Your search returned 243 results.

Not what you expected? Check for suggestions
|
Handbook of research on information and cyber security in the fourth industrial revolution / Ziska Fields, editor.

by Fields, Ziska, 1970- [editor.] | IGI Global [publisher.].

Publisher: Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) : IGI Global, [2018]Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for reference: Taylor's Library-TU [Call number: 658.4/78] (1).
Network security essentials : applications and standards / William Stallings.

by Stallings, William.

Edition: 4th ed.Publisher: Upper Saddle River, N.J. : Pearson, c2011Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 STA 2011] (2).
Windows forensic analysis DVD toolkit / Harlan Carvey; Eoghan Casey, technical editor.

by Carvey, Harlan.

Edition: 2nd ed.Publisher: Burlington, MA : Syngress Publ., c2009Availability: Items available for loan: Taylor's Library-TU [Call number: 363.250968 CAR 2009] (2).
Cryptography and network security / Atul Kahate.

by Kahate, Atul.

Edition: 2nd ed.Publisher: New Delhi : Tata McGraw-Hill, c2010Availability: Items available for loan: Taylor's Library-TU [Call number: 005.82 KAH 2010] (1).
Disappearing cryptography : information hiding : steganography & watermarking / Peter Wayner.

by Wayner, Peter, 1964-.

Edition: 3rd ed.Publisher: Burlington, MA : Elsevier/Morgan Kaufmann, c2009Availability: Items available for loan: Taylor's Library-TU [Call number: 005.82 WAY 2009] (1).
Digital forensics for network, Internet, and cloud computing : a forensic evidence guide for moving targets and data / Terrence V. Lillard ... [et al.] ; technical editor, Jim Murray.

by Lillard, Terrence.

Publisher: Burlington, MA : Elsevier/Syngress, c2010Availability: Items available for loan: Taylor's Library-TU [Call number: 363.25968 GAR 2010] (1).
The art of software security assessment : identifying and preventing software vulnerabilities / Mark Dowd, John McDonald, Justin Schuh.

by Dowd, Mark | McDonald, John, 1977- | Schuh, Justin.

Publisher: Upper Saddle River, NJ : Addison-Wesley, c2007Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 DOW 2007] (1).
The management of network security : technology, design, and management control / Houston H. Carr, Charles A. Snyder, and Bliss N. Bailey.

by Carr, Houston H, 1937- | Snyder, Charles A | Bailey, Bliss N.

Publisher: Upper Saddle River, N.J. : Prentice Hall, c2010Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 CAR 2010] (1).
Network security assessment / Chris McNab.

by McNab, Chris (Chris R.), 1980-.

Edition: 2nd ed.Publisher: Sebastopol, Calif. : O'Reilly, c2008Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 MAC 2008] (1).
Introduction to network security / Douglas Jacobson.

by Jacobson, Douglas.

Publisher: Boca Raton : CRC Press, c2009Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 JAC 2009] (1).
Hacking wireless networks for dummies / by Kevin Beaver and Peter T. Davis ; foreword by Devin K. Akin.

by Beaver, Kevin | Davis, Peter T | Akin, Devin K.

Publisher: Indianapolis, IN : Wiley Pub., c2005Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 BEA 2005] (1).
Configuring Symantec Antivirus, Corporate Edition [electronic resource] / Laura E. Hunter ... [et al.] ; Robert J. Shimonski, technical editor.

by Hunter, Laura E | Shimonski, Robert | ebrary, Inc.

Publisher: Rockland, Mass. : Syngress, c2003Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan: [Call number: 005.8] (1).
Network access control for dummies / by Jay Kelley, Rich Campagna, Denzil Wessels.

by Kelley, Jay | Campagna, Rich | Wessels, Denzil.

Publisher: Hoboken, N.J. : Wiley, c2009Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 KEL 2009] (1).
Integrated security systems design [electronic resource] : concepts, specifications, and implementation / Thomas Norman.

by Norman, Thomas L | ebrary, Inc.

Publisher: Amsterdam ; London : Elsevier/Butterworth-Heinemann, c2007Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan: [Call number: 005.8] (1).
Trust and security in collaborative computing [electronic resource] / Xukai Zou, Yuan-Shun Dai, Yi Pan.

by Zou, Xukai, 1963- | Dai, Yuan-Shun | Pan, Yi, 1960- | ebrary, Inc.

Publisher: Hackensack, NJ : World Scientific, c2008Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan: [Call number: 005.8] (1).
The Internet under crisis conditions [electronic resource] : learning from September 11 / Committee on the Internet Under Crisis Conditions: Learning from September 11, Computer Science and Telecommunications Board, Division on Engineering and Physical Sciences, National Research Council of the National Academies.

by ebrary, Inc.

Publisher: Washington, D.C. : National Academies Press, c2003Online access: An electronic book accessible through the World Wide Web; click to view Availability: No items available