|
|
Developer's guide to web application security [electronic resource] / Michael Cross.
by Cross, Michael | ebrary, Inc. Publisher: Rockland, MA : Syngress Publishing, c2007Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan:
[Call number: 005.8]
(1).
|
|
|
Cyberpsychology : an introduction to human-computer interaction / Kent L. Norman, University of Maryland.
by Norman, Kent L [author.]. Edition: Second edition.Publisher: Cambridge : Cambridge University Press, 2017Availability: Items available for loan: Taylor's Library-TU
[Call number: 004.019 NOR 2017]
(2).
|
|
|
Cybersecurity law : protect yourself and your customers.
by Brathwaite, Shimon. Publisher: New York : Business Expert Press, 2019Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for reference: Taylor's Library-TU
[Call number: 342.0858]
(1).
|
|
|
Best damn firewall book period [electronic resource] / T.W. Shinder ... [et al.].
by Shinder, Thomas W | ebrary, Inc. Edition: 2nd ed.Publisher: Burlington, Mass. : Syngress, c2007Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan:
[Call number: 005.8]
(1).
|
|
|
Multimedia security technologies for digital rights management [electronic resource] / edited by Wenjun Zeng, Heather Yu, Ching-Yung Lin.
by Zeng, Wenjun, 1967- | Yu, Hong Heather, 1967- | Lin, Ching-Yung | ebrary, Inc. Publisher: Amsterdam ; Boston : Academic Press, c2006Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan:
[Call number: 005.8]
(1).
|
|
|
Cybersecurity : background, risk management and federal policies / Christian Sievier, editor.
by Sievier, Christian [editor.] | ProQuest (Firm). Publisher: New York : Nova Science, [2019]Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for reference: Taylor's Library-TU
[Call number: 005.8]
(1).
|
|
|
The business of cybersecurity : foundations and ideologies / Ashwini Sathnur.
by Sathnur, Ashwini. Publisher: New York, NY : Business Expert Press, 2019Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for reference: Taylor's Library-TU
[Call number: 005.8]
(1).
|
|
|
Technology and privacy : the new landscape [electronic resource] / edited by Philip E. Agre and Marc Rotenberg.
by Agre, Philip | Rotenberg, Marc | ebrary, Inc. Publisher: Cambridge, Mass. : MIT Press, c1997Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan:
[Call number: 323.44/83]
(1).
|
|
|
Silence on the wire [electronic resource] : a field guide to passive reconnaissance and indirect attacks / Michal Zalewski.
by Zalewski, Michal | ebrary, Inc. Publisher: San Francisco : No Starch Press, c2005Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan:
[Call number: 005.8]
(1).
|
|
|
Sockets, shellcode, porting & coding [electronic resource] : reverse engineering exploits and tool coding for security professionals / James C. Foster with Mike Price.
by Foster, James C | Price, Mike [aut] | ebrary, Inc. Publisher: Rockland, Mass. : Syngress Publishing, c2005Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan:
[Call number: 005.8]
(1).
|
|
|
Contemporary cryptography [electronic resource] / Rolf Oppliger.
by Oppliger, Rolf | ebrary, Inc. Publisher: Boston : Artech House, c2005Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan:
[Call number: 652/.8]
(1).
|
|
|
24 deadly sins of software security : programming flaws and how to fix them / Michael Howard, David LeBlanc, and John Viega.
by Howard, Michael, 1965- | LeBlanc, David, 1960- | Viega, John. Publisher: New York, NY : McGraw-Hill, c2010Other title: Twenty four deadly sins of software security.Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 HOW 2010]
(1).
|
|
|
SSCP [electronic resource] : study guide and & DVD training system / Josh Jacobs, Lee Clemmer, Michael Dalton, Russ Rogers, Jeffrey Posluns.
by Jacobs, Josh | ebrary, Inc. Publisher: Rockland, Mass. : Syngress Publishing, 2003Online access: An electronic book accessible through the World Wide Web; click to view Availability: No items available
|
|
|
Security and control in information systems [electronic resource] : a guide for business and accounting / Andrew Hawker.
by Hawker, Andrew | ebrary, Inc. Publisher: London : Routledge, 2000Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan:
[Call number: 005.8]
(1).
|
|
|
BigNum math [electronic resource] : implementing cryptographic multiple precision arithmetic / Tom St. Denis, Greg Rose.
by St. Denis, Tom | Rose, Greg | ebrary, Inc. Publisher: Rockland, MA : Syngress Publishing, c2006Online access: An electronic book accessible through the World Wide Web; click to view Availability: No items available
|
|
|
Enemy at the water cooler [electronic resource] : real-life stories of insider threats and Enterprise Security Management countermeasures / Brian T. Contos.
by Contos, Brian T | ebrary, Inc. Publisher: Rockland, MA : Syngress, c2006Online access: An electronic book accessible through the World Wide Web; click to view Availability: No items available
|
|
|
Crackproof your software [electronic resource] : the best ways to protect your software against crackers / Pavol C̆ervĕn.
by Cerven, Pavol | ebrary, Inc. Publisher: San Francisco : No Starch Press, c2002Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan:
[Call number: 005.8]
(1).
|
|
|
Snort 2.0 intrusion detection [electronic resource] / Jay Beale, James C. Foster.
by Beale, Jay | Foster, James C | ebrary, Inc. Publisher: Rockland : Oxford : Syngress ; Elsevier Science, c2003Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan:
[Call number: 005.8]
(1).
|
|
|
Hacking exposed malware & rootkits : malware & rootkits security secrets & solutions / Michael Davis, Sean Bodmer, Aaron Lemasters.
by Davis, Michael A | Bodmer, Sean | LeMasters, Aaron. Publisher: New York : McGraw Hill, c2010Other title: Hacking exposed malware and rootkits.Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 DAV 2010]
(1).
|
|
|
Handbook of information and communication security / Peter Stavroulakis, Mark Stamp, editors.
by Stavroulakis, Peter | Stamp, Mark. Publisher: Berlin : Springer, 2010Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 HAN 2010]
(1).
|