Your search returned 342 results.

Not what you expected? Check for suggestions
|
VMware vSphere and virtual infrastructure security : securing the virtual environment / Edward L. Haletky.

by Haletky, Edward L.

Publisher: Upper Saddle River, NJ. : Prentice Hall, c2009Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 HAL 2009] (1).
Cryptography and network security : principles and practice / William Stallings.

by Stallings, William.

Edition: 5th ed.Publisher: Boston, MA : Prentice Hall, c2011Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 STA 2011] (2).
Host integrity monitoring [electronic resource] : using Osiris and Samhain / Brian Wotring ; Bruce Potter, technical editor ; for[e]word by Marcus J. Ranum.

by Wotring, Brian | Potter, Bruce | ebrary, Inc.

Publisher: Rockland, Mass. : Syngress Pub., c2005Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan: [Call number: 005.8] (1).
Programmer's ultimate security deskref [electronic resource] / James C. Foster, Stephen C. Foster.

by Foster, James | Foster, Stephen C | ebrary, Inc.

Publisher: Rockland, MA : Syngress Publishing, c2004Online access: An electronic book accessible through the World Wide Web; click to view Availability: No items available
Network interdiction and stochastic integer programming [electronic resource] / edited by David L. Woodruff.

by Woodruff, David L | ebrary, Inc.

Publisher: Boston : Kluwer Academic Publishers, 2003Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan: [Call number: 005.8] (1).
Implementing database security and auditing [electronic resource] / Roy [i.e. Ron] Ben Natan.

by Ben-Natan, Ron | ebrary, Inc.

Publisher: Boston : Digital Press, 2005Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan: [Call number: 005.8] (1).
Managing cybersecurity resources : a cost-benefit analysis / by Lawrence A. Gordon and Martin P. Loeb.

by Gordon, Lawrence A | Loeb, Martin P.

Publisher: New York : McGraw-Hill, c2006Availability: Items available for loan: Taylor's Library-TU [Call number: 658.478 GOR] (1).
Toward a safer and more secure cyberspace [electronic resource] / Committee on Improving Cybersecurity Research in the United States, Computer Science and Telecommunications Board, Division on Engineering and Physical Sciences, National Research Council of the National Academies ; Seymour E. Goodman and Herbert S. Lin, editors.

by Goodman, Seymour E | Lin, Herbert | ebrary, Inc | National Research Council (U.S.). Committee on Improving Cybersecurity Research in the United States.

Publisher: Washington, DC : National Academies Press, c2007Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan: [Call number: 005.8] (1).
Security data visualization [electronic resource] : graphical techniques for network analysis / Greg Conti.

by Conti, Greg | ebrary, Inc.

Publisher: San Francisco : No Starch Press, c2007Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan: [Call number: 005.8] (1).
Cyber adversary characterization [electronic resource] : auditing the hacker mind / Tom Parker ... [et al.] ; foreword by Jeff Moss.

by Parker, Tom | ebrary, Inc.

Publisher: Rockland, MA : Syngress, c2004Online access: An electronic book accessible through the World Wide Web; click to view Availability: No items available
Homeland security techniques and technologies [electronic resource] / Jesus Mena.

by Mena, Jesus | ebrary, Inc.

Publisher: Hingham, MA : Charles River Media, c2004Online access: An electronic book accessible through the World Wide Web; click to view Availability: No items available
Aggressive network self-defense [electronic resource] / Neil R. Wyler.

by Wyler, Neil R | ebrary, Inc.

Publisher: Rockland, MA : Syngress Publishing, c2005Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan: [Call number: 005.8] (1).
Buffer overflow attacks [electronic resource] : detect, exploit, prevent / James C. Foster, Vitaly Osipov, Nish Bhalla, Neils Heinen.

by Foster, James C | Bhalla, Nish | Heinen, Neils | Osipov, Vitaly | ebrary, Inc.

Publisher: Rockland, MA : Syngress Publishing, c2005Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan: [Call number: 005.8] (1).
Black hat physical device security [electronic resource] : exploiting hardware and software / Drew Miller.

by Miller, Drew | ebrary, Inc.

Publisher: Rockland, MA : Syngress Publishing, c2005Online access: An electronic book accessible through the World Wide Web; click to view Availability: No items available
The official CHFI exam 312-49 study guide [electronic resource] : for computer hacking forensics investigators.

by Kleiman, Dave | ebrary, Inc.

Publisher: Burlington, Mass. : Syngress Pub., c2007Other title: Exam 312-49 study guide.Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan: [Call number: 005.8] (1).
Summary of discussions at a planning meeting on cyber-security and the insider threat to classified information [electronic resource] / Computer Science and Telecommunications Board.

by National Research Council (U.S.). Computer Science and Telecommunications Board | ebrary, Inc.

Publisher: Washington, D.C. : National Academy Press, c2000Online access: An electronic book accessible through the World Wide Web; click to view Availability: No items available
Network security foundations [electronic resource] / Matthew Strebe.

by Strebe, Matthew | ebrary, Inc.

Publisher: San Francisco : Sybex, c2004Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan: [Call number: 005.8] (1).
Dr. Tom Shinder's configuring ISA Server 2004 [electronic resource] / Thomas W. Shinder, Debra Littlejohn Shinder ; technical editor, Martin Grasdal.

by Shinder, Thomas W | Shinder, Debra Littlejohn [aut] | Grasdal, Martin [edt] | ebrary, Inc.

Publisher: Rockland, Mass. : Syngress Publishing, c2005Other title: Configuring ISA Server 2004 | ISA Server 2004.Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan: [Call number: 005.8] (1).
Google Hacking for Penetration Testers [electronic resource] / Johnny Long.

by Long, Johnny | Cantrell, Christopher | Killion, Dave | Russell, Kevin | Tam, Kenneth | ebrary, Inc.

Publisher: Rockland, MA : Syngress Publishing, c2005Online access: An electronic book accessible through the World Wide Web; click to view Availability: No items available
Security and access control using biometric technologies / Robert Newman.

by Newman, Robert.

Publisher: Boston, MA : Course Technology/Cengage Learning, c2010Availability: Items available for loan: Taylor's Library-TU [Call number: 006.4 NEW 2010] (1).