Your search returned 342 results.

Not what you expected? Check for suggestions
|
Developer's guide to web application security [electronic resource] / Michael Cross.

by Cross, Michael | ebrary, Inc.

Publisher: Rockland, MA : Syngress Publishing, c2007Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan: [Call number: 005.8] (1).
Cyberpsychology : an introduction to human-computer interaction / Kent L. Norman, University of Maryland.

by Norman, Kent L [author.].

Edition: Second edition.Publisher: Cambridge : Cambridge University Press, 2017Availability: Items available for loan: Taylor's Library-TU [Call number: 004.019 NOR 2017] (2).
Cybersecurity law : protect yourself and your customers.

by Brathwaite, Shimon.

Publisher: New York : Business Expert Press, 2019Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for reference: Taylor's Library-TU [Call number: 342.0858] (1).
Best damn firewall book period [electronic resource] / T.W. Shinder ... [et al.].

by Shinder, Thomas W | ebrary, Inc.

Edition: 2nd ed.Publisher: Burlington, Mass. : Syngress, c2007Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan: [Call number: 005.8] (1).
Multimedia security technologies for digital rights management [electronic resource] / edited by Wenjun Zeng, Heather Yu, Ching-Yung Lin.

by Zeng, Wenjun, 1967- | Yu, Hong Heather, 1967- | Lin, Ching-Yung | ebrary, Inc.

Publisher: Amsterdam ; Boston : Academic Press, c2006Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan: [Call number: 005.8] (1).
Cybersecurity : background, risk management and federal policies / Christian Sievier, editor.

by Sievier, Christian [editor.] | ProQuest (Firm).

Publisher: New York : Nova Science, [2019]Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for reference: Taylor's Library-TU [Call number: 005.8] (1).
The business of cybersecurity : foundations and ideologies / Ashwini Sathnur.

by Sathnur, Ashwini.

Publisher: New York, NY : Business Expert Press, 2019Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for reference: Taylor's Library-TU [Call number: 005.8] (1).
Technology and privacy : the new landscape [electronic resource] / edited by Philip E. Agre and Marc Rotenberg.

by Agre, Philip | Rotenberg, Marc | ebrary, Inc.

Publisher: Cambridge, Mass. : MIT Press, c1997Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan: [Call number: 323.44/83] (1).
Silence on the wire [electronic resource] : a field guide to passive reconnaissance and indirect attacks / Michal Zalewski.

by Zalewski, Michal | ebrary, Inc.

Publisher: San Francisco : No Starch Press, c2005Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan: [Call number: 005.8] (1).
Sockets, shellcode, porting & coding [electronic resource] : reverse engineering exploits and tool coding for security professionals / James C. Foster with Mike Price.

by Foster, James C | Price, Mike [aut] | ebrary, Inc.

Publisher: Rockland, Mass. : Syngress Publishing, c2005Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan: [Call number: 005.8] (1).
Contemporary cryptography [electronic resource] / Rolf Oppliger.

by Oppliger, Rolf | ebrary, Inc.

Publisher: Boston : Artech House, c2005Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan: [Call number: 652/.8] (1).
24 deadly sins of software security : programming flaws and how to fix them / Michael Howard, David LeBlanc, and John Viega.

by Howard, Michael, 1965- | LeBlanc, David, 1960- | Viega, John.

Publisher: New York, NY : McGraw-Hill, c2010Other title: Twenty four deadly sins of software security.Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 HOW 2010] (1).
SSCP [electronic resource] : study guide and & DVD training system / Josh Jacobs, Lee Clemmer, Michael Dalton, Russ Rogers, Jeffrey Posluns.

by Jacobs, Josh | ebrary, Inc.

Publisher: Rockland, Mass. : Syngress Publishing, 2003Online access: An electronic book accessible through the World Wide Web; click to view Availability: No items available
Security and control in information systems [electronic resource] : a guide for business and accounting / Andrew Hawker.

by Hawker, Andrew | ebrary, Inc.

Publisher: London : Routledge, 2000Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan: [Call number: 005.8] (1).
BigNum math [electronic resource] : implementing cryptographic multiple precision arithmetic / Tom St. Denis, Greg Rose.

by St. Denis, Tom | Rose, Greg | ebrary, Inc.

Publisher: Rockland, MA : Syngress Publishing, c2006Online access: An electronic book accessible through the World Wide Web; click to view Availability: No items available
Enemy at the water cooler [electronic resource] : real-life stories of insider threats and Enterprise Security Management countermeasures / Brian T. Contos.

by Contos, Brian T | ebrary, Inc.

Publisher: Rockland, MA : Syngress, c2006Online access: An electronic book accessible through the World Wide Web; click to view Availability: No items available
Crackproof your software [electronic resource] : the best ways to protect your software against crackers / Pavol C̆ervĕn.

by Cerven, Pavol | ebrary, Inc.

Publisher: San Francisco : No Starch Press, c2002Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan: [Call number: 005.8] (1).
Snort 2.0 intrusion detection [electronic resource] / Jay Beale, James C. Foster.

by Beale, Jay | Foster, James C | ebrary, Inc.

Publisher: Rockland : Oxford : Syngress ; Elsevier Science, c2003Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan: [Call number: 005.8] (1).
Hacking exposed malware & rootkits : malware & rootkits security secrets & solutions / Michael Davis, Sean Bodmer, Aaron Lemasters.

by Davis, Michael A | Bodmer, Sean | LeMasters, Aaron.

Publisher: New York : McGraw Hill, c2010Other title: Hacking exposed malware and rootkits.Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 DAV 2010] (1).
Handbook of information and communication security / Peter Stavroulakis, Mark Stamp, editors.

by Stavroulakis, Peter | Stamp, Mark.

Publisher: Berlin : Springer, 2010Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 HAN 2010] (1).