|
|
Internet applications [electronic resource] : the emerging global computer.
by ebrary, Inc. Publisher: [Boston] : Technology Research News, 2004Online access: An electronic book accessible through the World Wide Web; click to view Availability: No items available
|
|
|
Implementing PKI Services on z/OS [electronic resource] / [Chris Rayns ... et al.].
by Rayns, Chris | International Business Machines Corporation. International Technical Support Organization | ebrary, Inc. Edition: 1st ed.Publisher: [S.l.] : IBM, International Technical Support Organization, c2004Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan:
[Call number: 005.8]
(1).
|
|
|
Invasion of privacy! [electronic resource] : big brother and the company hackers / Michael Weber.
by Weber, Michael | ebrary, Inc. Publisher: Boston : Premier Press, 2004Online access: An electronic book accessible through the World Wide Web; click to view Availability: No items available
|
|
|
Windows forensic analysis [electronic resource] : DVD toolkit, / Harlan Carvey.
by Carvey, Harlan A | ebrary, Inc. Publisher: Burlington, MA : Syngress Pub., c2007Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan:
[Call number: 363.250968]
(1).
|
|
|
Cloud computing security : foundations and challenges / editor, John R. Vacca.
by Vacca, John R, 1947-. Publisher: Boca Raton : CRC Press, [2017]Copyright date: ©2017Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for reference: Taylor's Library-TU
[Call number: 005.8 C647]
(1).
|
|
|
Cryptography and network security : principles and practice / William Stallings.
by Stallings, William. Edition: 4th ed.Publisher: New Delhi : Prentice Hall of India, 2008Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 STA 2008]
(1).
|
|
|
Security without obscurity : a guide to PKI operations / J.J. Stapleton, W. Clay Epstein.
by Stapleton, Jeffrey James | Epstein, W. Clay. Publisher: Boca Raton, Florida : CRC Press, [2016]Copyright date: ©2016Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for reference: Taylor's Library-TU
[Call number: 005.8 S794]
(1).
|
|
|
Security in the private cloud / edited by John R. Vacca.
by Vacca, John R. Publisher: Boca Raton : Taylor & Francis, a CRC title, part of the Taylor & Francis imprint, a member of the Taylor & Francis Group, the academic division of T&F Informa, plc, [2017]Copyright date: ©2017Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for reference: Taylor's Library-TU
[Call number: 004.6782 S446]
(1).
|
|
|
Introduction to certificateless cryptography / Hu Xiong, Zhen Qin, and Athanasios V. Vasilakos.
by Xiong, Hu | Qin, Zhen, 1982- [author.] | Vasilakos, Athanasios. Publisher: Boca Raton : Taylor & Francis, a CRC title, part of the Taylor & Francis imprint, a member of the Taylor & Francis Group, the academic division of T&F Informa, plc, [2017]Copyright date: ©2017Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for reference: Taylor's Library-TU
[Call number: 005.82 X6]
(1).
|
|
|
Implementing cybersecurity : a guide to the National Institute of Standards in Technology Risk Management Framework / Anne Kohnke, Dan Shoemaker, and Ken Sigler.
by Kohnke, Anne | Shoemaker, Dan | Sigler, Kenneth. Publisher: Boca Raton, Fla. : CRC Press, 2017Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for reference: Taylor's Library-TU
[Call number: 005.8 K796]
(1).
|
|
|
Best damn firewall book period [electronic resource] / Thomas W. Shinder, Cheri Amon, Robert J. Shimonski, Debra Littlejohn Shinder.
by Shinder, Thomas W | Amon, Cheri | Shimonski, Robert | Shinder, Debra Littlejohn | ebrary, Inc. Publisher: Rockland, Mass. : Syngress, 2003Online access: An electronic book accessible through the World Wide Web; click to view Availability: No items available
|
|
|
Hacking [electronic resource] : the art of exploitation / by Jon Erickson.
by Erickson, Jon (Jon Mark), 1977- | ebrary, Inc. Publisher: San Francisco : No Starch Press, c2003Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan:
[Call number: 005.8]
(1).
|
|
|
Hacking the code [electronic resource] : ASP. NET web application security / Mark M. Burnett; James C. Foster.
by Burnett, Mark (Mark M.) | Foster, James C | ebrary, Inc. Publisher: Rockland, MA : Syngress, 2004Online access: An electronic book accessible through the World Wide Web; click to view Availability: No items available
|
|
|
How to cheat at designing security for a Windows Server 2003 network [electronic resource] / Rob Amini ... [et al.] ; Laura E. Hunter, technical editor.
by Amini, Rob [aut] | Hunter, Laura E [edt] | ebrary, Inc. Publisher: Rockland, Mass. : Syngress Pub., c2006Other title: Designing security.Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan:
[Call number: 005.8]
(1).
|
|
|
z/OS diagnostic data [electronic resource] : collection and analysis / Paul Rogers, David Carey.
by Rogers, Paul | Carey, David | ebrary, Inc. Publisher: San Jose, CA : IBM, International Support Organization, c2005Online access: An electronic book accessible through the World Wide Web; click to view Availability: No items available
|
|
|
Securing information and communications systems [electronic resource] : principles, technologies, and applications / Steven M. Furnell ... [et al.], editors.
by Furnell, Steven, 1970- | ebrary, Inc. Publisher: Boston : Artech House, c2008Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan:
[Call number: 005.8]
(1).
|
|
|
Trust and security in collaborative computing / Xukai Zou, Yuan-Shun Dai, Yi Pan.
by Zou, Xukai, 1963- | Dai, Yuan-Shun | Pan, Yi, 1960-. Publisher: Singapore : World Scientific, c2008Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 ZOU 2008]
(1).
|
|
|
Data privacy : principles and practice / Nataraj Venkataramanan, Ashwin Shriram.
by Venkataramanan, Nataraj | Shriram, Ashwin. Publisher: Boca Raton, Fla. : CRC Press, [2017]Copyright date: ©2017Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for reference: Taylor's Library-TU
[Call number: 005.8 V461]
(1).
|
|
|
New solutions for cybersecurity / edited by Howard Shrobe, David L. Shrier, and Alex Pentland.
by Shrobe, Howard E [editor.] | Shrier, David L [editor.] | Pentland, Alex, 1952- [editor.]. Publisher: Cambridge, MA : MIT Press, [2018]Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for reference: Taylor's Library-TU
[Call number: 658.4/78]
(1).
|
|
|
Trustworthy cyber-physical systems engineering / edited by Alexander Romanovsky, Newcastle University, UK, Fuyuki Ishikawa, National Institute of Informatics, Tokyo, Japan.
by Romanovsky, Alexander, 1954- | Ishikawa, Fuyuki. Publisher: Boca Raton, Florida : CRC Press, [2017]Copyright date: ©2017Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for reference: Taylor's Library-TU
[Call number: 005.8 T873]
(1).
|