Your search returned 952 results.

Not what you expected? Check for suggestions
|
Targeted cyber attacks : multi-staged attacks driven by exploits and malware / Aditya K Sood, Richard Enbody.

by Sood, Aditya K [author.] | Enbody, Richard [author.].

Publisher: Amsterdam ; Boston : Syngress, 2014Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan: [Call number: 005.8] (1).
SharePoint 2013 : branding and user interface design / Randy Drisgill, John Ross, Paul Stubbs.

by Drisgill, Randy [author.] | Ross, John, 1947- [author.] | Stubbs, Paul R, 1969- [author.].

Publisher: Indianapolis, IN : John Wiley & Sons, Inc., [2013]Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for reference: Taylor's Library-TU [Call number: 004.682] (1).
ZigBee network protocols and applications [electronic resource] / edited by Chonggang Wang, Tao Jiang, Qian Zhang.

by Wang, Chonggang, 1974- [editor.] | Jiang, Tao, 1970 January 8- [editor.] | Zhang, Qian (Computer scientist) [editor.].

Publisher: Boca Raton : CRC Press/Taylor and Francis, c2014Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan: [Call number: 384.5] (1).
Reality mining : using big data to engineer a better world / by Nathan Eagle and Kate Greene.

by Eagle, Nathan [author.] | Greene, Kate, 1979- [author.].

Publisher: Cambridge, Massachusetts : The MIT Press, [2014]Copyright date: ©2014Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for reference: Taylor's Library-TU [Call number: 006.3/12] (1).
Mobile networks and cloud computing convergence for progressive services and applications / Joel J.P.C. Rodrigues, Kai Lin, and Jaime Lloret, editors.

by Rodrigues, Joel, 1972- [editor.] | Lin, Kai, 1979- [editor.] | Lloret Mauri, Jaime [editor.] | IGI Global [publisher.].

Publisher: Hershey, Pennsylvania (701 E. Chocolate Ave., Hershey, PA, 17033) : IGI Global, [2014]Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for reference: Taylor's Library-TU [Call number: 004.67/82] (1).
What every engineer should know about cyber security and digital forensics / Joanna F. DeFranco.

by DeFranco, Joanna F [author.].

Publisher: Boca Raton : CRC Press, [2013]Copyright date: ©2014Other title: Cyber security and digital forensics.Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan: [Call number: 005.8] (1).
Wireless ad hoc and sensor networks : management, performance, and applications / Jing (Selena) He, Shouling Ji, Yi Pan, Yingshu Li.

by He, Jing Selena [author.] | He, Jing Selena | Ji, Shouling | Pan, Yi | Pan, Yi, 1960- | Li, Yingshu.

Publisher: Boca Raton, [Florida] : CRC Press, Taylor & Francis Group, [2014]Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan: [Call number: 004.6] (1).
Network anomaly detection [electronic resource] : a machine learning perspective / authors, Dhruba Kumar Bhattacharyya, Jugal Kumar Kalita.

by Bhattacharyya, Dhruba K.

Publisher: Boca Raton : CRC Press, 2013Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for reference: Taylor's Library-TU [Call number: 005.8] (1).
Network security through data analysis : building situational awareness, 1 million log records at a time / by Michael Collins.

by Collins, Michael (Michael Patrick) [author.].

Publisher: Beijing : O'Reilly, 2014Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for reference: Taylor's Library-TU [Call number: 005.8] (1).
Security for cloud storage systems [electronic resource] / Kan Yang, Xiaohua Jia.

by Yang, Kan | Jia, Xiaohua.

Publisher: New York : Springer-Verlag, c2014Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for reference: Taylor's Library-TU [Call number: 005.8] (1).
Introduction to information systems / R. Kelly Rainer Jr., Brad Prince, Casey Cegielski.

by Rainer, R. Kelly, Jr, 1949- [author.] | Prince, Brad, 1978- [author.] | Cegielski, Casey G [author.].

Edition: Fifth edition.International student version.Publisher: [Singapore] : John Wiley & Sons Singapore Pte. Ltd., [2015]Copyright date: ©2015Availability: Items available for loan: Taylor's Library-TU [Call number: 658.4038011 RAI 2015] (2).
Data communications & computer networks : a business user's approach / Curt M. White.

by White, Curt M.

Edition: 8th edition.Publisher: Boston, MA : Cengage Learning, [2016]Copyright date: ©2016Availability: Items available for loan: Taylor's Library-TU [Call number: 004.6 WHI 2016] (1). Checked out (1).
Fundamentals of multimedia / Ze-Nian Li, Mark S. Drew, Jiangchuan Liu.

by Li, Ze-Nian | Drew, Mark S.

Edition: Second edition.Publisher: Cham : Springer, [2014]Copyright date: ©2014Availability: Items available for loan: Taylor's Library-TU [Call number: 006.7 LIZ 2014] (2).
Management of information security / Michael E. Whitman, Herbert J. Mattord.

by Whitman, Michael E, 1964- | Mattord, Herbert J.

Edition: Fourth edition.Publisher: Stamford, CT : Cengage Learning, [2014]Copyright date: ©2014Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 WHI 2014] (2).
IT governance : an international guide to data security and ISO27001/ISO27002 / Alan Calder and Steve Watkins.

by Calder, Alan, 1957- | Watkins, Steve, 1970-.

Edition: Fifth edition.Publisher: London ; Philadelphia : Kogan Page, 2012Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 CAL 2012] (2).
Information security / Mark Rhodes-Ousley.

by Rhodes-Ousley, Mark | Bragg, Roberta. Network security.

Edition: Second edition.Publisher: New York : McGraw-Hill Education, [2013]Copyright date: ©2013Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 RHO 2013] (1).
The law of big data [electronic resource] : a business and legal guide / James R. Kalyvas, Michael R. Overly.

by Kalyvas, James R | Overly, Michael R.

Publisher: Boca Raton : CRC Press/Auerbach Book, Taylor and Francis, [2014]Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for reference: Taylor's Library-TU [Call number: 343.730999] (1).
Guide to computing fundamentals in cyber-physical systems [electronic resource] : concepts, design methods, and applications / by Dietmar P.F. Möller.

by Möller, Dietmar P.F | SpringerLink (Online service).

Source: Springer eBooksPublisher: Cham : Springer International Publishing : Imprint: Springer, 2016Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for reference: Taylor's Library-TU [Call number: 004.6] (1).
Machine learning and intelligent communications [electronic resource] : first international conference, mlicom 2016, shanghai, china, august 27-28, 2016, revised selected papers / edited by Huang Xin-lin.

by Xin-lin, Huang | SpringerLink (Online service).

Source: Springer eBooksPublisher: Cham : Springer International Publishing : Imprint: Springer, 2017Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for reference: Taylor's Library-TU [Call number: 004.6] (1).
Cloud mobile networks [electronic resource] : from ran to epc / by Mojtaba Vaezi, Ying Zhang.

by Vaezi, Mojtaba | Zhang, Ying | SpringerLink (Online service).

Source: Springer eBooksPublisher: Cham : Springer International Publishing : Imprint: Springer, 2017Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for reference: Taylor's Library-TU [Call number: 004.6] (1).