Your search returned 135 results.

Not what you expected? Check for suggestions
|
Cryptography and network security : principles and practice / William Stallings.

by Stallings, William.

Edition: 7th ed.Publisher: Boston, MA : Pearson, c2014Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 STA 2014] (2).
Network security essentials : applications and standards / William Stallings.

by Stallings, William | Chandavarkar, B. R.

Edition: Fifth edition.International edition. / contributions by B.R. Chandavarker.Publisher: Harlow : Pearson Education Limited, [2014]Copyright date: ©2014Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 STA 2014] (1).
Security policies and implementation issues / Rob Johnson with Mike Merkow.

by Johnson, Rob (Robert) | Merkow, Mark S.

Publisher: Burlington, MA : Jones & Bartlett Learning, c2011Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 JOH 2011] (1).
The basics of web hacking : tools and techniques to attack the Web / Josh Pauli ; Scott White, technical editor.

by Pauli, Joshua J.

Publisher: Waltham, MA : Syngress, an imprint of Elsevier, [2013]Copyright date: ©2013Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 PAU 2013] (1).
Data-driven security : analysis, visualization and dashboards / Jay Jacobs + Bob Rudis.

by Jacobs, Jay (Data analyst) | Rudis, Bob.

Edition: 1st edition.Publisher: Indianapolis, IN : John Wiley & Sons Inc., [2014]Copyright date: ©2014Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 JAC 2014] (1).
Anti-hacker tool kit / Mike Shema.

by Shema, Mike.

Edition: Fourth edition.Publisher: New York : McGraw-Hill Education, [2014]Copyright date: ©2014Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 SHE 2014] (1).
Network security through data analysis : building situational awareness / Michael Collins.

by Collins, Michael (Michael S.).

Edition: First edition.Publisher: Sebastopol, CA : O'Reilly, [2014]Copyright date: ©2014Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 COL 2014] (1).
The secure information society [electronic resource] : ethical, legal and political challenges / Jörg Krüger, Bertram Nickolay, Sandro Gaycken, editors.

by Krüger, Jörg | Nickolay, Bertram | Gaycken, Sandro, 1973-.

Publisher: London ; New York : Springer, c2013Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for reference: Taylor's Library-TU [Call number: 005.8] (1).
Intelligent systems for security informatics [electronic resource] / Christopher C. Yang ... [et al.].

by Yang, Christopher C.

Publisher: Oxford ; Waltham, MA : Academic Press, c2013Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for reference: Taylor's Library-TU [Call number: 005.8] (1).
Theory and practice of cryptography solutions for secure information systems [electronic resource] / Atilla Elci, Josef Pieprzyk, Alexander G. Chefranov, Mehmet A. Orgun, Huaxiong Wang and Rajan Shankaran, editors.

by Elçi, Atilla [editor of compilation.].

Publisher: Hershey, PA : Information Science Reference, 2013Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for reference: Taylor's Library-TU [Call number: 005.8] (1).
Security engineering for cloud computing [electronic resource] : approaches and tools / David G. Rosado, Daniel Mellado, Eduardo Fernandez-Medina, and Mario Piattini, editors.

by Rosado, David G, 1977- | IGI Global.

Publisher: Hershey, Pa. : IGI Global (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA), ©2013Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for reference: Taylor's Library-TU [Call number: 005.8] (1).
Architectures and protocols for secure information technology infrastructures [electronic resource] / Antonio Ruiz Martínez, Fernando Pereñíguez Garcia, Rafael Marin-López, [editors].

by Martinez, Antonio Ruiz, 1976- [editor of compilation.] | Garcia, Fernando Pereniguez, 1984- [editor of compilation.] | Marin-Lopez, Rafael, 1977- [editor of compilation.].

Publisher: Hershey PA : Information Science Reference, an imprint of IGI Global, c2014Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for reference: Taylor's Library-TU [Call number: 005.8] (1).
Cyber threat! : how to manage the growing risk of cyber attacks / N. MacDonnell Ulsch.

by Ulsch, N. MacDonnell, 1951-.

Publisher: Hoboken, New Jersey : Wiley, 2014Copyright date: ©2014Availability: Items available for loan: Taylor's Library-TU [Call number: 658.478 ULS 2014] (1).
Security, privacy, trust, and resource management in mobile and wireless communications [electronic resource] / Danda B. Rawat, Bhed B. Bista, and Gongjun Yan, editors.

by Rawat, Danda B, 1977- | Bista, Bhed B, 1967- | Yan, Gongjun, 1976-.

Publisher: Hershey, PA : Information Science Reference, [2014]Copyright date: ©2014Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for reference: Taylor's Library-TU [Call number: 005.8] (1).
Network science and cybersecurity [electronic resource] / Robinson E. Pino, editor.

by Pino, Robinson E.

Publisher: New York : Springer Science+Business Media, c2014Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for reference: Taylor's Library-TU [Call number: 005.8] (1).
The state of the art in intrusion prevention and detection / edited by Al-Sakib Khan Pathan.

by Pathan, Al-Sakib Khan [editor,, author.].

Publisher: Boca Raton : CRC Press, Taylor & Francis Group, [2014]Copyright date: ©2014Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for reference: Taylor's Library-TU [Call number: 005.8] (1).
Security, privacy and trust in cloud systems / Surya Nepal, Mukaddim Pathan, editors.

by Nepal, Surya, 1970- [editor of compilation.] | Pathan, Mukaddim [editor of compilation.].

Publisher: Heidelberg : Springer, [2013?]Copyright date: ©2014Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for reference: Taylor's Library-TU [Call number: 004.67/82] (1).
Network anomaly detection [electronic resource] : a machine learning perspective / authors, Dhruba Kumar Bhattacharyya, Jugal Kumar Kalita.

by Bhattacharyya, Dhruba K.

Publisher: Boca Raton : CRC Press, 2013Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for reference: Taylor's Library-TU [Call number: 005.8] (1).
Network security through data analysis : building situational awareness, 1 million log records at a time / by Michael Collins.

by Collins, Michael (Michael Patrick) [author.].

Publisher: Beijing : O'Reilly, 2014Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for reference: Taylor's Library-TU [Call number: 005.8] (1).
Security for cloud storage systems [electronic resource] / Kan Yang, Xiaohua Jia.

by Yang, Kan | Jia, Xiaohua.

Publisher: New York : Springer-Verlag, c2014Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for reference: Taylor's Library-TU [Call number: 005.8] (1).