Refine your search

Your search returned 406 results.

|
1.
OSSEC Host-Based Intrusion Detection Guide.

by Bray, Rory | Cid, Daniel | Hay, Andrew.

Material type: Text Text; Format: electronic regular print Publisher: : Elsevier Science, 2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.A25 H387 2008.
2.
TechnoSecurity's Guide to E-Discovery and Digital Forensics : A Comprehensive Handbook

by Wiles, Jack.

Material type: Text Text; Format: electronic regular print Publisher: : Elsevier Science, 2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: HV8079.C65 W53 2007.
3.
Managing Information Security.

by Vacca, John R.

Material type: Text Text; Format: electronic regular print Publisher: Burlington : Elsevier Science, 2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.A25 M31845 2010.
4.
Network and System Security.

by Vacca, John R.

Material type: Text Text; Format: electronic regular print Publisher: Burlington : Elsevier Science, 2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: TK5105.59.N48 2010.
5.
Windows Registry Forensics : Advanced Digital Forensic Analysis of the Windows Registry

by Carvey, Harlan.

Material type: Text Text; Format: electronic regular print Publisher: Saint Louis : Elsevier Science, 2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: HV8079.C65C373 2011.
6.
Security Risk Management : Building an Information Security Risk Management Program from the Ground Up

by Wheeler, Evan.

Material type: Text Text; Format: electronic regular print Publisher: Saint Louis : Elsevier Science, 2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: TK5105.59.W48 2011.
7.
Securing the Cloud : Cloud Computer Security Techniques and Tactics

by Winkler, Vic (J.R.).

Material type: Text Text; Format: electronic regular print Publisher: Saint Louis : Elsevier Science, 2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.585 .W56 2011.
8.
The Basics of Information Security : Understanding the Fundamentals of InfoSec in Theory and Practice

by Andress, Jason.

Material type: Text Text; Format: electronic regular print Publisher: Saint Louis : Elsevier Science, 2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.A25 A5453 2011.
9.
Thor's Microsoft Security Bible : A Collection of Practical Security Techniques

by Mullen, Timothy ""Thor"".

Material type: Text Text; Format: electronic regular print Publisher: Saint Louis : Elsevier Science, 2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.
10.
Cyber Attacks : Protecting National Infrastructure, STUDENT EDITION

by Amoroso, Edward.

Material type: Text Text; Format: electronic regular print Publisher: : Elsevier Science, 2012Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: HV6773.2.
11.
PKI Security Solutions for the Enterprise : Solving HIPAA, E-Paper Act, and Other Compliance Issues

by Raina, Kapil.

Material type: Text Text; Format: electronic available online remote Publisher: Hoboken : Wiley, 2044Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.A25.R345 2003eb.
12.
A vulnerable system the history of information security in the computer age Andrew J. Stewart

by Stewart, Andrew, 1975-.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.A25 S755 2021.
13.
Ad Hoc Networks : 11th EAI International Conference, ADHOCNETS 2019, Queenstown, New Zealand, November 18-21, 2019, Proceedings.

by Zheng, Jun | Li, Cheng | Chong, Peter Han Joo | Meng, Weixiao | Yan, Feng.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Cham : Springer International Publishing AG, 2020Copyright date: ©2019Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: TK5105.59 .A3 2019.
14.
Cross-Site Scripting Attacks : Classification, Attack, and Countermeasures.

by Gupta, B. B | Chaudhary, Pooja.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Milton : Taylor & Francis Group, 2020Copyright date: ©2020Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: TK5105.59 .G878 2020.
15.
The Security of Critical Infrastructures : Risk, Resilience and Defense.

by Keupp, Marcus Matthias.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Cham : Springer International Publishing AG, 2020Copyright date: ©2020Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: HF4999.2-6182.
16.
Information Systems Security and Privacy : 5th International Conference, ICISSP 2019, Prague, Czech Republic, February 23-25, 2019, Revised Selected Papers.

by Mori, Paolo | Furnell, Steven | Camp, Olivier.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Cham : Springer International Publishing AG, 2020Copyright date: ©2020Online access: Click here to view this ebook. Availability: No items available :
17.
Information Systems Security and Privacy : 5th International Conference, ICISSP 2019, Prague, Czech Republic, February 23-25, 2019, Revised Selected Papers.

by Mori, Paolo | Furnell, Steven | Camp, Olivier.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Cham : Springer International Publishing AG, 2020Copyright date: ©2020Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: TK5105.59 .I546 2020.
18.
Human Aspects of Information Security and Assurance : 14th IFIP WG 11. 12 International Symposium, HAISA 2020, Mytilene, Lesbos, Greece, July 8-10, 2020, Proceedings.

by Clarke, Nathan | Furnell, Steven.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Cham : Springer International Publishing AG, 2020Copyright date: ©2020Online access: Click here to view this ebook. Availability: No items available :
19.
Human Aspects of Information Security and Assurance : 14th IFIP WG 11. 12 International Symposium, HAISA 2020, Mytilene, Lesbos, Greece, July 8-10, 2020, Proceedings.

by Clarke, Nathan | Furnell, Steven.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Cham : Springer International Publishing AG, 2020Copyright date: ©2020Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA75.5-76.95.
20.
The domains of identity a framework for understanding identity systems in contemporary society Kaliya Young

by Young, Kaliya [author].

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: London Anthem Press 2020Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: BF697.5.S44.