|
|
VMware vSphere and virtual infrastructure security : securing the virtual environment / Edward L. Haletky.
by Haletky, Edward L. Publisher: Upper Saddle River, NJ. : Prentice Hall, c2009Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 HAL 2009]
(1).
|
|
|
Cryptography and network security : principles and practice / William Stallings.
by Stallings, William. Edition: 5th ed.Publisher: Boston, MA : Prentice Hall, c2011Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 STA 2011]
(2).
|
|
|
Host integrity monitoring [electronic resource] : using Osiris and Samhain / Brian Wotring ; Bruce Potter, technical editor ; for[e]word by Marcus J. Ranum.
by Wotring, Brian | Potter, Bruce | ebrary, Inc. Publisher: Rockland, Mass. : Syngress Pub., c2005Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan:
[Call number: 005.8]
(1).
|
|
|
Programmer's ultimate security deskref [electronic resource] / James C. Foster, Stephen C. Foster.
by Foster, James | Foster, Stephen C | ebrary, Inc. Publisher: Rockland, MA : Syngress Publishing, c2004Online access: An electronic book accessible through the World Wide Web; click to view Availability: No items available
|
|
|
Network interdiction and stochastic integer programming [electronic resource] / edited by David L. Woodruff.
by Woodruff, David L | ebrary, Inc. Publisher: Boston : Kluwer Academic Publishers, 2003Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan:
[Call number: 005.8]
(1).
|
|
|
Implementing database security and auditing [electronic resource] / Roy [i.e. Ron] Ben Natan.
by Ben-Natan, Ron | ebrary, Inc. Publisher: Boston : Digital Press, 2005Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan:
[Call number: 005.8]
(1).
|
|
|
Managing cybersecurity resources : a cost-benefit analysis / by Lawrence A. Gordon and Martin P. Loeb.
by Gordon, Lawrence A | Loeb, Martin P. Publisher: New York : McGraw-Hill, c2006Availability: Items available for loan: Taylor's Library-TU
[Call number: 658.478 GOR]
(1).
|
|
|
Toward a safer and more secure cyberspace [electronic resource] / Committee on Improving Cybersecurity Research in the United States, Computer Science and Telecommunications Board, Division on Engineering and Physical Sciences, National Research Council of the National Academies ; Seymour E. Goodman and Herbert S. Lin, editors.
by Goodman, Seymour E | Lin, Herbert | ebrary, Inc | National Research Council (U.S.). Committee on Improving Cybersecurity Research in the United States. Publisher: Washington, DC : National Academies Press, c2007Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan:
[Call number: 005.8]
(1).
|
|
|
Security data visualization [electronic resource] : graphical techniques for network analysis / Greg Conti.
by Conti, Greg | ebrary, Inc. Publisher: San Francisco : No Starch Press, c2007Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan:
[Call number: 005.8]
(1).
|
|
|
Cyber adversary characterization [electronic resource] : auditing the hacker mind / Tom Parker ... [et al.] ; foreword by Jeff Moss.
by Parker, Tom | ebrary, Inc. Publisher: Rockland, MA : Syngress, c2004Online access: An electronic book accessible through the World Wide Web; click to view Availability: No items available
|
|
|
Homeland security techniques and technologies [electronic resource] / Jesus Mena.
by Mena, Jesus | ebrary, Inc. Publisher: Hingham, MA : Charles River Media, c2004Online access: An electronic book accessible through the World Wide Web; click to view Availability: No items available
|
|
|
Aggressive network self-defense [electronic resource] / Neil R. Wyler.
by Wyler, Neil R | ebrary, Inc. Publisher: Rockland, MA : Syngress Publishing, c2005Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan:
[Call number: 005.8]
(1).
|
|
|
Buffer overflow attacks [electronic resource] : detect, exploit, prevent / James C. Foster, Vitaly Osipov, Nish Bhalla, Neils Heinen.
by Foster, James C | Bhalla, Nish | Heinen, Neils | Osipov, Vitaly | ebrary, Inc. Publisher: Rockland, MA : Syngress Publishing, c2005Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan:
[Call number: 005.8]
(1).
|
|
|
Black hat physical device security [electronic resource] : exploiting hardware and software / Drew Miller.
by Miller, Drew | ebrary, Inc. Publisher: Rockland, MA : Syngress Publishing, c2005Online access: An electronic book accessible through the World Wide Web; click to view Availability: No items available
|
|
|
The official CHFI exam 312-49 study guide [electronic resource] : for computer hacking forensics investigators.
by Kleiman, Dave | ebrary, Inc. Publisher: Burlington, Mass. : Syngress Pub., c2007Other title: Exam 312-49 study guide.Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan:
[Call number: 005.8]
(1).
|
|
|
Summary of discussions at a planning meeting on cyber-security and the insider threat to classified information [electronic resource] / Computer Science and Telecommunications Board.
by National Research Council (U.S.). Computer Science and Telecommunications Board | ebrary, Inc. Publisher: Washington, D.C. : National Academy Press, c2000Online access: An electronic book accessible through the World Wide Web; click to view Availability: No items available
|
|
|
Network security foundations [electronic resource] / Matthew Strebe.
by Strebe, Matthew | ebrary, Inc. Publisher: San Francisco : Sybex, c2004Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan:
[Call number: 005.8]
(1).
|
|
|
Dr. Tom Shinder's configuring ISA Server 2004 [electronic resource] / Thomas W. Shinder, Debra Littlejohn Shinder ; technical editor, Martin Grasdal.
by Shinder, Thomas W | Shinder, Debra Littlejohn [aut] | Grasdal, Martin [edt] | ebrary, Inc. Publisher: Rockland, Mass. : Syngress Publishing, c2005Other title: Configuring ISA Server 2004 | ISA Server 2004.Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan:
[Call number: 005.8]
(1).
|
|
|
Google Hacking for Penetration Testers [electronic resource] / Johnny Long.
by Long, Johnny | Cantrell, Christopher | Killion, Dave | Russell, Kevin | Tam, Kenneth | ebrary, Inc. Publisher: Rockland, MA : Syngress Publishing, c2005Online access: An electronic book accessible through the World Wide Web; click to view Availability: No items available
|
|
|
Security and access control using biometric technologies / Robert Newman.
by Newman, Robert. Publisher: Boston, MA : Course Technology/Cengage Learning, c2010Availability: Items available for loan: Taylor's Library-TU
[Call number: 006.4 NEW 2010]
(1).
|