|
|
Web security : a whitehat perspective / Wu Hanqing and Liz Zhao.
by Hanqing, Wu | Zhao, Liz. Publisher: Boca Raton, FL : Taylor & Francis, CRC Press, [2015]Copyright date: ©2015Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 HAN 2015]
(1).
|
|
|
Windows forensic analysis DVD toolkit / Harlan Carvey; Eoghan Casey, technical editor.
by Carvey, Harlan. Edition: 2nd ed.Publisher: Burlington, MA : Syngress Publ., c2009Availability: Items available for loan: Taylor's Library-TU
[Call number: 363.250968 CAR 2009]
(2).
|
|
|
Internet forensics / Robert Jones.
by Jones, Robert. Publisher: Sebastopol, CA : O'Reilly, c2006Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 JON 2006]
(1).
|
|
|
The web application hacker's handbook : discovering and exploiting security flaws / Dafydd Stuttard, Marcus Pinto.
by Stuttard, Dafydd, 1972- | Pinto, Marcus, 1978-. Publisher: Indianapolis, IN : Wiley Pub., c2008Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 STU 2008]
(1).
|
|
|
The business of cybersecurity : foundations and ideologies / Ashwini Sathnur.
by Sathnur, Ashwini. Publisher: New York, NY : Business Expert Press, 2019Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for reference: Taylor's Library-TU
[Call number: 005.8]
(1).
|
|
|
Distributed systems security : issues, processes and solutions / by Abhijit Belapurkar ... [et al.].
by Belapurkar, Abhijit. Publisher: Hoboken, NJ : John Wiley, c2009Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 DIS 2009]
(1).
|
|
|
Digital security : cyber terror and cyber security / Ananda Mitra
by Mitra, Ananda, 1960-. Publisher: New York : Chelsea House, c2010Availability: Items available for loan: Taylor's Library-TU
[Call number: 364.168 MIT 2010]
(1).
|
|
|
Computer crime, investigation, and the law / Chuck Easttom and Jeff Taylor.
by Easttom, Chuck | Taylor, Jeffrey. Publisher: Boston, MA : Course Technology, Cengage Learning, c2011Availability: Items available for loan: Taylor's Library-TU
[Call number: 364.168 EAS 2011]
(1).
|
|
|
The web application hacker's handbook : finding and exploiting security flaws / Dafydd Stuttard, Marcus Pinto.
by Stuttard, Dafydd, 1972- | Pinto, Marcus, 1978-. Edition: 2nd ed.Publisher: Indianapolis, Ind : Wiley, c2011Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 STU 2011]
(1).
|
|
|
Insider threats in cyber security [electronic resource] / Christian W. Probst ... [et al.], editors.
by Probst, Christian W. Publisher: New York : Springer, c2010Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for reference: Taylor's Library-TU
[Call number: 005.8]
(1).
|
|
|
Network science and cybersecurity [electronic resource] / Robinson E. Pino, editor.
by Pino, Robinson E. Publisher: New York : Springer Science+Business Media, c2014Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for reference: Taylor's Library-TU
[Call number: 005.8]
(1).
|
|
|
Designing network security / Merike Kaeo.
by KAEO, Marike. Publisher: Indianapolis, Ind. : Macmillan Technical Pub., c1999Other title: Designing network security : a practical guide to creating a secure network infrastructure..Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 KAE]
(2).
|
|
|
The complete guide to internet security / Mark S. Merkow & James Breithaupt.
by Merkow, Mark S | Breithaupt, Jim, 1955-. Publisher: New York : American Management Association, c2000Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 MER]
(1).
|