Your search returned 562 results. Subscribe to this search

|
1. OSSEC Host-Based Intrusion Detection Guide.

by Bray, Rory | Cid, Daniel | Hay, Andrew.

Material type: Text Text; Format: electronic regular print Publisher: : Elsevier Science, 2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online QA76.9.A25 H387 2008.
Place hold Log in to add tags.
2. Securing Citrix XenApp Server in the Enterprise.

by Azad, Tariq.

Material type: Text Text; Format: electronic regular print Publisher: Burlington : Elsevier Science, 2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online QA76.9.C55S369 2008.
3. TechnoSecurity's Guide to E-Discovery and Digital Forensics : A Comprehensive Handbook

by Wiles, Jack.

Material type: Text Text; Format: electronic regular print Publisher: : Elsevier Science, 2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online HV8079.C65 W53 2007.
4. Managing Information Security.

by Vacca, John R.

Material type: Text Text; Format: electronic regular print Publisher: Burlington : Elsevier Science, 2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online QA76.9.A25 M31845 2010.
5. Managed Code Rootkits : Hooking into Runtime Environments

by Metula, Erez.

Material type: Text Text; Format: electronic regular print Publisher: Saint Louis : Elsevier Science, 2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online QA76.9.A25 M487 2010.
6. Cyber Attacks : Protecting National Infrastructure

by Amoroso, Edward.

Material type: Text Text; Format: electronic regular print Publisher: Saint Louis : Elsevier Science, 2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online HV6773.2 .A47 2011.
7. Web Application Obfuscation : '-/WAFs..Evasion..Filters//alert(/Obfuscation/)-'

by Heiderich, Mario | Vela Nava, Eduardo Alberto | Heyes, Gareth | Lindsay, David.

Material type: Text Text; Format: electronic regular print Publisher: Saint Louis : Elsevier Science, 2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online QA76.625.
8. Ninja Hacking : Unconventional Penetration Testing Tactics and Techniques

by Wilhelm, Thomas | Andress, Jason.

Material type: Text Text; Format: electronic regular print Publisher: Saint Louis : Elsevier Science, 2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online QA76.9.A25W548 2011.
9. Windows Registry Forensics : Advanced Digital Forensic Analysis of the Windows Registry

by Carvey, Harlan.

Material type: Text Text; Format: electronic regular print Publisher: Saint Louis : Elsevier Science, 2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online HV8079.C65C373 2011.
10. Securing the Cloud : Cloud Computer Security Techniques and Tactics

by Winkler, Vic (J.R.).

Material type: Text Text; Format: electronic regular print Publisher: Saint Louis : Elsevier Science, 2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online QA76.585 .W56 2011.
11. The Basics of Information Security : Understanding the Fundamentals of InfoSec in Theory and Practice

by Andress, Jason.

Material type: Text Text; Format: electronic regular print Publisher: Saint Louis : Elsevier Science, 2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online QA76.9.A25 A5453 2011.
12. Thor's Microsoft Security Bible : A Collection of Practical Security Techniques

by Mullen, Timothy ""Thor"".

Material type: Text Text; Format: electronic regular print Publisher: Saint Louis : Elsevier Science, 2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online QA76.9.
13. Low Tech Hacking : Street Smarts for Security Professionals

by Wiles, Jack | Gudaitis, Terry | Jabbusch, Jennifer | Rogers, Russ | Lowther, Sean.

Material type: Text Text; Format: electronic regular print Publisher: St. Louis : Elsevier Science, 2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online TK5102.85.
14. PKI Security Solutions for the Enterprise : Solving HIPAA, E-Paper Act, and Other Compliance Issues

by Raina, Kapil.

Material type: Text Text; Format: electronic available online remote Publisher: Hoboken : Wiley, 2044Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online QA76.9.A25.R345 2003eb.
15. Cryptography for Internet and Database Applications : Developing Secret and Public Key Techniques with Java

by Galbreath, Nicholas | Galbreath, Nick.

Material type: Text Text; Format: electronic available online remote Publisher: Hoboken : Wiley, 2019Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online QA76.9.A25.G35 2002eb.
16. Mastering Web Services Security.

by Hartman, Bret | Flinn, Donald J | Beznosov, Konstantin.

Material type: Text Text; Format: electronic available online remote Publisher: Hoboken : Wiley, 2019Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online QA76.9.A25.M375 2003eb.
17. Official (ISC)2® Guide to the ISSAP® CBK, Second Edition.

by Corporate, (ISC)².

Edition: 2nd ed.Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Philadelphia, PA : CRC Press, 2017Copyright date: ©2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online TK5105.59 -- .O34 2014.
18. Feistel Ciphers : Security Proofs and Cryptanalysis.

by Nachef, Valerie | Patarin, Jacques | Volte, Emmanuel.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Cham : Springer International Publishing, 2017Copyright date: ©2017Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online QA76.9.A25.N334 2017.
19. Cybersecurity in France.

by Baumard, Philippe.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Cham : Springer International Publishing, 2017Copyright date: ©2017Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online QA75.5-76.95.
20. Predictive Computing and Information Security.

by Gupta, P.K | Tyagi, Vipin | Singh, S.K.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Singapore : Springer Singapore, 2017Copyright date: ©2017Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Q335.G878 2017.