Your search returned 38 results.

Not what you expected? Check for suggestions
|
Principles of information security / Michael E. Whitman, Herbert J. Mattord.

by Whitman, Michael E, 1964- | Mattord, Herbert J.

Edition: 4th ed.Publisher: Boston, MA : Course Technology/Cengage Learning, c2012Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 WHI 2012] (2).
Corporate computer security / Randall J. Boyle, Raymond R. Panko.

by Boyle, Randall J | Panko, Raymond R.

Edition: 3rd ed.Publisher: Boston : Pearson, c2013Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 BOY 2013] (1).
Applied information security : a hands-on approach / David Basin, Patrick Schaller, Michael Schläpfer.

by Basin, David | Schaller, Patrick | Schläpfer, Michael.

Publisher: Heidelberg : Springer, 2011Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 BAS 2011] (1).
Reverse deception : organized cyber threat counter exploitation / Sean Bodmer, Dr. Max Kilger, Gregory Carpenter, Jade Jones.

by Bodmer, Sean.

Publisher: New York : McGraw-Hill, c2012Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 BOD 2012] (2).
Management of information security / Michael Whitman, Herbert Mattord.

by Whitman, Michael E, 1964- | Mattord, Herbert J.

Edition: 2nd ed.Publisher: Boston, MA : Course Technology, Cengage Learning, c2008Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 WHI 2008] (1).
Security policies and implementation issues / Rob Johnson with Mike Merkow.

by Johnson, Rob (Robert) | Merkow, Mark S.

Publisher: Burlington, MA : Jones & Bartlett Learning, c2011Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 JOH 2011] (1).
Data-driven security : analysis, visualization and dashboards / Jay Jacobs + Bob Rudis.

by Jacobs, Jay (Data analyst) | Rudis, Bob.

Edition: 1st edition.Publisher: Indianapolis, IN : John Wiley & Sons Inc., [2014]Copyright date: ©2014Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 JAC 2014] (1).
Anti-hacker tool kit / Mike Shema.

by Shema, Mike.

Edition: Fourth edition.Publisher: New York : McGraw-Hill Education, [2014]Copyright date: ©2014Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 SHE 2014] (1).
Management of information security / Michael E. Whitman, Herbert J. Mattord.

by Whitman, Michael E, 1964- | Mattord, Herbert J.

Edition: Fourth edition.Publisher: Stamford, CT : Cengage Learning, [2014]Copyright date: ©2014Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 WHI 2014] (2).
How to cheat at securing Linux / Mohan Krishnamurthy ... [et al.].

by Krishnamurthy Madwachar, Mohan.

Publisher: Burlington, MA : Syngress, c2008Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 HOW] (1).
Designing network security / Merike Kaeo.

by KAEO, Marike.

Publisher: Indianapolis, Ind. : Macmillan Technical Pub., c1999Other title: Designing network security : a practical guide to creating a secure network infrastructure..Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 KAE] (2).
Network security essentials : applications and standards / William Stallings.

by Stallings, William.

Publisher: Upper Saddle River, N.J. : Prentice Hall, c2000Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 STA] (1).
Web security sourcebook / Aviel D. Rubin, Daniel Geer, Marcus J. Ranum.

by Rubin, Aviel D | Geer, Daniel | Ranum, Marcus J.

Publisher: New York : John Wiley, c1997Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 RUB] (2).
Hacking exposed : network security secrets and solutions / Stuart McClure, Joel Scrambray, George Kurtz

by McClure, Stuart | Kurtz, George [(j.a.).] | Scrambray, Joel [(j.a.).].

Publisher: Berkeley, Calif. : Osborne/McGrawHill , c1999Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 MCC] (1).
Java network security / Robert MacGregor ... [et al.]

by MacGregor, Robert S.

Publisher: Upper Saddle River, N.J. : Prentice Hall PTR, c1998Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 JAV] (2).
Java 2 network security / Marco Pistoia ... [et al.]

by Pistoia, Marco.

Edition: 2nd ed.Publisher: Upper Saddle River, N.J. : Prentice Hall PTR, c1999Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 JAV] (1).
Secure electronic commerce : building the infrastructure for digital signatures and encryption / Warwick Ford, Michael S. Baum

by Ford, Warwick | Baum, Michael S [(j.a.)].

Edition: 2nd ed.Publisher: Upper Saddle River, N.J. : Prentice Hall PTR, c2001Availability: Items available for loan: Taylor's Library-TU [Call number: 658.84 FOR] (7).
Network security and management / Brijendra Singh.

by Singh, Brijendra.

Edition: 2nd ed.Publisher: New Delhi : PHI Learning Private Limited, 2009Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 SIN 2009] (1).