Your search returned 342 results.

Not what you expected? Check for suggestions
|
Securing IM and P2P applications for the enterprise [electronic resource] / Paul L. Piccard ... [et al.] ; Marcus H. Sachs, technical editor.

by Piccard, Paul L [aut] | Sachs, Marcus H [edt] | ebrary, Inc.

Publisher: Rockland, Mass. : Syngress Publishing, c2006Other title: IM and P2P applications.Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan: [Call number: 005.8] (1).
Penetration tester's open source toolkit [electronic resource] / Johnny Long ... [et al.] ; foreword by Max Moser.

by Long, Johnny | ebrary, Inc.

Publisher: Rockland, MA : Syngress Pub., 2006Other title: Pentester's open source toolkit.Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan: [Call number: 005.8] (1).
Perfect passwords [electronic resource] : selection, protection, authentication / Mark Burnett ; Dave Kleiman, technical editor.

by Burnett, Mark | Kleiman, Dave | ebrary, Inc.

Publisher: Rockland, Mass. : Syngress, 2006Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan: [Call number: 005.8] (1).
Network security evaluation [electronic resource] : using the NSA IEM / Ed Fuller.

by Fuller, Ed | ebrary, Inc.

Publisher: Rockland, Mass. : Syngress Publishing, c2005Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan: [Call number: 005.8] (1).
Finding and fixing vulnerabilities in information systems [electronic resource] : the vulnerability assessment & mitigation methodology / Philip S. Anton ... [et al.] ; prepared for the Defense Advanced Research Projects Agency.

by Antón, Philip S | ebrary, Inc.

Publisher: Santa Monica, CA : Rand, 2003Other title: Vulnerability assessment & mitigation methodology | Vulnerability assessment and mitigation methodology.Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan: [Call number: 005.8] (1).
Computers at risk [electronic resource] : safe computing in the information age / System Security Study Committee, Computer Science and Telecommunications Board, Commission on Physical Sciences, Mathematics, and Applications, National Research Council.

by ebrary, Inc.

Publisher: Washington, D.C. : National Academy Press, 1991Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan: [Call number: 005.8] (1).
Putting the latest z/OS security features to work [electronic resource] / [Chris Rayns ... et al.].

by Rayns, Chris | International Business Machines Corporation. International Technical Support Organization | ebrary, Inc.

Edition: 1st ed.Publisher: [San Jose, Calif.?] : IBM International Technical Support Organization, 2002Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan: [Call number: 005.8] (1).
IBM rational application developer V6 portlet application development and portal tools [electronic resource] / Juan R. Rodriguez.

by Rodriguez, Juan R | Cesario, Cristiano | Galvan, Karla | Gonzalez, Belen | Kroner, George | Rutigliano, Gianfranco | Wilson, Ryan | International Business Machines Corporation. International Technical Support Organization | ebrary, Inc.

Publisher: San Jose, CA : IBM, International Technical Support Organization, 2005Online access: An electronic book accessible through the World Wide Web; click to view Availability: No items available
IBM eserver zSeries 990 (z990) cryptography implementation [electronic resource] / [Chris Rayns ... et al.].

by Rayns, Chris | International Business Machines Corporation. International Technical Support Organization | ebrary, Inc.

Edition: 1st ed.Publisher: Poughkeepsie, NY : IBM, International Technical Support Organization, 2004Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan: [Call number: 005.8] (1).
Linux on IBM e-server zSeries and S/390 [electronic resource] : best security practices / [Gregory Geiselhart ... et al.].

by Geiselhart, Gregory | International Business Machines Corporation. International Technical Support Organization | ebrary, Inc.

Edition: 1st ed.Publisher: Poughkeepsie, NY : IBM, International Technical Support Organization, c2004Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan: [Call number: 005.8] (1).
iSeries Access for Windows V5R2 hot topics [electronic resource] : tailored images, application administration, SSL, and Kerberos / [Jeremy Schulz, Jim Cook].

by Schulz, Jeremy | Cook, Jim, 1944- | International Business Machines Corporation. International Technical Support Organization | ebrary, Inc.

Edition: 1st ed.Publisher: [S.l.] : IBM, International Technical Support Organization, c2004Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan: [Call number: 005.4/46] (1).
zSeries crypto guide update [electronic resource] / [Chris Rayns ... et al.].

by Rayns, Chris | International Business Machines Corporation. International Technical Support Organization | ebrary, Inc.

Edition: 1st ed.Publisher: [S.l.] : IBM, International Technical Support Organization, 2003Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan: [Call number: 005.8/2] (1).
An introduction to security in a CSM 1.3 for AIX 5L environment [electronic resource] / [Octavian Lascu ... et al.].

by Lascu, Octavian | International Business Machines Corporation. International Technical Support Organization | ebrary, Inc.

Edition: 1st ed.Publisher: [S.l.] : IBM International Technical Support Organization, 2002Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan: [Call number: 005.8] (1).
Multilevel security and DB2 row-level security revealed [electronic resource] / [Chris Rayns ... et al.].

by Rayns, Chris | International Business Machines Corporation. International Technical Support Organization | ebrary, Inc.

Edition: 1st ed.Publisher: San Jose, CA : IBM, International Technical Support Organization, c2005Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan: [Call number: 005.8] (1).
Secure computer and network systems [electronic resource] : modeling, analysis and design / Nong Ye.

by Ye, Nong | ebrary, Inc.

Publisher: Chichester, England ; Hoboken, NJ : J. Wiley, c2008Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan: [Call number: 005.8] (1).
Cybersecurity today and tomorrow [electronic resource] : pay now or pay later / Computer Science and Telecommunications Board, Division of Engineering and Physical Sciences, National Research Council.

by ebrary, Inc.

Publisher: Washington, D.C. : National Academy Press, c2002Other title: Cyber security today and tomorrow.Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan: [Call number: 005.8] (1).
19 deadly sins of software security : programming flaws and how to fix them / Michael Howard, David LeBlanc and John Viega

by Howard, Michael, 1965- | LeBlanc, David, 1960- | Viega, John.

Publisher: Emeryville, California : McGraw-Hill/Osborne, c2005Other title: Nineteen deadly sins of software security..Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 HOW] (1).
Fuzzing for software security testing and quality assurance [electronic resource] / Ari Takanen, Jared DeMott, Charlie Miller.

by Takanen, Ari | Demott, Jared D | Miller, Charles, 1951- | ebrary, Inc.

Publisher: Boston : Artech House, c2008Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan: [Call number: 005.8] (1).
Innocent code [electronic resource] : a security wake-up call for Web programmers / Sverre H. Huseby.

by Huseby, Sverre H | ebrary, Inc.

Publisher: New York : John Wiley, c2004Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan: [Call number: 005.8] (1).