|
|
Java security / Scott Oaks.
by Oaks Scott. Publisher: Sebastopol , CA : O'Reilly , 1998Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 OAK]
(1).
|
|
|
Hacking exposed : network security secrets and solutions / Stuart McClure, Joel Scrambray, George Kurtz
by McClure, Stuart | Kurtz, George [(j.a.).] | Scrambray, Joel [(j.a.).]. Publisher: Berkeley, Calif. : Osborne/McGrawHill , c1999Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 MCC]
(1).
|
|
|
Cryptography and network security : principles and practice / William Stallings.
by Stallings, William [author.]. Edition: Seventh edition.Publisher: Hoboken, New Jersey : Pearson Education, Inc., [2017]Copyright date: ©2017Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 STA 2017]
(1).
|
|
|
Network security essentials : applications and standards / William Stallings.
by Stallings, William [author.]. Edition: Sixth edition.Publisher: Hoboken, New Jersey : Pearson Education, Inc., [2017]Publisher: ©2017Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 STA 2017]
(1).
|
|
|
Linux system security : an administrator's guide to open source security tools / Scott Mann and Ellen L. Mitchell
by Mann, Scott, 1958- | Mitchell, Ellen L [(j.a.)]. Publisher: Upper Saddle River, NJ : Prentice Hall PTR, c2000Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 MAN]
(1).
|
|
|
Inside Java 2 platform security : architecture, API design, and implementation / Li Gong
by Gong, Li, 1963-. Publisher: Reading, Mass. : Addison-Wesley, c1999Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 GON]
(1).
|
|
|
Java network security / Robert MacGregor ... [et al.]
by MacGregor, Robert S. Publisher: Upper Saddle River, N.J. : Prentice Hall PTR, c1998Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 JAV]
(2).
|
|
|
Java 2 network security / Marco Pistoia ... [et al.]
by Pistoia, Marco. Edition: 2nd ed.Publisher: Upper Saddle River, N.J. : Prentice Hall PTR, c1999Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 JAV]
(1).
|
|
|
The complete guide to internet security / Mark S. Merkow & James Breithaupt.
by Merkow, Mark S | Breithaupt, Jim, 1955-. Publisher: New York : American Management Association, c2000Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 MER]
(1).
|
|
|
Hacking exposed : network security secrets & solutions / Joel Scambray, Stuart McClure, George Kurtz
by Scambray, Joel | Kurtz, George [(j.a.)] | McClure, Stuart [(j.a.)]. Edition: 2nd ed.Publisher: Berkeley, Calif. : Osborne/McGraw-Hill, c2001Availability: Items available for loan: TC External Storage
[Call number: 005.8 SCA]
(1).
|
|
|
Secure electronic commerce : building the infrastructure for digital signatures and encryption / Warwick Ford, Michael S. Baum
by Ford, Warwick | Baum, Michael S [(j.a.)]. Edition: 2nd ed.Publisher: Upper Saddle River, N.J. : Prentice Hall PTR, c2001Availability: Items available for loan: Taylor's Library-TU
[Call number: 658.84 FOR]
(7).
|
|
|
A process for developing a common vocabulary in the information security area [electronic resource] / edited by Jan von Knop, Alexey A. Salnikov, and Valeriy V. Yaschenko.
by NATO Advanced Research Workshop on a Process for Developing a Common Vocabulary in the Information Security Area (2006 : Moscow, Russia) | Knop, J. V. (Jan V.) | Salʹnikov, Alexey A | IAshchenko, V. V | ebrary, Inc. Publisher: Amsterdam ; Washington, DC : IOS Press, c2007Online access: An electronic book accessible through the World Wide Web; click to view Availability: No items available
|
|
|
Security and policy driven computing / Lei Liu.
by Liu, Lei, 1968-. Publisher: Boca Raton, FL : CRC Press, c2011Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 LIU 2011]
(1).
|
|
|
Data mining and machine learning in cybersecurity / Sumeet Dua and Xian Du.
by Dua, Sumeet | Du, Xian, Ph.D. Publisher: Boca Raton, FL : CRC Press, c2011Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 DUA 2011]
(1).
|
|
|
Cyberspace and cybersecurity / George K. Kostopoulos.
by Kostopoulos, George K, 1939-. Publisher: Boca Raton, FL : CRC Press, c2013Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 KOS 2013]
(2).
|
|
|
Cybersecurity for industrial control systems : SCADA, DCS, PLC, HMI, and SIS / Tyson Macaulay and Bryan Singer.
by Macaulay, Tyson | Singer, Bryan. Publisher: Boca Raton, FL : CRC Press, c2012Availability: Items available for loan: Taylor's Library-TU
[Call number: 658.478 MAC 2012]
(1).
|
|
|
Elliptic curves in cryptography / I.F. Blake, G. Seroussi, N.P. Smart.
by Blake, Ian F | Seroussi, G. (Gadiel), 1955- [(j.a)] | Smart, Nigel P. (Nigel Paul), 1967- [(j.a.)]. Publisher: Cambridge, U.K. : Cambridge University Press, 1999Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.82 BLA]
(1).
|
|
|
Computers, ethics, and society / edited by M. David Ermann, Michele S. Shauf.
by Ermann, M. David [editor.] | Shauf, Michele S [author.]. Edition: Third edition.Publisher: New York : Oxford University Press, 2003Availability: Items available for loan: Taylor's Library-TU
[Call number: 303.4834 COM 2003]
(2).
|
|
|
Introduction to networks companion guide (CCNAv7) / Cisco Networking Academy.
by Cisco Networking Academy Program [issuing body.]. Publisher: [San Jose, CA] : Cisco Systems, Inc., [2020]Availability: No items available Checked out (1).
|
|
|
Introduction to modern cryptography / Jonathan Katz, Yehuda Lindell.
by Katz, Jonathan, 1974- [author.] | Lindell, Yehuda. Edition: Third edition.Publisher: Boca Raton : CRC Press, Taylor & Francis Group, 2021Copyright date: ©2021Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.82 KAT 2021]
(1).
|