Your search returned 135 results.

Not what you expected? Check for suggestions
|
Introduction to cryptography and network security / Behrouz A. Forouzan.

by Forouzan, Behrouz A.

Publisher: Boston : McGraw-Hill Higher Education, c2008Other title: Cryptography and network security.Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 FOR 2008] (3).
Hacking exposed 6 : network security secrets & solutions / Stuart McClure, Joel Scambray, George Kurtz.

by McClure, Stuart | Scambray, Joel | Kurtz, George.

Edition: 10th anniversary ed.Publisher: New York : McGraw-Hill, c2009Other title: Hacking exposed six | Hacking 6 exposed.Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 MAC] (1).
SIP security / Dorgham Sisalem ... [et al.].

by Sisalem, Dorgham.

Publisher: Chichester, U.K. : Wiley, c2009Other title: Sesssion Initiation Protocol security.Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 SIP 2009] (1).
Network security bible / by Eric Cole, Ronald Krutz, James W. Conley.

by Cole, Eric | Krutz, Ronald L, 1938- | Conley, James W.

Edition: 2nd ed.Publisher: Indianapolis, IN : Wiley Pub., c2009Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 COL 2009] (1).
Principles of information security / Michael E. Whitman and Herbert J. Mattord

by Whitman, Michael E, 1964- | Mattord, Herbert J.

Edition: 3rd ed.Publisher: Boston, Mass. : Course Technology Cengage Learning, c2009Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 WHI 2009] (1).
Network intrusion detection and prevention : concepts and techniques / Ali A. Ghorbani, Wei Lu, Mahbod Tavallaee.

by Ghorbani, Ali, 1954- | Lu, Wei, 1980- | Tavallaee, Mahbod.

Publisher: New York : Springer, c2010Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 GHO 2010] (1).
Security and cooperation in wireless networks : thwarting malicious and selfish behavior in the age of ubiquitous computing / Levente Buttyán, Jean-Pierre Hubaux.

by Buttyán, Levente | Hubaux, Jean-Pierre.

Publisher: Cambridge : Cambridge University Press, 2008Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 BUT 2008] (1).
Exploiting online games : cheating massively distributed systems / Greg Hoglund, Gary McGraw.

by Hoglund, Greg | McGraw, Gary, 1966-.

Publisher: Upper Saddle River, NJ : Addison-Wesley, c2008Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 HOG 2008] (1).
Computer and information security handbook / edited by John R. Vacca.

by Vacca, John R.

Publisher: Amsterdam : Morgan Kaufmann, c2009Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 COM 2009] (1).
Security in an IPv6 environment / Daniel Minoli, Jake Kouns.

by Minoli, Daniel, 1952- | Kouns, Jake.

Publisher: Boca Raton, FL : CRC Press, c2009Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 MIN 2009] (1).
A multidisciplinary introduction to information security / [edited by] Stig F. Mjølsnes.

by Mjølsnes, Stig F.

Publisher: Boca Raton, FL : CRC Press, c2012Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 MUL 2012] (3).
Practical risk management for the CIO / Mark Scherling.

by Scherling, Mark.

Publisher: Boca Raton, FL : Auerbach Publications, c2011Availability: Items available for loan: Taylor's Library-TU [Call number: 658.478 SCH 2011] (1).
Virtual honeypots : from botnet tracking to intrusion detection / Niels Provos, Thorsten Holz.

by Provos, Niels | Holz, Thorsten.

Publisher: Upper Saddle River, NJ : Addison-Wesley, c2008Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 PRO 2008] (1).
Practical intrusion analysis : prevention and detection for the twenty-first century / Ryan Trost.

by Trost, Ryan.

Publisher: Upper Saddle River, NJ : Addison-Wesley, 2010Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 TRO 2010] (1).
Anti-hacker tool kit / Mike Shema ... [et al.]

by Shema, Mike | Jones, Keith J. (Keith John). Anti-hacker tool kit.

Edition: 3rd ed.Publisher: New York : McGraw-Hill/Osborne, c2006Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 ANT 2006] (2).
Hacking exposed : web applications : web application security secrets and solutions / Joel Scambray, Vincent Liu, Caleb Sima.

by Scambray, Joel | Liu, Vincent | Sima, Caleb.

Edition: 3rd ed.Publisher: San Francisco, CA : McGraw-Hill Companies, 2011Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 SCA 2011] (2).
Security information and event management (SIEM) implementation / David R. Miller ... [et al.].

by Miller, David, 1959-.

Publisher: New York : McGraw-Hill, c2011Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 SEC 2011] (1).
Firewall design and analysis / Alex X. Liu.

by Liu, Alex X.

Publisher: Singapore : World Scientific, c2011Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 LIU 2011] (1).