Your search returned 337 results. Subscribe to this search

|
1. OSSEC Host-Based Intrusion Detection Guide.

by Bray, Rory | Cid, Daniel | Hay, Andrew.

Material type: Text Text; Format: electronic regular print Publisher: : Elsevier Science, 2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online QA76.9.A25 H387 2008.
2. TechnoSecurity's Guide to E-Discovery and Digital Forensics : A Comprehensive Handbook

by Wiles, Jack.

Material type: Text Text; Format: electronic regular print Publisher: : Elsevier Science, 2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online HV8079.C65 W53 2007.
3. Managing Information Security.

by Vacca, John R.

Material type: Text Text; Format: electronic regular print Publisher: Burlington : Elsevier Science, 2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online QA76.9.A25 M31845 2010.
4. Network and System Security.

by Vacca, John R.

Material type: Text Text; Format: electronic regular print Publisher: Burlington : Elsevier Science, 2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online TK5105.59.N48 2010.
5. Windows Registry Forensics : Advanced Digital Forensic Analysis of the Windows Registry

by Carvey, Harlan.

Material type: Text Text; Format: electronic regular print Publisher: Saint Louis : Elsevier Science, 2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online HV8079.C65C373 2011.
6. Security Risk Management : Building an Information Security Risk Management Program from the Ground Up

by Wheeler, Evan.

Material type: Text Text; Format: electronic regular print Publisher: Saint Louis : Elsevier Science, 2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online TK5105.59.W48 2011.
7. Securing the Cloud : Cloud Computer Security Techniques and Tactics

by Winkler, Vic (J.R.).

Material type: Text Text; Format: electronic regular print Publisher: Saint Louis : Elsevier Science, 2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online QA76.585 .W56 2011.
8. The Basics of Information Security : Understanding the Fundamentals of InfoSec in Theory and Practice

by Andress, Jason.

Material type: Text Text; Format: electronic regular print Publisher: Saint Louis : Elsevier Science, 2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online QA76.9.A25 A5453 2011.
9. Thor's Microsoft Security Bible : A Collection of Practical Security Techniques

by Mullen, Timothy ""Thor"".

Material type: Text Text; Format: electronic regular print Publisher: Saint Louis : Elsevier Science, 2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online QA76.9.
10. Cyber Attacks : Protecting National Infrastructure, STUDENT EDITION

by Amoroso, Edward.

Material type: Text Text; Format: electronic regular print Publisher: : Elsevier Science, 2012Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online HV6773.2.
11. PKI Security Solutions for the Enterprise : Solving HIPAA, E-Paper Act, and Other Compliance Issues

by Raina, Kapil.

Material type: Text Text; Format: electronic available online remote Publisher: Hoboken : Wiley, 2044Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online QA76.9.A25.R345 2003eb.
12. Social Network Forensics, Cyber Security, and Machine Learning.

by Krishna, P. Venkata | Gurumoorthy, Sasikumar | Obaidat, Mohammad S.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Singapore : Springer, 2019Copyright date: ©2019Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online TA1-2040.
13. Security in IoT-Enabled Spaces.

by Al-Turjman, Fadi.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Milton : CRC Press LLC, 2019Copyright date: ©2019Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online TK5105.8857 .A488 2019.
14. Guide to Vulnerability Analysis for Computer Networks and Systems : An Artificial Intelligence Approach.

by Parkinson, Simon | Crampton, Andrew | Hill, Richard.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Cham : Springer, 2018Copyright date: ©2018Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online QA75.5-76.95.
15. Information Security Practices : Emerging Threats and Perspectives.

by Traore, Issa | Awad, Ahmed | Woungang, Isaac.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Cham : Springer International Publishing, 2017Copyright date: ©2017Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online TK5105.59.I546 2017.
16. Official (ISC)2® Guide to the ISSAP® CBK, Second Edition.

by Corporate, (ISC)².

Edition: 2nd ed.Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Philadelphia, PA : CRC Press, 2017Copyright date: ©2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online TK5105.59 -- .O34 2014.
17. The Cybersecurity Dilemma : Hacking, Trust and Fear Between Nations.

by Buchanan, Ben.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Oxford : Oxford University Press, 2017Copyright date: ©2017Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online TK5105.59.B834 2016.
18. Security management in mobile cloud computing / Kashif Munir, editor.

by Munir, Kashif, 1976- [editor.] | IGI Global [publisher.].

Material type: Text Text; Format: available online remote; Literary form: Not fiction ; Audience: Specialized; Publisher: Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, PA 17033, USA) : IGI Global, [2017]Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online QA76.585 .S444 2017.
19. Online banking security measures and data protection / Shadi A. Aljawarneh, editor.

by Aljawarneh, Shadi [editor.] | IGI Global [publisher.].

Material type: Text Text; Format: available online remote; Literary form: Not fiction ; Audience: Specialized; Publisher: Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, PA 17033, USA) : IGI Global, [2017]Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online HG1708.7 .O55 2017.
20. Cybersecurity breaches and issues surrounding online threat protection / Michelle Moore [editor].

by Moore, Michelle [editor.] | IGI Global [publisher.].

Material type: Text Text; Format: available online remote; Literary form: Not fiction ; Audience: Specialized; Publisher: Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, PA 17033, USA) : IGI Global, [2017]Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online TK5105.59 .C93 2017.