Refine your search

Your search returned 131 results.

101. Books
Real digital forensics : computer security and incident response / Keith J. Jones, Richard Bejtlich, Curtis W. Rose

by Jones, Keith J | Bejtlich, Richard | Rose, Curtis W.

Material type: book Book; Literary form: Not fiction ; Audience: Specialized; Publisher: Upper Saddle River, N.J. : Addison-Wesley, c2006Accession number(s): 200807260011.Availability: Items available for loan: Main Campus [Call number: HV8079 .C65 J663R] (1).

102. Books
Risks, controls, and security : concepts and applications / Vasant Raval, Ashok Fichadia

by Raval, Vasant | Fichadia, Ashok.

Material type: book Book; Literary form: Not fiction ; Audience: Specialized; Publisher: Hoboken, N.J. : Wiley, c2007Accession number(s): 200802280019.Availability: Items available for loan: Main Campus [Call number: QA76.9 .A25 R382R] (1).

103.
Secure Data Science : integrating cyber security and data science / Bhavani Thuraisingham, Murat Kantarcioglu, and Latifur Khan

by Thuraisingham, Bhavani [author.] | Kantarcioglu, Murat [author. ] | Khan, Latifur [author. ].

Edition: First edition.Material type: book Book; Literary form: Not fiction ; Audience: Specialized; Publisher: Boca Raton, Florida : CRC PRESS, 2022Online access: Electronic Resources Availability: No items available

104.
Security and embedded systems / edited by Dimitrios N. Serpanos and Ran Giladi. [electronic resource]

by Giladi, Ran [ed.] | Serpanos, Dimitrios Nikolaou [ed.] | NATO Advanced Research Workshop on Security and Embedded Systems (2005 : Patra, Greece).

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Amsterdam ; Washington, D.C. : IOS Press, ©2006Online access: Electronic Resources Availability: No items available

105. Books
Security architecture : design, deployment and operations / Christopher M. King, Curtis E. Dalton, T. Ertem Osmanoglu

by King, Christopher M | Dalton, Curtis E | Osmanoglu, T. Ertem.

Material type: book Book; Literary form: Not fiction ; Audience: Specialized; Publisher: New York, N.Y. : Osborne/McGraw-Hill, c2001Accession number(s): 200207020054.Availability: Items available for loan: Main Campus [Call number: QA76.9 .A25 K563S] (1).

106. Books
Security complete

Edition: 2nd ed.Material type: book Book; Literary form: Not fiction ; Audience: Specialized; Publisher: San Francisco, Calif. : Sybex, c2002Accession number(s): 200303250034.Availability: Items available for loan: Main Campus [Call number: QA76.9 .A25 S428 2002] (1).

107. Books
Security data visualization : graphical techniques for network analysis / Greg Conti

by Conti, Greg.

Material type: book Book; Literary form: Not fiction ; Audience: Specialized; Publisher: San Francisco, Calif. : No Starch Press, c2007Accession number(s): 200807260035.Availability: Items available for loan: Main Campus [Call number: TK5105.59 C667S] (1).

108. Books
Security in computing

by Pfleeger, Charles.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Upper Saddle River, N.J. : Prentice-Hall International, 1997Accession number(s): 151219990107.Availability: Items available for loan: Main Campus [Call number: QA76.9 .A25 P443S 1997] (1).

109. Books
Security in computing / Charles P. Pfleeger

by Pfleeger, Charles P.

Material type: book Book; Literary form: Not fiction ; Audience: Specialized; Publisher: Englewood Cliffs, N.J. : Prentice-Hall International, c1989Accession number(s): 200508050066, 224916.Availability: Items available for loan: Main Campus [Call number: QA76.9 .A25 P443S] (1).

110. Books
Security leader insights for information protection : lessons and strategies from leading security professionals / Bob Fahy, contributing editor.

by Fahy, Bob [ed.] | Fahy, Bob, ed.

Material type: book Book; Format: print ; Literary form: Not fiction ; Audience: Specialized; Publisher: Amsterdam : Elsevier, c2014Accession number(s): 2016000003533.Availability: Items available for loan: Main Campus [Call number: QA76.9 .A25 S428 2014] (1).

111. Books
Security+ guide to network security fundamentals / by Cisco Learning Institute ; Paul Campbell, Ben Calvert, Steven Boswell

by Campbell, Paul | Calvert, Ben | Boswell, Steven | Cisco Learning Institute.

Material type: book Book; Literary form: Not fiction ; Audience: Specialized; Publisher: Australia : Thomson/Course Technology, c2003Other title: Security plus guide to network security fundamentals | Network security fundamentals.Accession number(s): 200407230017.Availability: Items available for loan: Main Campus [Call number: TK5105.59 S428] (1).

112.
Shadow warfare : cyberwar policy in the United States, Russia, and China / Elizabeth Van Wie Davis.

by Davis, Elizabeth Van Wie [author.].

Material type: book Book; Literary form: Not fiction ; Audience: Specialized; Publisher: Lanham, Md. : Rowman & Littlefield, ©2021Online access: Electronic Resources Availability: No items available

113. Books
SOA security / Ramarao Kanneganti, Prasad Chodavarapu

by Kanneganti, Ramarao | Chodavarapu, Prasad.

Material type: book Book; Literary form: Not fiction ; Audience: Specialized; Publisher: Greenwich, Conn. : Manning, c2008Accession number(s): 200901140026.Availability: Items available for loan: Main Campus [Call number: TK5105.52 K366S] (1).

114. Books
Social engineering : the art of human hacking / Christopher Hadnagy

by Hadnagy, Christopher.

Material type: book Book; Literary form: Not fiction ; Audience: Specialized; Publisher: Indianapolis, Ind. : Wiley, c2011Accession number(s): 201103240018, 201107250001.Availability: Items available for loan: Main Campus [Call number: HM 668 H326S] (1).

115. Books
Solaris security

by Gregory, Peter H.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Upper Saddle River, N.J. : Sun Microsystems Press, 2000Accession number(s): 150620000012, 150620000013.Availability: No items available

116. Books
Stealing the network : how to own an identity / Raven Alder ... [et. al]

by Alder, Raven.

Material type: book Book; Literary form: Not fiction ; Audience: Specialized; Publisher: Rockland, Mass. : Syngress, c2005Accession number(s): 200511190008.Availability: Items available for loan: Main Campus [Call number: QA76.9 .A25 S732] (1).

117. Books
The art of software security testing : identifying software security flaws / Chris Wysopal ... [et al.]

by Wysopal, Chris.

Material type: book Book; Literary form: Not fiction ; Audience: Specialized; Publisher: Upper Saddle River, N.J. : Addison-Wesley, c2007Accession number(s): 200807260048.Availability: Items available for loan: Main Campus [Call number: QA76.9 .A25 A776] (1).

118. Books
The basics of digital privacy : simple tools to protect your personal information and your identity online / Denny Cherry ; technical editor Thomas LaRock.

by Cherry, Denny [author] | LaRock, Thomas [technical editor].

Material type: book Book; Format: print ; Literary form: Not fiction ; Audience: Specialized; Copyright date: Amsterdam : Elsevier, ©2014Accession number(s): 2016000004780.Availability: Items available for loan: Main Campus [Call number: QA76.9.A25 C437B 2014] (1).

119. Books
The disaster recovery handbook : a step-by-step plan to ensure business continuity and protect vital operations, facilities, and assets / Michael Wallace, Lawrence Webber.

by Wallace, Michael, 1960- | Webber, Lawrence.

Edition: 2nd edMaterial type: book Book; Format: print ; Literary form: Not fiction ; Audience: Specialized; Publisher: New York, N.Y. : AMACOM, c2011Accession number(s): 201306040128.Availability: Items available for loan: Main Campus [Call number: HD49 W344D 2011] (1).

120. Books
The law and economics of cybersecurity / edited by Mark F. Grady, Francesco Parisi

by Grady, Mark F [ed.] | Parisi, Francesco, 1962- [ed.].

Material type: book Book; Literary form: Not fiction ; Audience: Specialized; Publisher: Cambridge : Cambridge Univ. Press, 2006Accession number(s): 200607150018.Availability: Items available for loan: Main Campus [Call number: K564 .C6 L382] (1).


- Copyright © 2022 Library and Learning Space -

Powered by Koha