|
|
Introduction to cryptography and network security / Behrouz A. Forouzan.
by Forouzan, Behrouz A. Publisher: Boston : McGraw-Hill Higher Education, c2008Other title: Cryptography and network security.Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 FOR 2008]
(3).
|
|
|
Hacking exposed 6 : network security secrets & solutions / Stuart McClure, Joel Scambray, George Kurtz.
by McClure, Stuart | Scambray, Joel | Kurtz, George. Edition: 10th anniversary ed.Publisher: New York : McGraw-Hill, c2009Other title: Hacking exposed six | Hacking 6 exposed.Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 MAC]
(1).
|
|
|
SIP security / Dorgham Sisalem ... [et al.].
by Sisalem, Dorgham. Publisher: Chichester, U.K. : Wiley, c2009Other title: Sesssion Initiation Protocol security.Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 SIP 2009]
(1).
|
|
|
Network security bible / by Eric Cole, Ronald Krutz, James W. Conley.
by Cole, Eric | Krutz, Ronald L, 1938- | Conley, James W. Edition: 2nd ed.Publisher: Indianapolis, IN : Wiley Pub., c2009Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 COL 2009]
(1).
|
|
|
Principles of information security / Michael E. Whitman and Herbert J. Mattord
by Whitman, Michael E, 1964- | Mattord, Herbert J. Edition: 3rd ed.Publisher: Boston, Mass. : Course Technology Cengage Learning, c2009Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 WHI 2009]
(1).
|
|
|
Network intrusion detection and prevention : concepts and techniques / Ali A. Ghorbani, Wei Lu, Mahbod Tavallaee.
by Ghorbani, Ali, 1954- | Lu, Wei, 1980- | Tavallaee, Mahbod. Publisher: New York : Springer, c2010Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 GHO 2010]
(1).
|
|
|
Security and cooperation in wireless networks : thwarting malicious and selfish behavior in the age of ubiquitous computing / Levente Buttyán, Jean-Pierre Hubaux.
by Buttyán, Levente | Hubaux, Jean-Pierre. Publisher: Cambridge : Cambridge University Press, 2008Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 BUT 2008]
(1).
|
|
|
Exploiting online games : cheating massively distributed systems / Greg Hoglund, Gary McGraw.
by Hoglund, Greg | McGraw, Gary, 1966-. Publisher: Upper Saddle River, NJ : Addison-Wesley, c2008Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 HOG 2008]
(1).
|
|
|
Computer and information security handbook / edited by John R. Vacca.
by Vacca, John R. Publisher: Amsterdam : Morgan Kaufmann, c2009Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 COM 2009]
(1).
|
|
|
Security in an IPv6 environment / Daniel Minoli, Jake Kouns.
by Minoli, Daniel, 1952- | Kouns, Jake. Publisher: Boca Raton, FL : CRC Press, c2009Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 MIN 2009]
(1).
|
|
|
A multidisciplinary introduction to information security / [edited by] Stig F. Mjølsnes.
by Mjølsnes, Stig F. Publisher: Boca Raton, FL : CRC Press, c2012Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 MUL 2012]
(3).
|
|
|
Practical risk management for the CIO / Mark Scherling.
by Scherling, Mark. Publisher: Boca Raton, FL : Auerbach Publications, c2011Availability: Items available for loan: Taylor's Library-TU
[Call number: 658.478 SCH 2011]
(1).
|
|
|
Virtual honeypots : from botnet tracking to intrusion detection / Niels Provos, Thorsten Holz.
by Provos, Niels | Holz, Thorsten. Publisher: Upper Saddle River, NJ : Addison-Wesley, c2008Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 PRO 2008]
(1).
|
|
|
Practical intrusion analysis : prevention and detection for the twenty-first century / Ryan Trost.
by Trost, Ryan. Publisher: Upper Saddle River, NJ : Addison-Wesley, 2010Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 TRO 2010]
(1).
|
|
|
Anti-hacker tool kit / Mike Shema ... [et al.]
by Shema, Mike | Jones, Keith J. (Keith John). Anti-hacker tool kit. Edition: 3rd ed.Publisher: New York : McGraw-Hill/Osborne, c2006Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 ANT 2006]
(2).
|
|
|
Hacking exposed : web applications : web application security secrets and solutions / Joel Scambray, Vincent Liu, Caleb Sima.
by Scambray, Joel | Liu, Vincent | Sima, Caleb. Edition: 3rd ed.Publisher: San Francisco, CA : McGraw-Hill Companies, 2011Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 SCA 2011]
(2).
|
|
|
Security information and event management (SIEM) implementation / David R. Miller ... [et al.].
by Miller, David, 1959-. Publisher: New York : McGraw-Hill, c2011Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 SEC 2011]
(1).
|
|
|
Firewall design and analysis / Alex X. Liu.
by Liu, Alex X. Publisher: Singapore : World Scientific, c2011Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 LIU 2011]
(1).
|