Your search returned 38 results.

Not what you expected? Check for suggestions
|
Hacking exposed : network security secrets and solutions / Stuart McClure, Joel Scambray and George Kurtz

by McClure, Stuart | Kurtz, George [(j.a.)] | Scambray, Joel [(j.a.)].

Edition: 3rd ed.Publisher: New York : Osborne/McGraw-Hill, c2001Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 MAC] (1).
Maximum security : [a hacker's guide to protecting your internet site and network] / Anonymous

Edition: 3rd ed.Publisher: Indianapolis, Ind. : Sams, c2001Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 MAX] (2).
Anti-hacker tool kit / Mike Shema, Bradley C. Johnson.

by Shema, Mike | Johnson, Bradley C.

Edition: 2nd ed.Publisher: New York : McGraw-Hill/Osborne, c2004Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 SHE] (1).
Security + guide to network security fundamentals / by Mark Ciampa

by Ciampa, Mark.

Edition: 2nd ed.Publisher: Boston, Mass. : Course Technology / Thomson Learning, c2005Other title: Guide to network security fundamentals. | Network security fundamentals..Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 CIA] (1).
Trust and security in collaborative computing / Xukai Zou, Yuan-Shun Dai, Yi Pan.

by Zou, Xukai, 1963- | Dai, Yuan-Shun | Pan, Yi, 1960-.

Publisher: Singapore : World Scientific, c2008Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 ZOU 2008] (1).
Windows forensic analysis DVD toolkit / Harlan Carvey; Eoghan Casey, technical editor.

by Carvey, Harlan.

Edition: 2nd ed.Publisher: Burlington, MA : Syngress Publ., c2009Availability: Items available for loan: Taylor's Library-TU [Call number: 363.250968 CAR 2009] (2).
The art of software security assessment : identifying and preventing software vulnerabilities / Mark Dowd, John McDonald, Justin Schuh.

by Dowd, Mark | McDonald, John, 1977- | Schuh, Justin.

Publisher: Upper Saddle River, NJ : Addison-Wesley, c2007Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 DOW 2007] (1).
Securing the clicks : network security in the age of social media / Gary Bahadur, Jason Inasi, Alex de Carvalho.

by Bahadur, Gary | Inasi, Jason | Carvalho, Alex de.

Publisher: New York : McGraw-Hill, c2012Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 BAH 2012] (2).
24 deadly sins of software security : programming flaws and how to fix them / Michael Howard, David LeBlanc, and John Viega.

by Howard, Michael, 1965- | LeBlanc, David, 1960- | Viega, John.

Publisher: New York, NY : McGraw-Hill, c2010Other title: Twenty four deadly sins of software security.Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 HOW 2010] (1).
Moving target defense II : application of game theory and adversarial modeling / Sushil Jajodia ... [et al.], editors.

by Jajodia, Sushil.

Publisher: New York : Springer, c2013Other title: Moving target defense two.Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 MOV 2013] (1).
SIP security / Dorgham Sisalem ... [et al.].

by Sisalem, Dorgham.

Publisher: Chichester, U.K. : Wiley, c2009Other title: Sesssion Initiation Protocol security.Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 SIP 2009] (1).
Principles of information security / Michael E. Whitman and Herbert J. Mattord

by Whitman, Michael E, 1964- | Mattord, Herbert J.

Edition: 3rd ed.Publisher: Boston, Mass. : Course Technology Cengage Learning, c2009Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 WHI 2009] (1).
Security in an IPv6 environment / Daniel Minoli, Jake Kouns.

by Minoli, Daniel, 1952- | Kouns, Jake.

Publisher: Boca Raton, FL : CRC Press, c2009Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 MIN 2009] (1).
A multidisciplinary introduction to information security / [edited by] Stig F. Mjølsnes.

by Mjølsnes, Stig F.

Publisher: Boca Raton, FL : CRC Press, c2012Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 MUL 2012] (3).
Anti-hacker tool kit / Mike Shema ... [et al.]

by Shema, Mike | Jones, Keith J. (Keith John). Anti-hacker tool kit.

Edition: 3rd ed.Publisher: New York : McGraw-Hill/Osborne, c2006Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 ANT 2006] (2).
Hacking exposed : web applications : web application security secrets and solutions / Joel Scambray, Vincent Liu, Caleb Sima.

by Scambray, Joel | Liu, Vincent | Sima, Caleb.

Edition: 3rd ed.Publisher: San Francisco, CA : McGraw-Hill Companies, 2011Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 SCA 2011] (2).
Security information and event management (SIEM) implementation / David R. Miller ... [et al.].

by Miller, David, 1959-.

Publisher: New York : McGraw-Hill, c2011Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 SEC 2011] (1).
Firewall design and analysis / Alex X. Liu.

by Liu, Alex X.

Publisher: Singapore : World Scientific, c2011Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 LIU 2011] (1).
Computer forensics Jumpstart / Michael Solomon, Diane Barrett, Neil Broom.

by Solomon, Michael, (Michael G.), 1963- | Barrett, Diane | Broom, Neil.

Publisher: San Francisco, Calif. : Sybex, 2005Availability: Items available for loan: Taylor's Library-TU [Call number: 363.25968 SOL 2005] (1).
Implementing SSL/TLS using cryptography and PKI / Joshua Davies.

by Davies, Joshua Dennis.

Edition: 1st ed.Publisher: Indianapolis, IN : Wiley Pub., c2011Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 DAV 2011] (1).