|
|
Counter hack : a step-by-step guide to computer attacks and effective defenses / Ed Skoudis
by Skoudis, Ed. Publisher: Upper Saddle River, N.J. : Prentice Hall PTR, c2002Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 SKO]
(1).
|
|
|
Hacking exposed : network security secrets and solutions / Stuart McClure, Joel Scambray and George Kurtz
by McClure, Stuart | Kurtz, George [(j.a.)] | Scambray, Joel [(j.a.)]. Edition: 3rd ed.Publisher: New York : Osborne/McGraw-Hill, c2001Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 MAC]
(1).
|
|
|
Anti-hacker tool kit / Mike Shema, Bradley C. Johnson.
by Shema, Mike | Johnson, Bradley C. Edition: 2nd ed.Publisher: New York : McGraw-Hill/Osborne, c2004Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 SHE]
(1).
|
|
|
Cloud computing security : foundations and challenges / editor, John R. Vacca.
by Vacca, John R, 1947-. Publisher: Boca Raton : CRC Press, [2017]Copyright date: ©2017Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for reference: Taylor's Library-TU
[Call number: 005.8 C647]
(1).
|
|
|
Data privacy : principles and practice / Nataraj Venkataramanan, Ashwin Shriram.
by Venkataramanan, Nataraj | Shriram, Ashwin. Publisher: Boca Raton, Fla. : CRC Press, [2017]Copyright date: ©2017Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for reference: Taylor's Library-TU
[Call number: 005.8 V461]
(1).
|
|
|
Hacking exposed 6 : network security secrets & solutions / Stuart McClure, Joel Scambray, George Kurtz.
by McClure, Stuart | Scambray, Joel | Kurtz, George. Edition: 10th anniversary ed.Publisher: New York : McGraw-Hill, c2009Other title: Hacking exposed six | Hacking 6 exposed.Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 MAC]
(1).
|
|
|
Practical risk management for the CIO / Mark Scherling.
by Scherling, Mark. Publisher: Boca Raton, FL : Auerbach Publications, c2011Availability: Items available for loan: Taylor's Library-TU
[Call number: 658.478 SCH 2011]
(1).
|
|
|
Anti-hacker tool kit / Mike Shema ... [et al.]
by Shema, Mike | Jones, Keith J. (Keith John). Anti-hacker tool kit. Edition: 3rd ed.Publisher: New York : McGraw-Hill/Osborne, c2006Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 ANT 2006]
(2).
|
|
|
Engineering information security : the application of systems engineering concepts to achieve information assurance / Stuart Jacobs.
by Jacobs, Stuart. Publisher: Hoboken, N.J. : Wiley : IEEE Press, c2011Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 JAC 2011]
(2).
|
|
|
Applied information security : a hands-on approach / David Basin, Patrick Schaller, Michael Schläpfer.
by Basin, David | Schaller, Patrick | Schläpfer, Michael. Publisher: Heidelberg : Springer, 2011Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 BAS 2011]
(1).
|
|
|
WordPress 3 ultimate security [electronic resource] : protect your WordPress site and its network / Olly Connelly.
by Connelly, Olly | ebrary, Inc. Publisher: Birmingham, U.K. : Packt Open Source, 2011Online access: An electronic book accessible through the World Wide Web; click to view Availability: No items available
|
|
|
Security policies and implementation issues / Rob Johnson with Mike Merkow.
by Johnson, Rob (Robert) | Merkow, Mark S. Publisher: Burlington, MA : Jones & Bartlett Learning, c2011Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 JOH 2011]
(1).
|
|
|
Data-driven security : analysis, visualization and dashboards / Jay Jacobs + Bob Rudis.
by Jacobs, Jay (Data analyst) | Rudis, Bob. Edition: 1st edition.Publisher: Indianapolis, IN : John Wiley & Sons Inc., [2014]Copyright date: ©2014Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 JAC 2014]
(1).
|
|
|
Anti-hacker tool kit / Mike Shema.
by Shema, Mike. Edition: Fourth edition.Publisher: New York : McGraw-Hill Education, [2014]Copyright date: ©2014Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 SHE 2014]
(1).
|
|
|
Security engineering for cloud computing [electronic resource] : approaches and tools / David G. Rosado, Daniel Mellado, Eduardo Fernandez-Medina, and Mario Piattini, editors.
by Rosado, David G, 1977- | IGI Global. Publisher: Hershey, Pa. : IGI Global (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA), ©2013Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for reference: Taylor's Library-TU
[Call number: 005.8]
(1).
|