|
|
Hack proofing Linux : a guide to open source security / James Stanger, Patrick T. Lane
by Stanger, James | Lane, Patrick T. Publisher: Rockland, Mass : Syngress, c2001Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 STA]
(1).
|
|
|
Intrusion signatures and analysis / Stephen Northcutt ... [et al.]
by Northcutt, Stephen. Edition: 1st ed.Publisher: Indianapolis, Ind. : New Riders, c2001Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 INT]
(1).
|
|
|
Maximum security : [a hacker's guide to protecting your internet site and network] / Anonymous Edition: 3rd ed.Publisher: Indianapolis, Ind. : Sams, c2001Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 MAX]
(2).
|
|
|
Maximum Linux security : [a hacker's guide to protecting your Linux server and workstation] / Anonymous
by Ray, John, 1971-. Edition: 2nd ed. / with revisions by John Ray.Publisher: Indianapolis, Ind. : Sams, c2001Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 MAX]
(1).
|
|
|
The computer incident response planning handbook : executable plans for potecting information at risk / N.K. McCarthy.
by McCarthy, N. K. Publisher: New York : McGraw-Hill, c2012Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 MAC 2012]
(2).
|
|
|
The disaster recovery handbook : a step-by-step plan to ensure business continuity and protect vital operations, facilities, and assets / Michael Wallace, Lawrence Webber.
by Wallace, Michael, 1960- | Webber, Larry. Edition: 2nd ed.Publisher: New York, N.Y. : American Management Association, c2011Availability: Items available for loan: Taylor's Library-TU
[Call number: 658.477 WAL 2011]
(2).
|
|
|
NISER ICT security survey for Malaysia 2000/2001.
by ACNielsen | National ICT Security and Emergency Response Centre (NISER). Publisher: [Kuala Lumpur] : NISER, c2002Availability: Items available for loan: Taylor's Library-TC
[Call number: 005.8 NIS 2002]
(1).
|
|
|
Webster's new world hacker dictionary / Bernadette Schell and Clemens Martin.
by Schell, Bernadette H. (Bernadette Hlubik), 1952- | Martin, Clemens. Publisher: Indianapolis, IN : Wiley Pub., c2006Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8003 SCH]
(1).
|
|
|
Multimedia security technologies for digital rights management / edited by Wenjun Zeng, Heather Yu, Ching-Yung Lin.
by Zeng, Wenjun, 1967- | Yu, Hong Heather, 1967- | Lin, Ching-Yung. Publisher: Boston : Academic Press, c2006Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 MUL]
(1).
|
|
|
Developer's guide to web application security / Michael Cross.
by Cross, Michael. Publisher: Rockland, Mass. : Syngress Publishing, c2007Other title: Web application security..Availability: Items available for loan: Taylor's Library-TU
[Call number: 005.8 CRO]
(1).
|