|
|
The security risk assessment handbook : a complete guide for performing security risk assessments / Douglas Landoll.
by Landoll, Douglas J. Edition: 2nd ed.Publisher: Boca Raton, FL : CRC Press, 2011Availability: Items available for loan: Taylor's Library-TU
[Call number: 658.47 LAN 2011]
(1).
|
|
|
Microsoft Forefront UAG 2010 administrator's handbook [electronic resource] : take full command of Microsoft Forefront Unified Access Gateway to secure your business applications and provide dynamic remote access with DirectAccess / Erez Ben-Ari, Ran Dolev.
by Ben-Ari, Erez | Dolev, Ran | ebrary, Inc. Publisher: Olton, Birmingham : Packt Pub. Ltd., 2011Online access: An electronic book accessible through the World Wide Web; click to view Availability: No items available
|
|
|
Cyber-physical-social systems and constructs in electric power engineering [electronic resource] / Suryanarayanan, Hansen, Roche (eds); suryanarayanan@gmail.com.
by Suryanarayanan, Siddharth | Roche, Robin | Hansen, Timothy M. Publisher: Stevenage : IET, 2016Online access: An electronic book accessible through the World Wide Web; click to view Availability: No items available
|
|
|
Oracle Identity and Access Manager 11g for administrators [electronic resource] : administer Oracle Identity and Access Management: installation, configuration, and day-to-day tasks / Atul Kumar.
by Kumar, Atul | ebrary, Inc. Publisher: Birmingham, U.K. : Packt Pub., 2011Online access: An electronic book accessible through the World Wide Web; click to view Availability: No items available
|
|
|
Spyware and adware [electronic resource] / by John Aycock.
by Aycock, John Daniel, 1970-. Publisher: New York : Springer Science+Business Media, LLC, 2011Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for reference: Taylor's Library-TU
[Call number: 005.8]
(1).
|
|
|
Security de-engineering : solving the problems in information risk management / Ian Tibble.
by Tibble, Ian. Publisher: Boca Raton, FL : CRC Press, c2012Availability: Items available for loan: Taylor's Library-TU
[Call number: 658.478 TIB 2012]
(1).
|
|
|
Computer forensics and cyber crime : an introduction / Marjie T. Britz.
by Britz, Marjie [author.]. Edition: Third Edition.Publisher: Boston : Pearson, [2013]Copyright date: ©2013Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 BRI 2013]
(1).
|
|
|
Cybersecurity : the essential body of knowledge / Dan Shoemaker, Wm. Arthur Conklin.
by Shoemaker, Dan | Conklin, Wm. Arthur (William Arthur). Publisher: Boston, MA : Course Technology, Cengage Learning, c2012Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 SHO 2012]
(1).
|
|
|
Management of information security / Michael Whitman, Herbert Mattord.
by Whitman, Michael E, 1964- | Mattord, Herbert J. Edition: 2nd ed.Publisher: Boston, MA : Course Technology, Cengage Learning, c2008Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 WHI 2008]
(1).
|
|
|
Security engineering : a guide to building dependable distributed systems / Ross J. Anderson.
by Anderson, Ross, 1956-. Edition: 2nd ed.Publisher: Indianapolis, IN : Wiley, c2008Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 AND 2008]
(5).
|
|
|
Cryptography and network security : principles and practice / William Stallings.
by Stallings, William. Edition: 7th ed.Publisher: Boston, MA : Pearson, c2014Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 STA 2014]
(2).
|
|
|
Security policies and implementation issues / Rob Johnson with Mike Merkow.
by Johnson, Rob (Robert) | Merkow, Mark S. Publisher: Burlington, MA : Jones & Bartlett Learning, c2011Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 JOH 2011]
(1).
|
|
|
Secure software design / Theodor Richardson, Charles N. Thies.
by Richardson, Theodor | Thies, Charles. Publisher: Burlington, MA : Jones & Bartlett Learning, c2013Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 RIC 2013]
(1).
|
|
|
Data-driven security : analysis, visualization and dashboards / Jay Jacobs + Bob Rudis.
by Jacobs, Jay (Data analyst) | Rudis, Bob. Edition: 1st edition.Publisher: Indianapolis, IN : John Wiley & Sons Inc., [2014]Copyright date: ©2014Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 JAC 2014]
(1).
|
|
|
Android hacker's handbook / Joshua J. Drake [and five others].
by Drake, Joshua J. Publisher: Indiana, IN : John Wiley & Sons, Inc., [2014]Copyright date: ©2014Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 DRA 2014]
(1).
|
|
|
Cyber attack : the truth about digital crime, cyber warfare and goverment snooping / Paul Day.
by Day, Paul (Computer security expert). Publisher: London : Carlton Books, 2014Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 DAY 2014]
(1).
|
|
|
The secure information society [electronic resource] : ethical, legal and political challenges / Jörg Krüger, Bertram Nickolay, Sandro Gaycken, editors.
by Krüger, Jörg | Nickolay, Bertram | Gaycken, Sandro, 1973-. Publisher: London ; New York : Springer, c2013Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for reference: Taylor's Library-TU
[Call number: 005.8]
(1).
|
|
|
Data security, data mining and data management : technologies and challenges / Serge O'Byrne, editor.
by O'Byrne, Serge [editor of compilation.]. Publisher: [Hauppauge] New York : Novinka, [2013]Copyright date: ©2013Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for reference: Taylor's Library-TU
[Call number: 005.8]
(1).
|
|
|
Intelligent systems for security informatics [electronic resource] / Christopher C. Yang ... [et al.].
by Yang, Christopher C. Publisher: Oxford ; Waltham, MA : Academic Press, c2013Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for reference: Taylor's Library-TU
[Call number: 005.8]
(1).
|
|
|
Theory and practice of cryptography solutions for secure information systems [electronic resource] / Atilla Elci, Josef Pieprzyk, Alexander G. Chefranov, Mehmet A. Orgun, Huaxiong Wang and Rajan Shankaran, editors.
by Elçi, Atilla [editor of compilation.]. Publisher: Hershey, PA : Information Science Reference, 2013Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for reference: Taylor's Library-TU
[Call number: 005.8]
(1).
|