Your search returned 342 results.

Not what you expected? Check for suggestions
|
Java security / Scott Oaks.

by Oaks Scott.

Publisher: Sebastopol , CA : O'Reilly , 1998Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 OAK] (1).
Hacking exposed : network security secrets and solutions / Stuart McClure, Joel Scrambray, George Kurtz

by McClure, Stuart | Kurtz, George [(j.a.).] | Scrambray, Joel [(j.a.).].

Publisher: Berkeley, Calif. : Osborne/McGrawHill , c1999Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 MCC] (1).
Cryptography and network security : principles and practice / William Stallings.

by Stallings, William [author.].

Edition: Seventh edition.Publisher: Hoboken, New Jersey : Pearson Education, Inc., [2017]Copyright date: ©2017Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 STA 2017] (1).
Network security essentials : applications and standards / William Stallings.

by Stallings, William [author.].

Edition: Sixth edition.Publisher: Hoboken, New Jersey : Pearson Education, Inc., [2017]Publisher: ©2017Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 STA 2017] (1).
Linux system security : an administrator's guide to open source security tools / Scott Mann and Ellen L. Mitchell

by Mann, Scott, 1958- | Mitchell, Ellen L [(j.a.)].

Publisher: Upper Saddle River, NJ : Prentice Hall PTR, c2000Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 MAN] (1).
Inside Java 2 platform security : architecture, API design, and implementation / Li Gong

by Gong, Li, 1963-.

Publisher: Reading, Mass. : Addison-Wesley, c1999Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 GON] (1).
Java network security / Robert MacGregor ... [et al.]

by MacGregor, Robert S.

Publisher: Upper Saddle River, N.J. : Prentice Hall PTR, c1998Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 JAV] (2).
Java 2 network security / Marco Pistoia ... [et al.]

by Pistoia, Marco.

Edition: 2nd ed.Publisher: Upper Saddle River, N.J. : Prentice Hall PTR, c1999Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 JAV] (1).
The complete guide to internet security / Mark S. Merkow & James Breithaupt.

by Merkow, Mark S | Breithaupt, Jim, 1955-.

Publisher: New York : American Management Association, c2000Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 MER] (1).
Hacking exposed : network security secrets & solutions / Joel Scambray, Stuart McClure, George Kurtz

by Scambray, Joel | Kurtz, George [(j.a.)] | McClure, Stuart [(j.a.)].

Edition: 2nd ed.Publisher: Berkeley, Calif. : Osborne/McGraw-Hill, c2001Availability: Items available for loan: TC External Storage [Call number: 005.8 SCA] (1).
Secure electronic commerce : building the infrastructure for digital signatures and encryption / Warwick Ford, Michael S. Baum

by Ford, Warwick | Baum, Michael S [(j.a.)].

Edition: 2nd ed.Publisher: Upper Saddle River, N.J. : Prentice Hall PTR, c2001Availability: Items available for loan: Taylor's Library-TU [Call number: 658.84 FOR] (7).
A process for developing a common vocabulary in the information security area [electronic resource] / edited by Jan von Knop, Alexey A. Salnikov, and Valeriy V. Yaschenko.

by NATO Advanced Research Workshop on a Process for Developing a Common Vocabulary in the Information Security Area (2006 : Moscow, Russia) | Knop, J. V. (Jan V.) | Salʹnikov, Alexey A | IAshchenko, V. V | ebrary, Inc.

Publisher: Amsterdam ; Washington, DC : IOS Press, c2007Online access: An electronic book accessible through the World Wide Web; click to view Availability: No items available
Security and policy driven computing / Lei Liu.

by Liu, Lei, 1968-.

Publisher: Boca Raton, FL : CRC Press, c2011Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 LIU 2011] (1).
Data mining and machine learning in cybersecurity / Sumeet Dua and Xian Du.

by Dua, Sumeet | Du, Xian, Ph.D.

Publisher: Boca Raton, FL : CRC Press, c2011Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 DUA 2011] (1).
Cyberspace and cybersecurity / George K. Kostopoulos.

by Kostopoulos, George K, 1939-.

Publisher: Boca Raton, FL : CRC Press, c2013Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 KOS 2013] (2).
Cybersecurity for industrial control systems : SCADA, DCS, PLC, HMI, and SIS / Tyson Macaulay and Bryan Singer.

by Macaulay, Tyson | Singer, Bryan.

Publisher: Boca Raton, FL : CRC Press, c2012Availability: Items available for loan: Taylor's Library-TU [Call number: 658.478 MAC 2012] (1).
Elliptic curves in cryptography / I.F. Blake, G. Seroussi, N.P. Smart.

by Blake, Ian F | Seroussi, G. (Gadiel), 1955- [(j.a)] | Smart, Nigel P. (Nigel Paul), 1967- [(j.a.)].

Publisher: Cambridge, U.K. : Cambridge University Press, 1999Availability: Items available for loan: Taylor's Library-TU [Call number: 005.82 BLA] (1).
Computers, ethics, and society / edited by M. David Ermann, Michele S. Shauf.

by Ermann, M. David [editor.] | Shauf, Michele S [author.].

Edition: Third edition.Publisher: New York : Oxford University Press, 2003Availability: Items available for loan: Taylor's Library-TU [Call number: 303.4834 COM 2003] (2).
Introduction to networks companion guide (CCNAv7) / Cisco Networking Academy.

by Cisco Networking Academy Program [issuing body.].

Publisher: [San Jose, CA] : Cisco Systems, Inc., [2020]Availability: No items available Checked out (1).
Introduction to modern cryptography / Jonathan Katz, Yehuda Lindell.

by Katz, Jonathan, 1974- [author.] | Lindell, Yehuda.

Edition: Third edition.Publisher: Boca Raton : CRC Press, Taylor & Francis Group, 2021Copyright date: ©2021Availability: Items available for loan: Taylor's Library-TU [Call number: 005.82 KAT 2021] (1).