.

by Varsalone, Jesse | McFadden, Matthew.

Publisher: Boca Raton, FL : CRC Press, c2012Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 VAR 2012] (1).
Gray hat hacking : the ethical hacker's handbook / Allen Harper ... [et al.].

by Harper, Allen.

Edition: 3rd ed.Publisher: New York : McGraw-Hill, c2011Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 GRA 2011] (2).
Introduction to cryptography with open-source software / Alasdair McAndrew.

by McAndrew, Alasdair.

Publisher: Boca Raton, FL : CRC Press, c2011Availability: Items available for loan: Taylor's Library-TU [Call number: 005.82 MAC 2011] (1).
Machine learning forensics for law enforcement, security, and intelligence / Jesus Mena.

by Mena, Jesus.

Publisher: Boca Raton, FL : CRC Press, c2011Availability: Items available for loan: Taylor's Library-TU [Call number: 363.25968 MEN 2011] (1).
The web application hacker's handbook : finding and exploiting security flaws / Dafydd Stuttard, Marcus Pinto.

by Stuttard, Dafydd, 1972- | Pinto, Marcus, 1978-.

Edition: 2nd ed.Publisher: Indianapolis, Ind : Wiley, c2011Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 STU 2011] (1).
Information security : a practical approach / S.M. Bhaskar, S.I. Ahson.

by Bhaskar, S. M | Ahson, S. I.

Publisher: Oxford : Alpha Science Int., c2008Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 BHA 2008] (1).
Moodle security : learn how to install and configure Moodle in the most secure way possible / Darko Miletić.

by Miletić, Darko.

Publisher: Birmingham, U.K. : Packt Publishing, c2011Availability: Items available for loan: Taylor's Library-TU [Call number: 371.334 MIL 2011] (1).
Web commerce security : design and development / Hadi Nahari, Ronald L. Krutz.

by Nahari, Hadi | Krutz, Ronald L.

Publisher: Indianapolis : John Wiley, c2011Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 NAH 2011] (1).
The security risk assessment handbook : a complete guide for performing security risk assessments / Douglas Landoll.

by Landoll, Douglas J.

Edition: 2nd ed.Publisher: Boca Raton, FL : CRC Press, 2011Availability: Items available for loan: Taylor's Library-TU [Call number: 658.47 LAN 2011] (1).
Security de-engineering : solving the problems in information risk management / Ian Tibble.

by Tibble, Ian.

Publisher: Boca Raton, FL : CRC Press, c2012Availability: Items available for loan: Taylor's Library-TU [Call number: 658.478 TIB 2012] (1).
Computer forensics and cyber crime : an introduction / Marjie T. Britz.

by Britz, Marjie [author.].

Edition: Third Edition.Publisher: Boston : Pearson, [2013]Copyright date: ©2013Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 BRI 2013] (1).
Security engineering : a guide to building dependable distributed systems / Ross J. Anderson.

by Anderson, Ross, 1956-.

Edition: 2nd ed.Publisher: Indianapolis, IN : Wiley, c2008Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 AND 2008] (5).
Cryptography and network security : principles and practice / William Stallings.

by Stallings, William.

Edition: 7th ed.Publisher: Boston, MA : Pearson, c2014Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 STA 2014] (2).
Secure software design / Theodor Richardson, Charles N. Thies.

by Richardson, Theodor | Thies, Charles.

Publisher: Burlington, MA : Jones & Bartlett Learning, c2013Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 RIC 2013] (1).
Cyber attack : the truth about digital crime, cyber warfare and goverment snooping / Paul Day.

by Day, Paul (Computer security expert).

Publisher: London : Carlton Books, 2014Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 DAY 2014] (1).