Your search returned 823 results. Subscribe to this search

|
1. OSSEC Host-Based Intrusion Detection Guide.

by Bray, Rory | Cid, Daniel | Hay, Andrew.

Material type: Text Text; Format: electronic regular print Publisher: : Elsevier Science, 2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online QA76.9.A25 H387 2008.
2. TechnoSecurity's Guide to E-Discovery and Digital Forensics : A Comprehensive Handbook

by Wiles, Jack.

Material type: Text Text; Format: electronic regular print Publisher: : Elsevier Science, 2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online HV8079.C65 W53 2007.
3. Managing Information Security.

by Vacca, John R.

Material type: Text Text; Format: electronic regular print Publisher: Burlington : Elsevier Science, 2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online QA76.9.A25 M31845 2010.
4. Network and System Security.

by Vacca, John R.

Material type: Text Text; Format: electronic regular print Publisher: Burlington : Elsevier Science, 2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online TK5105.59.N48 2010.
5. Wireless Networking Complete.

by Zheng, Pei | Peterson, Larry L | Davie, Bruce S | Farrel, Adrian.

Material type: Text Text; Format: electronic regular print Publisher: Burlington : Elsevier Science, 2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online TK5103.2.W5735188 2010.
6. Citrix XenDesktop Implementation : A Practical Guide for IT Professionals

by James, Gareth R.

Material type: Text Text; Format: electronic regular print Publisher: Saint Louis : Elsevier Science, 2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online TK5105.597.J356 2010.
7. Windows Registry Forensics : Advanced Digital Forensic Analysis of the Windows Registry

by Carvey, Harlan.

Material type: Text Text; Format: electronic regular print Publisher: Saint Louis : Elsevier Science, 2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online HV8079.C65C373 2011.
8. Security Risk Management : Building an Information Security Risk Management Program from the Ground Up

by Wheeler, Evan.

Material type: Text Text; Format: electronic regular print Publisher: Saint Louis : Elsevier Science, 2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online TK5105.59.W48 2011.
9. Securing the Cloud : Cloud Computer Security Techniques and Tactics

by Winkler, Vic (J.R.).

Material type: Text Text; Format: electronic regular print Publisher: Saint Louis : Elsevier Science, 2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online QA76.585 .W56 2011.
10. The Basics of Information Security : Understanding the Fundamentals of InfoSec in Theory and Practice

by Andress, Jason.

Material type: Text Text; Format: electronic regular print Publisher: Saint Louis : Elsevier Science, 2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online QA76.9.A25 A5453 2011.
11. Thor's Microsoft Security Bible : A Collection of Practical Security Techniques

by Mullen, Timothy ""Thor"".

Material type: Text Text; Format: electronic regular print Publisher: Saint Louis : Elsevier Science, 2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online QA76.9.
12. Private Cloud Computing : Consolidation, Virtualization, and Service-Oriented Infrastructure

by Smoot, Stephen R | Tan, Nam K.

Material type: Text Text; Format: electronic regular print Publisher: Saint Louis : Elsevier Science, 2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online QA76.585.
13. Network Coding : Fundamentals and Applications

by Medard, Muriel | Sprintson, Alex.

Material type: Text Text; Format: electronic regular print Publisher: St. Louis : Elsevier Science, 2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online TK5105 .H585 2011.
14. Cyber Attacks : Protecting National Infrastructure, STUDENT EDITION

by Amoroso, Edward.

Material type: Text Text; Format: electronic regular print Publisher: : Elsevier Science, 2012Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online HV6773.2.
15. Juniper and Cisco Routing : Policy and Protocols for Multivendor IP Networks

by Goralski, Walter J.

Material type: Text Text; Format: electronic available online remote Publisher: Hoboken : Wiley, 2085Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online TK5105.585.G665 2002eb.
16. Mastering JXTA : Building Java Peer-to-Peer Applications

by Gradecki, Joseph D.

Material type: Text Text; Format: electronic available online remote Publisher: Hoboken : Wiley, 2085Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online TK5105.568.G73 2002eb.
17. PKI Security Solutions for the Enterprise : Solving HIPAA, E-Paper Act, and Other Compliance Issues

by Raina, Kapil.

Material type: Text Text; Format: electronic available online remote Publisher: Hoboken : Wiley, 2044Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online QA76.9.A25.R345 2003eb.
18. Social Network Forensics, Cyber Security, and Machine Learning.

by Krishna, P. Venkata | Gurumoorthy, Sasikumar | Obaidat, Mohammad S.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Singapore : Springer, 2019Copyright date: ©2019Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online TA1-2040.
19. The Internet of People, Things and Services : Workplace Transformations.

by Simmers, Claire A | Anandarajan, Murugan.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Milton : Routledge, 2018Copyright date: ©2018Online access: Click here to view book Availability: Items available for loan: UT Tyler Online (1). Location(s): Online HD7261 .I584 2018.
20. Guide to Vulnerability Analysis for Computer Networks and Systems : An Artificial Intelligence Approach.

by Parkinson, Simon | Crampton, Andrew | Hill, Richard.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Cham : Springer, 2018Copyright date: ©2018Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online QA75.5-76.95.