|
|
Principles of information security / Michael E. Whitman and Herbert J. Mattord
by Whitman, Michael E, 1964- | Mattord, Herbert J. Edition: 3rd ed.Publisher: Boston, Mass. : Course Technology Cengage Learning, c2009Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 WHI 2009]
(1).
|
|
|
Network intrusion detection and prevention : concepts and techniques / Ali A. Ghorbani, Wei Lu, Mahbod Tavallaee.
by Ghorbani, Ali, 1954- | Lu, Wei, 1980- | Tavallaee, Mahbod. Publisher: New York : Springer, c2010Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 GHO 2010]
(1).
|
|
|
Security and cooperation in wireless networks : thwarting malicious and selfish behavior in the age of ubiquitous computing / Levente Buttyán, Jean-Pierre Hubaux.
by Buttyán, Levente | Hubaux, Jean-Pierre. Publisher: Cambridge : Cambridge University Press, 2008Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 BUT 2008]
(1).
|
|
|
Exploiting online games : cheating massively distributed systems / Greg Hoglund, Gary McGraw.
by Hoglund, Greg | McGraw, Gary, 1966-. Publisher: Upper Saddle River, NJ : Addison-Wesley, c2008Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 HOG 2008]
(1).
|
|
|
Information assurance [electronic resource] : dependability and security in networked systems / [edited by] Yi Qian ... [et al.].
by Qian, Yi, 1962- | ebrary, Inc. Publisher: Amsterdam ; Boston : Elsevier/Morgan Kaufmann, c2008Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan:
[Call number: 005.8]
(1).
|
|
|
Security for mobile networks and platforms [electronic resource] / Selim Aissi, Nora Dabbous, Anand R. Prasad.
by Aissi, Selim | Dabbous, Nora | Prasad, Anand | ebrary, Inc. Publisher: Norwood, Mass. : Artech House, c2006Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan:
[Call number: 005.8]
(1).
|
|
|
Computer and information security handbook / edited by John R. Vacca.
by Vacca, John R. Publisher: Amsterdam : Morgan Kaufmann, c2009Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 COM 2009]
(1).
|
|
|
Security in an IPv6 environment / Daniel Minoli, Jake Kouns.
by Minoli, Daniel, 1952- | Kouns, Jake. Publisher: Boca Raton, FL : CRC Press, c2009Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 MIN 2009]
(1).
|
|
|
A multidisciplinary introduction to information security / [edited by] Stig F. Mjølsnes.
by Mjølsnes, Stig F. Publisher: Boca Raton, FL : CRC Press, c2012Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 MUL 2012]
(3).
|
|
|
Practical risk management for the CIO / Mark Scherling.
by Scherling, Mark. Publisher: Boca Raton, FL : Auerbach Publications, c2011Availability: Items available for loan: Taylor's Library-TU
[Call number: 658.478 SCH 2011]
(1).
|
|
|
Virtual honeypots : from botnet tracking to intrusion detection / Niels Provos, Thorsten Holz.
by Provos, Niels | Holz, Thorsten. Publisher: Upper Saddle River, NJ : Addison-Wesley, c2008Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 PRO 2008]
(1).
|
|
|
Practical intrusion analysis : prevention and detection for the twenty-first century / Ryan Trost.
by Trost, Ryan. Publisher: Upper Saddle River, NJ : Addison-Wesley, 2010Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 TRO 2010]
(1).
|
|
|
Anti-hacker tool kit / Mike Shema ... [et al.]
by Shema, Mike | Jones, Keith J. (Keith John). Anti-hacker tool kit. Edition: 3rd ed.Publisher: New York : McGraw-Hill/Osborne, c2006Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 ANT 2006]
(2).
|
|
|
Hacking exposed : web applications : web application security secrets and solutions / Joel Scambray, Vincent Liu, Caleb Sima.
by Scambray, Joel | Liu, Vincent | Sima, Caleb. Edition: 3rd ed.Publisher: San Francisco, CA : McGraw-Hill Companies, 2011Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 SCA 2011]
(2).
|
|
|
Security information and event management (SIEM) implementation / David R. Miller ... [et al.].
by Miller, David, 1959-. Publisher: New York : McGraw-Hill, c2011Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 SEC 2011]
(1).
|
|
|
Intrusion detection : a machine learning approach / Zhenwei Yu, Jeffrey J. P. Tsai.
by Yu, Zhenwei | Tsai, Jeffrey J. P. Publisher: London : Imperial College Press, 2011Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 YUZ 2011]
(1).
|
|
|
Firewall design and analysis / Alex X. Liu.
by Liu, Alex X. Publisher: Singapore : World Scientific, c2011Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 LIU 2011]
(1).
|
|
|
Guide to firewalls and network security : intrusion detection and VPNs / Michael E. Whitman ... [et al.]
by Whitman, Michael E, 1964- | Holden, Greg. Guide to firewalls and network security. Edition: 2nd ed.Publisher: Boston, Mass. : Course Technology/Cengage Learning, 2009Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 HOL 2009]
(1).
|
|
|
Computer forensics Jumpstart / Michael Solomon, Diane Barrett, Neil Broom.
by Solomon, Michael, (Michael G.), 1963- | Barrett, Diane | Broom, Neil. Publisher: San Francisco, Calif. : Sybex, 2005Availability: Items available for loan: Taylor's Library-TU
[Call number: 363.25968 SOL 2005]
(1).
|