Your search returned 342 results.

Not what you expected? Check for suggestions
|
Cyber spying [electronic resource] : tracking your family's (sometimes) secret online lives / Ted Fair, Michael Nordfelt, Sandra Ring, Eric Cole, technical editor.

by Fair, Ted | Cole, Eric | Nordfelt, Michael | Ring, Sandra | ebrary, Inc.

Publisher: Rockland, MA : Syngress Publishing, c2005Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan: [Call number: 004.678] (1).
Smarter energy [electronic resource] : from smart metering to the smart grid / Hongjian Sun, Hongjian.sun@durham.ac.uk; Nikolaos Hatziargyriou, nh@power.ece.ntua.gr; H. Vincent Poor, poor@princeton.edu; Industry editor (to be confirmed) (Eds).

by Sun, Hongjian | Hatziargyriou, Nikos D | Poor, H. Vincent | Carpanini, Laurence | Sǹchez Forni,̌ Miguel Angel.

Publisher: Stevenage : IET, 2016Online access: An electronic book accessible through the World Wide Web; click to view Availability: No items available
Security awareness : applying practical security in your world / Mark Ciampa.

by Ciampa, Mark D.

Edition: 2nd ed.Publisher: Boston, Mass. : Thomson/Course Technology, 2007Availability: Items available for loan: Taylor's Library-TU [Call number: 658.478 CIA] (1).
Engineering secure internet of things systems [electronic resource] / Benjamin Aziz; benjamin.aziz@port.ac.uk Alvaro Arenas; alvaro.arenas@ie.edu Bruno Crispo; crispo@disi.unitn.it.

by Aziz, Benjamin | Arenas, Alvaro | Crispo, Bruno.

Publisher: Stevenage : IET, 2016Online access: An electronic book accessible through the World Wide Web; click to view Availability: No items available
Moving target defense II : application of game theory and adversarial modeling / Sushil Jajodia ... [et al.], editors.

by Jajodia, Sushil.

Publisher: New York : Springer, c2013Other title: Moving target defense two.Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 MOV 2013] (1).
Hack proofing Linux: a guide to open source security [electronic resource] : the only way to stop a hacker is to think like one / James Stanger, Patrick T. Lane.

by Stanger, James | Lane, Patrick T | ebrary, Inc.

Publisher: Rockland, Mass. : London : Syngress Media ; International Thomson, c2001Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan: [Call number: 005.8] (1).
Configuring ISA server 2000 [electronic resource] : building firewalls for windows 2000 / [Thomas W. Shinder, Debra Littlejohn Shinder ; Martin Grasdal, technical editor].

by Shinder, Thomas W | Shinder, Debra Littlejohn | Grasdal, Martin | ebrary, Inc.

Publisher: Rockland, Mass. ; [Great Britain] : Syngress, c2001Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan: [Call number: 005.8] (1).
Hack proofing ColdFusion [electronic resource] / Greg Meyer ... [et al.].

by Meyer, Greg [aut] | ebrary, Inc.

Publisher: Rockland, Mass. : Syngress Publishing, Inc., c2002Other title: Hackproofing ColdFusion.Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan: [Call number: 005.75/8] (1).
Hack proofing Sun Solaris 8 [electronic resource] / Thomas Vincent.

by Vincent, Thomas | ebrary, Inc.

Publisher: Rockland, Mass. : London : Syngress Media ; International Thomson, 2001Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan: [Call number: 005.8] (1).
Hack proofing XML [electronic resource] / Neal O'Farrell.

by O'Farrell, Neal | ebrary, Inc.

Publisher: Rockland, Mass. : Syngress Media, 2002Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan: [Call number: 005.8] (1).
Hack proofing your Web applications [electronic resource] : the only way to stop a hacker is to think like one / [Jeff Forristal [ ... [et al.]] ; Julie Traxler, technical editor].

by Forristal, Jeff | ebrary, Inc.

Publisher: Rockland, Mass. : London : Syngress Media ; International Thomson, c2001Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan: [Call number: 005.8] (1).
Practical embedded security [electronic resource] : building secure resource-constrained systems / by Timothy Stapko.

by Stapko, Timothy John | ebrary, Inc.

Publisher: Amsterdam ; Boston : Elsevier/Newnes, c2008Online access: An electronic book accessible through the World Wide Web; click to view Availability: No items available
Rfid protocol design, optimization, and security for the internet of things [electronic resource] / Prof. Alex X. Liu (alexliu@cse.msu.edu).

by Liu, Alex X | Shahzad, Muhammad | Liu, Xiulong | Li, Keqiu.

Publisher: Stevenage : IET, 2017Online access: An electronic book accessible through the World Wide Web; click to view Availability: No items available
Hack proofing your e-commerce site [electronic resource] : the only way to stop a hacker is to think like one / [Ryan Russell ... [et al.]].

by Russell, Ryan, 1969- | ebrary, Inc.

Publisher: Rockland, Mass. ; [Great Britain] : Syngress, c2001Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan: [Call number: 005.8] (1).
Hack proofing Windows 2000 [electronic resource] / Chad Todd ; Norris L. Johnson, technical editor.

by Todd, Chad | ebrary, Inc.

Publisher: Rockland, Mass. : [London : Syngress ; International Thomson [distributor]], c2001Other title: Hack proofing Windows 2000 server.Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan: [Call number: 005.8] (1).
Check Point NG [electronic resource] : next generation security administration / Drew Simonis ... [et al.].

by Simonis, Drew | ebrary, Inc.

Publisher: Rockland, Mass. : Syngress Publishing, Inc., c2002Other title: Check Point Next Generation | CheckPoint NG.Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan: [Call number: 005.8] (1).
Data security in cloud computing [electronic resource] / Dr. Vimal Kumar (vkumar@waikato.ac.nz)*; Dr. Ryan Ko (ryan@waikato.ac.nz); Dr. Sivadon Chaisiri (chaisiri@waikato.ac.nz) [Eds].

by Kumar, Vimal | Chaisiri, Sivadon | Ko, Ryan.

Publisher: Stevenage : IET, 2017Online access: An electronic book accessible through the World Wide Web; click to view Availability: No items available
Professional ASP.NET 3.5 security, membership, and role management with C# and VB / Bilal Haidar, Stefan Schackow.

by Haidar, Bilal | Schackow, Stefan, 1970-.

Publisher: Indianapolis, IN : Wiley Pub., 2008Availability: Items available for loan: Taylor's Library-TU [Call number: 005.276 HAI] (1).