Your search returned 5 results.

Not what you expected? Check for suggestions
|
The computer incident response planning handbook : executable plans for potecting information at risk / N.K. McCarthy.

by McCarthy, N. K.

Publisher: New York : McGraw-Hill, c2012Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 MAC 2012] (2).
How to cheat at securing a wireless network [electronic resource] / Chris Hurley ... [et al.].

by Hurley, Chris | ebrary, Inc.

Publisher: Rockland, Mass. : Syngress Media, c2006Other title: Securing a wireless network.Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan: [Call number: 621.3845] (1).
Information assurance handbook : effective computer security and risk management strategies / Corey Schou, Steven Hernandez.

by Schou, Corey [author.] | Hernandez, Steven [author.].

Publisher: New York : McGraw-Hill Education, [2015]Copyright date: ©2015Availability: Items available for loan: Taylor's Library-TU [Call number: 658.478 SCH 2015] (2).
Syngress IT security project management handbook [electronic resource] / Susan Snedaker ; Russ Rogers, technical editor.

by Snedaker, Susan | Rogers, Russ | ebrary, Inc.

Publisher: Rockland, MA : Syngress Publishing, c2006Other title: IT security project management handbook.Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan: [Call number: 005.8] (1).