Your search returned 342 results.

Not what you expected? Check for suggestions
|
Hacking exposed 6 : network security secrets & solutions / Stuart McClure, Joel Scambray, George Kurtz.

by McClure, Stuart | Scambray, Joel | Kurtz, George.

Edition: 10th anniversary ed.Publisher: New York : McGraw-Hill, c2009Other title: Hacking exposed six | Hacking 6 exposed.Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 MAC] (1).
Mobile biometrics [electronic resource] / Guodong Guo (Guodong.guo@mail.wvu.edu)*; Harry Wechsler (wechsler@cs.gmu.edu) (Eds).

by Guodong Guo | Wechsler, Harry.

Publisher: Stevenage : IET, 2017Online access: An electronic book accessible through the World Wide Web; click to view Availability: No items available
User-centric privacy and security in biometrics [electronic resource] / Claus Viuelhauer; claus.vielhauer@fh-brandenburg.de (Ed).

by Vielhauer, Claus.

Publisher: Stevenage : IET, 2017Online access: An electronic book accessible through the World Wide Web; click to view Availability: No items available
Federated identity management and web services security with IBM tivoli security solutions [electronic resource] / Axel Buecker et al.

by Bucker, Axel | Filip, Werner | Hinton, Heather | Hippensteil, Heinz Peter | Hollin, Mark | Neucom, Ray | Weeden, Shane | Westman, Johan | International Business Machines Corporation. International Technical Support Organization | ebrary, Inc.

Publisher: San Jose, CA : IBM, International Technical Support Organization, 2005Online access: An electronic book accessible through the World Wide Web; click to view Availability: No items available
Information [electronic resource] : getting, protecting and using data.

by ebrary, Inc.

Publisher: Boston, Mass. : Technology Research News, 2003Online access: An electronic book accessible through the World Wide Web; click to view Availability: No items available
Developing secure distributed systems with CORBA [electronic resource] / Ulrich Lang, Rudolf Schreiner.

by Lang, Ulrich | Schreiner, Rudolf | ebrary, Inc.

Publisher: Boston : Artech House, c2002Online access: An electronic book accessible through the World Wide Web; click to view Availability: No items available
Code hacking [electronic resource] : a developer's guide to network security / Richard Conway and Julian Cordingley.

by Conway, Richard, 1974- | Cordingley, Julian, 1966- | ebrary, Inc.

Publisher: Hingham, Mass. : Charles River Media, 2004Online access: An electronic book accessible through the World Wide Web; click to view Availability: No items available
Network security bible / by Eric Cole, Ronald Krutz, James W. Conley.

by Cole, Eric | Krutz, Ronald L, 1938- | Conley, James W.

Edition: 2nd ed.Publisher: Indianapolis, IN : Wiley Pub., c2009Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 COL 2009] (1).
Principles of information security / Michael E. Whitman and Herbert J. Mattord

by Whitman, Michael E, 1964- | Mattord, Herbert J.

Edition: 3rd ed.Publisher: Boston, Mass. : Course Technology Cengage Learning, c2009Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 WHI 2009] (1).
Security awareness : applying practical security in your world / Mark Ciampa.

by Ciampa, Mark.

Edition: 3rd ed.Publisher: Boston, MA : Course Technology, Cengage Learning, c2010Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 CIA 2010] (1).
Information security : theory and practice / Dhiren R. Patel.

by Patel, Dhiren R.

Publisher: New Delhi : Prentice-Hall of India Private Limited, c2008Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 INF 2008] (1).
Hacking exposed computer forensics / Aaron Philipp, David Cowen, Chris Davis.

by Philipp, Aaron | Cowen, David | Davis, Chris (Christopher Michael).

Edition: 2nd ed.Publisher: New York : McGraw-Hill, c2010Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 PHI 2010] (2).
Hacking exposed Linux : Linux security secrets & solutions / ISECOM.

by ISECOM (Organization).

Edition: 3rd ed.Publisher: New York : McGraw-Hill, c2008Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 HAC 2008] (1).
Principles of computer security : CompTIA security+ and beyond / Wm. Arthur Conklin ... [et al.].

by Conklin, Wm. Arthur (William Arthur).

Edition: 2nd ed.Publisher: New York : McGraw-Hill, c2010Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 PRI 2010] (4).
Risk analysis and security countermeasure selection / Thomas L. Norman.

by Norman, Thomas L.

Publisher: Boca Raton, FL : CRC Press, 2010Availability: Items available for loan: Taylor's Library-TU [Call number: 658.47 NOR 2010] (1).
Distributed systems security : issues, processes and solutions / by Abhijit Belapurkar ... [et al.].

by Belapurkar, Abhijit.

Publisher: Hoboken, NJ : John Wiley, c2009Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 DIS 2009] (1).
Information assurance [electronic resource] : dependability and security in networked systems / [edited by] Yi Qian ... [et al.].

by Qian, Yi, 1962- | ebrary, Inc.

Publisher: Amsterdam ; Boston : Elsevier/Morgan Kaufmann, c2008Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan: [Call number: 005.8] (1).
Risk management for computer security [electronic resource] : Protecting your network and information assets / by Andy Jones & Debi Ashenden.

by Jones, Andy, 1952- | Ashenden, Debi | ebrary, Inc.

Publisher: Amsterdam, Netherlands ; Boston : Elsevier Butterworth-Heinemann, c2005Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan: [Call number: 658.4/78] (1).