Refine your search

Your search returned 851 results.

|
1.
OSSEC Host-Based Intrusion Detection Guide.

by Bray, Rory | Cid, Daniel | Hay, Andrew.

Material type: Text Text; Format: electronic regular print Publisher: : Elsevier Science, 2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.A25 H387 2008.
2.
Securing Citrix XenApp Server in the Enterprise.

by Azad, Tariq.

Material type: Text Text; Format: electronic regular print Publisher: Burlington : Elsevier Science, 2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.C55S369 2008.
3.
TechnoSecurity's Guide to E-Discovery and Digital Forensics : A Comprehensive Handbook

by Wiles, Jack.

Material type: Text Text; Format: electronic regular print Publisher: : Elsevier Science, 2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: HV8079.C65 W53 2007.
4.
Managing Information Security.

by Vacca, John R.

Material type: Text Text; Format: electronic regular print Publisher: Burlington : Elsevier Science, 2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.A25 M31845 2010.
5.
Managed Code Rootkits : Hooking into Runtime Environments

by Metula, Erez.

Material type: Text Text; Format: electronic regular print Publisher: Saint Louis : Elsevier Science, 2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.A25 M487 2010.
6.
Cyber Attacks : Protecting National Infrastructure

by Amoroso, Edward.

Material type: Text Text; Format: electronic regular print Publisher: Saint Louis : Elsevier Science, 2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: HV6773.2 .A47 2011.
7.
Web Application Obfuscation : '-/WAFs..Evasion..Filters//alert(/Obfuscation/)-'

by Heiderich, Mario | Vela Nava, Eduardo Alberto | Heyes, Gareth | Lindsay, David.

Material type: Text Text; Format: electronic regular print Publisher: Saint Louis : Elsevier Science, 2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.625.
8.
Ninja Hacking : Unconventional Penetration Testing Tactics and Techniques

by Wilhelm, Thomas | Andress, Jason.

Material type: Text Text; Format: electronic regular print Publisher: Saint Louis : Elsevier Science, 2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.A25W548 2011.
9.
Windows Registry Forensics : Advanced Digital Forensic Analysis of the Windows Registry

by Carvey, Harlan.

Material type: Text Text; Format: electronic regular print Publisher: Saint Louis : Elsevier Science, 2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: HV8079.C65C373 2011.
10.
Securing the Cloud : Cloud Computer Security Techniques and Tactics

by Winkler, Vic (J.R.).

Material type: Text Text; Format: electronic regular print Publisher: Saint Louis : Elsevier Science, 2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.585 .W56 2011.
11.
The Basics of Information Security : Understanding the Fundamentals of InfoSec in Theory and Practice

by Andress, Jason.

Material type: Text Text; Format: electronic regular print Publisher: Saint Louis : Elsevier Science, 2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.A25 A5453 2011.
12.
Thor's Microsoft Security Bible : A Collection of Practical Security Techniques

by Mullen, Timothy ""Thor"".

Material type: Text Text; Format: electronic regular print Publisher: Saint Louis : Elsevier Science, 2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.
13.
Low Tech Hacking : Street Smarts for Security Professionals

by Wiles, Jack | Gudaitis, Terry | Jabbusch, Jennifer | Rogers, Russ | Lowther, Sean.

Material type: Text Text; Format: electronic regular print Publisher: St. Louis : Elsevier Science, 2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: TK5102.85.
14.
PKI Security Solutions for the Enterprise : Solving HIPAA, E-Paper Act, and Other Compliance Issues

by Raina, Kapil.

Material type: Text Text; Format: electronic available online remote Publisher: Hoboken : Wiley, 2044Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.A25.R345 2003eb.
15.
The Ransomware Threat Landscape : Prepare for, Recognise and Survive Ransomware Attacks.

by Calder, Alan.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Ely : IT Governance Ltd, 2021Online access: Click here to view this ebook. Availability: No items available :
16.
La Sécurité Logicielle.

by Khoury, Raphaël.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Quebec : Les Presses de l'Université Laval, 2021Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.76.P76.
17.
A vulnerable system the history of information security in the computer age Andrew J. Stewart

by Stewart, Andrew, 1975-.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.A25 S755 2021.
18.
The Internet in Everything [electronic resource] : Freedom and Security in a World with No off Switch.

by DeNardis, Laura.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: New Haven : Yale University Press, 2020Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: HM851.
19.
ISO/IEC 27701.

by Shipman, Alan | Watkins, Steve.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Ely : IT Governance Ltd, 2020Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.A25.
20.
Futureproof : security aesthetics and the management of life / edited by D. Asher Ghertner, Hudson McFann, and Daniel M. Goldstein.

by Ghertner, D. Asher [editor.] | McFann, Hudson, 1987- [editor.] | Goldstein, Daniel M, 1965- [editor.].

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Durham : Duke University Press, 2020Copyright date: ©2020Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: JC571 .F887 2020.