Your search returned 17 results.

Not what you expected? Check for suggestions
|
Web security : a whitehat perspective / Wu Hanqing and Liz Zhao.

by Hanqing, Wu | Zhao, Liz.

Publisher: Boca Raton, FL : Taylor & Francis, CRC Press, [2015]Copyright date: ©2015Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 HAN 2015] (1).
Windows forensic analysis DVD toolkit / Harlan Carvey; Eoghan Casey, technical editor.

by Carvey, Harlan.

Edition: 2nd ed.Publisher: Burlington, MA : Syngress Publ., c2009Availability: Items available for loan: Taylor's Library-TU [Call number: 363.250968 CAR 2009] (2).
Internet forensics / Robert Jones.

by Jones, Robert.

Publisher: Sebastopol, CA : O'Reilly, c2006Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 JON 2006] (1).
The web application hacker's handbook : discovering and exploiting security flaws / Dafydd Stuttard, Marcus Pinto.

by Stuttard, Dafydd, 1972- | Pinto, Marcus, 1978-.

Publisher: Indianapolis, IN : Wiley Pub., c2008Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 STU 2008] (1).
The business of cybersecurity : foundations and ideologies / Ashwini Sathnur.

by Sathnur, Ashwini.

Publisher: New York, NY : Business Expert Press, 2019Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for reference: Taylor's Library-TU [Call number: 005.8] (1).
Distributed systems security : issues, processes and solutions / by Abhijit Belapurkar ... [et al.].

by Belapurkar, Abhijit.

Publisher: Hoboken, NJ : John Wiley, c2009Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 DIS 2009] (1).
Digital security : cyber terror and cyber security / Ananda Mitra

by Mitra, Ananda, 1960-.

Publisher: New York : Chelsea House, c2010Availability: Items available for loan: Taylor's Library-TU [Call number: 364.168 MIT 2010] (1).
Computer crime, investigation, and the law / Chuck Easttom and Jeff Taylor.

by Easttom, Chuck | Taylor, Jeffrey.

Publisher: Boston, MA : Course Technology, Cengage Learning, c2011Availability: Items available for loan: Taylor's Library-TU [Call number: 364.168 EAS 2011] (1).
The web application hacker's handbook : finding and exploiting security flaws / Dafydd Stuttard, Marcus Pinto.

by Stuttard, Dafydd, 1972- | Pinto, Marcus, 1978-.

Edition: 2nd ed.Publisher: Indianapolis, Ind : Wiley, c2011Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 STU 2011] (1).
Insider threats in cyber security [electronic resource] / Christian W. Probst ... [et al.], editors.

by Probst, Christian W.

Publisher: New York : Springer, c2010Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for reference: Taylor's Library-TU [Call number: 005.8] (1).
Network science and cybersecurity [electronic resource] / Robinson E. Pino, editor.

by Pino, Robinson E.

Publisher: New York : Springer Science+Business Media, c2014Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for reference: Taylor's Library-TU [Call number: 005.8] (1).
Designing network security / Merike Kaeo.

by KAEO, Marike.

Publisher: Indianapolis, Ind. : Macmillan Technical Pub., c1999Other title: Designing network security : a practical guide to creating a secure network infrastructure..Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 KAE] (2).
The complete guide to internet security / Mark S. Merkow & James Breithaupt.

by Merkow, Mark S | Breithaupt, Jim, 1955-.

Publisher: New York : American Management Association, c2000Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 MER] (1).