Your search returned 135 results.

Not what you expected? Check for suggestions
|
Cryptography and network security / Behrouz A. Forouzan.

by Forouzan, Behrouz A.

Publisher: Boston : McGraw Hill, 2008Availability: Items available for loan: Taylor's Library-TU [Call number: 005.82 FOR] (1).
Cloud computing security : foundations and challenges / editor, John R. Vacca.

by Vacca, John R, 1947-.

Publisher: Boca Raton : CRC Press, [2017]Copyright date: ©2017Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for reference: Taylor's Library-TU [Call number: 005.8 C647] (1).
Cryptography and network security : principles and practice / William Stallings.

by Stallings, William.

Edition: 4th ed.Publisher: New Delhi : Prentice Hall of India, 2008Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 STA 2008] (1).
Security without obscurity : a guide to PKI operations / J.J. Stapleton, W. Clay Epstein.

by Stapleton, Jeffrey James | Epstein, W. Clay.

Publisher: Boca Raton, Florida : CRC Press, [2016]Copyright date: ©2016Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for reference: Taylor's Library-TU [Call number: 005.8 S794] (1).
Security in the private cloud / edited by John R. Vacca.

by Vacca, John R.

Publisher: Boca Raton : Taylor & Francis, a CRC title, part of the Taylor & Francis imprint, a member of the Taylor & Francis Group, the academic division of T&F Informa, plc, [2017]Copyright date: ©2017Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for reference: Taylor's Library-TU [Call number: 004.6782 S446] (1).
Introduction to certificateless cryptography / Hu Xiong, Zhen Qin, and Athanasios V. Vasilakos.

by Xiong, Hu | Qin, Zhen, 1982- [author.] | Vasilakos, Athanasios.

Publisher: Boca Raton : Taylor & Francis, a CRC title, part of the Taylor & Francis imprint, a member of the Taylor & Francis Group, the academic division of T&F Informa, plc, [2017]Copyright date: ©2017Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for reference: Taylor's Library-TU [Call number: 005.82 X6] (1).
Implementing cybersecurity : a guide to the National Institute of Standards in Technology Risk Management Framework / Anne Kohnke, Dan Shoemaker, and Ken Sigler.

by Kohnke, Anne | Shoemaker, Dan | Sigler, Kenneth.

Publisher: Boca Raton, Fla. : CRC Press, 2017Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for reference: Taylor's Library-TU [Call number: 005.8 K796] (1).
Trust and security in collaborative computing / Xukai Zou, Yuan-Shun Dai, Yi Pan.

by Zou, Xukai, 1963- | Dai, Yuan-Shun | Pan, Yi, 1960-.

Publisher: Singapore : World Scientific, c2008Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 ZOU 2008] (1).
Data privacy : principles and practice / Nataraj Venkataramanan, Ashwin Shriram.

by Venkataramanan, Nataraj | Shriram, Ashwin.

Publisher: Boca Raton, Fla. : CRC Press, [2017]Copyright date: ©2017Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for reference: Taylor's Library-TU [Call number: 005.8 V461] (1).
New solutions for cybersecurity / edited by Howard Shrobe, David L. Shrier, and Alex Pentland.

by Shrobe, Howard E [editor.] | Shrier, David L [editor.] | Pentland, Alex, 1952- [editor.].

Publisher: Cambridge, MA : MIT Press, [2018]Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for reference: Taylor's Library-TU [Call number: 658.4/78] (1).
Trustworthy cyber-physical systems engineering / edited by Alexander Romanovsky, Newcastle University, UK, Fuyuki Ishikawa, National Institute of Informatics, Tokyo, Japan.

by Romanovsky, Alexander, 1954- | Ishikawa, Fuyuki.

Publisher: Boca Raton, Florida : CRC Press, [2017]Copyright date: ©2017Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for reference: Taylor's Library-TU [Call number: 005.8 T873] (1).
Handbook of research on information and cyber security in the fourth industrial revolution / Ziska Fields, editor.

by Fields, Ziska, 1970- [editor.] | IGI Global [publisher.].

Publisher: Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) : IGI Global, [2018]Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for reference: Taylor's Library-TU [Call number: 658.4/78] (1).
Network security essentials : applications and standards / William Stallings.

by Stallings, William.

Edition: 4th ed.Publisher: Upper Saddle River, N.J. : Pearson, c2011Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 STA 2011] (2).
Windows forensic analysis DVD toolkit / Harlan Carvey; Eoghan Casey, technical editor.

by Carvey, Harlan.

Edition: 2nd ed.Publisher: Burlington, MA : Syngress Publ., c2009Availability: Items available for loan: Taylor's Library-TU [Call number: 363.250968 CAR 2009] (2).
Cryptography and network security / Atul Kahate.

by Kahate, Atul.

Edition: 2nd ed.Publisher: New Delhi : Tata McGraw-Hill, c2010Availability: Items available for loan: Taylor's Library-TU [Call number: 005.82 KAH 2010] (1).
Disappearing cryptography : information hiding : steganography & watermarking / Peter Wayner.

by Wayner, Peter, 1964-.

Edition: 3rd ed.Publisher: Burlington, MA : Elsevier/Morgan Kaufmann, c2009Availability: Items available for loan: Taylor's Library-TU [Call number: 005.82 WAY 2009] (1).
Digital forensics for network, Internet, and cloud computing : a forensic evidence guide for moving targets and data / Terrence V. Lillard ... [et al.] ; technical editor, Jim Murray.

by Lillard, Terrence.

Publisher: Burlington, MA : Elsevier/Syngress, c2010Availability: Items available for loan: Taylor's Library-TU [Call number: 363.25968 GAR 2010] (1).
The art of software security assessment : identifying and preventing software vulnerabilities / Mark Dowd, John McDonald, Justin Schuh.

by Dowd, Mark | McDonald, John, 1977- | Schuh, Justin.

Publisher: Upper Saddle River, NJ : Addison-Wesley, c2007Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 DOW 2007] (1).