Your search returned 243 results.

Not what you expected? Check for suggestions
|
Internet applications [electronic resource] : the emerging global computer.

by ebrary, Inc.

Publisher: [Boston] : Technology Research News, 2004Online access: An electronic book accessible through the World Wide Web; click to view Availability: No items available
Implementing PKI Services on z/OS [electronic resource] / [Chris Rayns ... et al.].

by Rayns, Chris | International Business Machines Corporation. International Technical Support Organization | ebrary, Inc.

Edition: 1st ed.Publisher: [S.l.] : IBM, International Technical Support Organization, c2004Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan: [Call number: 005.8] (1).
Invasion of privacy! [electronic resource] : big brother and the company hackers / Michael Weber.

by Weber, Michael | ebrary, Inc.

Publisher: Boston : Premier Press, 2004Online access: An electronic book accessible through the World Wide Web; click to view Availability: No items available
Windows forensic analysis [electronic resource] : DVD toolkit, / Harlan Carvey.

by Carvey, Harlan A | ebrary, Inc.

Publisher: Burlington, MA : Syngress Pub., c2007Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan: [Call number: 363.250968] (1).
Cloud computing security : foundations and challenges / editor, John R. Vacca.

by Vacca, John R, 1947-.

Publisher: Boca Raton : CRC Press, [2017]Copyright date: ©2017Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for reference: Taylor's Library-TU [Call number: 005.8 C647] (1).
Cryptography and network security : principles and practice / William Stallings.

by Stallings, William.

Edition: 4th ed.Publisher: New Delhi : Prentice Hall of India, 2008Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 STA 2008] (1).
Security without obscurity : a guide to PKI operations / J.J. Stapleton, W. Clay Epstein.

by Stapleton, Jeffrey James | Epstein, W. Clay.

Publisher: Boca Raton, Florida : CRC Press, [2016]Copyright date: ©2016Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for reference: Taylor's Library-TU [Call number: 005.8 S794] (1).
Security in the private cloud / edited by John R. Vacca.

by Vacca, John R.

Publisher: Boca Raton : Taylor & Francis, a CRC title, part of the Taylor & Francis imprint, a member of the Taylor & Francis Group, the academic division of T&F Informa, plc, [2017]Copyright date: ©2017Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for reference: Taylor's Library-TU [Call number: 004.6782 S446] (1).
Introduction to certificateless cryptography / Hu Xiong, Zhen Qin, and Athanasios V. Vasilakos.

by Xiong, Hu | Qin, Zhen, 1982- [author.] | Vasilakos, Athanasios.

Publisher: Boca Raton : Taylor & Francis, a CRC title, part of the Taylor & Francis imprint, a member of the Taylor & Francis Group, the academic division of T&F Informa, plc, [2017]Copyright date: ©2017Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for reference: Taylor's Library-TU [Call number: 005.82 X6] (1).
Implementing cybersecurity : a guide to the National Institute of Standards in Technology Risk Management Framework / Anne Kohnke, Dan Shoemaker, and Ken Sigler.

by Kohnke, Anne | Shoemaker, Dan | Sigler, Kenneth.

Publisher: Boca Raton, Fla. : CRC Press, 2017Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for reference: Taylor's Library-TU [Call number: 005.8 K796] (1).
Best damn firewall book period [electronic resource] / Thomas W. Shinder, Cheri Amon, Robert J. Shimonski, Debra Littlejohn Shinder.

by Shinder, Thomas W | Amon, Cheri | Shimonski, Robert | Shinder, Debra Littlejohn | ebrary, Inc.

Publisher: Rockland, Mass. : Syngress, 2003Online access: An electronic book accessible through the World Wide Web; click to view Availability: No items available
Hacking [electronic resource] : the art of exploitation / by Jon Erickson.

by Erickson, Jon (Jon Mark), 1977- | ebrary, Inc.

Publisher: San Francisco : No Starch Press, c2003Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan: [Call number: 005.8] (1).
Hacking the code [electronic resource] : ASP. NET web application security / Mark M. Burnett; James C. Foster.

by Burnett, Mark (Mark M.) | Foster, James C | ebrary, Inc.

Publisher: Rockland, MA : Syngress, 2004Online access: An electronic book accessible through the World Wide Web; click to view Availability: No items available
How to cheat at designing security for a Windows Server 2003 network [electronic resource] / Rob Amini ... [et al.] ; Laura E. Hunter, technical editor.

by Amini, Rob [aut] | Hunter, Laura E [edt] | ebrary, Inc.

Publisher: Rockland, Mass. : Syngress Pub., c2006Other title: Designing security.Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan: [Call number: 005.8] (1).
z/OS diagnostic data [electronic resource] : collection and analysis / Paul Rogers, David Carey.

by Rogers, Paul | Carey, David | ebrary, Inc.

Publisher: San Jose, CA : IBM, International Support Organization, c2005Online access: An electronic book accessible through the World Wide Web; click to view Availability: No items available
Securing information and communications systems [electronic resource] : principles, technologies, and applications / Steven M. Furnell ... [et al.], editors.

by Furnell, Steven, 1970- | ebrary, Inc.

Publisher: Boston : Artech House, c2008Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan: [Call number: 005.8] (1).
Trust and security in collaborative computing / Xukai Zou, Yuan-Shun Dai, Yi Pan.

by Zou, Xukai, 1963- | Dai, Yuan-Shun | Pan, Yi, 1960-.

Publisher: Singapore : World Scientific, c2008Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 ZOU 2008] (1).
Data privacy : principles and practice / Nataraj Venkataramanan, Ashwin Shriram.

by Venkataramanan, Nataraj | Shriram, Ashwin.

Publisher: Boca Raton, Fla. : CRC Press, [2017]Copyright date: ©2017Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for reference: Taylor's Library-TU [Call number: 005.8 V461] (1).
New solutions for cybersecurity / edited by Howard Shrobe, David L. Shrier, and Alex Pentland.

by Shrobe, Howard E [editor.] | Shrier, David L [editor.] | Pentland, Alex, 1952- [editor.].

Publisher: Cambridge, MA : MIT Press, [2018]Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for reference: Taylor's Library-TU [Call number: 658.4/78] (1).
Trustworthy cyber-physical systems engineering / edited by Alexander Romanovsky, Newcastle University, UK, Fuyuki Ishikawa, National Institute of Informatics, Tokyo, Japan.

by Romanovsky, Alexander, 1954- | Ishikawa, Fuyuki.

Publisher: Boca Raton, Florida : CRC Press, [2017]Copyright date: ©2017Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for reference: Taylor's Library-TU [Call number: 005.8 T873] (1).