Your search returned 72 results.

|
1.
Managed Code Rootkits : Hooking into Runtime Environments

by Metula, Erez.

Material type: Text Text; Format: electronic regular print Publisher: Saint Louis : Elsevier Science, 2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.A25 M487 2010.
2.
Innovative solutions for access control management / Ahmad Kamran Malik, Adeel Anjum and Basit Raza, editors.

by Malik, Ahmad Kamran, 1973- [editor.] | Anjum, Adeel, 1982- [editor.] | Raza, Basit, 1976- [editor.] | IGI Global [publisher.].

Material type: Text Text; Format: available online remote; Literary form: Not fiction ; Audience: Specialized; Publisher: Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, PA 17033, USA) : IGI Global, [2016]Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.D314 I57 2016.
3.
Research and Development in Intelligent Systems XXXIII : Incorporating Applications and Innovations in Intelligent Systems XXIV

by Bramer, Max | Petridis, Miltos.

Material type: Text Text; Format: electronic available online remote Publisher: Cham : Springer International Publishing, 2016Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA75.5-76.95.
4.
Two-factor authentication / Mark Stanislav.

by Stanislav, Mark [author.].

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Ely, Cambridgeshire, United Kingdom : It Governance Publishing, 2015Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.
5.
The State of the Art in Intrusion Prevention and Detection.

by Pathan, Al-Sakib Khan.

Material type: Text Text; Format: electronic available online remote Publisher: Hoboken : Taylor and Francis, 2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.A25 S7354.
6.
Social Engineering Penetration Testing : Executing Social Engineering Pen Tests, Assessments and Defense

by Watson, Gavin | Mason, Andrew | Ackroyd, Richard.

Material type: Text Text; Format: electronic available online remote Publisher: Burlington : Elsevier Science, 2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.A25 .W38 2014.
7.
Integrated Security Systems Design : A Complete Reference for Building Enterprise-Wide Digital Security Systems

by Norman, Thomas L.

Edition: 2nd ed.Material type: Text Text; Format: electronic available online remote Publisher: Burlington : Elsevier Science, 2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: TK5105.59.
8.
Visual Cryptography for Image Processing and Security : Theory, Methods, and Applications

by Liu, Feng | Yan, Wei Qi.

Material type: Text Text; Format: electronic available online remote Publisher: Dordrecht : Springer, 2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9 .A25.
9.
Computers and Data Processing : International Edition

by Deitel, Harvey M | Deitel, Barbara.

Material type: Text Text; Format: electronic available online remote Publisher: Kent : Elsevier Science, 2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76 .D458 2014.
10.
Snort Intrusion Detection and Prevention Toolkit.

by Caswell, Brian | Beale, Jay | Baker, Andrew.

Material type: Text Text; Format: electronic available online remote Publisher: Burlington : Elsevier Science, 2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: TK5105.59.
11.
InfoSecurity 2008 Threat Analysis.

by Schiller, Craig | Fogie, Seth | DeRodeff, Colby | Gregg, Michael.

Material type: Text Text; Format: electronic available online remote Publisher: Burlington : Elsevier Science, 2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.D314 I565 2008.
12.
Managed Code Rootkits : Hooking into Runtime Environments.

by Metula, Erez.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Saint Louis : Elsevier Science, 2014Copyright date: ©2011Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.A25 -- M487 2010.
13.
Computer Security.

by Hsiao, David K | Kerr, Douglas S | Madnick, Stuart E | Ashenhurst, Robert L.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Saint Louis : Elsevier Science & Technology, 2014Copyright date: ©1979Online access: Click here to view book Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.A25 -- .H753 1979.
14.
Applied Computation and Security Systems : Volume One.

by Chaki, Rituparna | Chaki, Nabendu | Choudhury, Sankhayan | Saeed, Khalid.

Edition: 1st ed.Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: New Delhi : Springer, 2014Copyright date: ©2015Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: TA1-2040.
15.
Intrusion Detection Networks : A Key to Collaborative Security

by Fung, Carol | Boutaba, Raouf.

Material type: Text Text; Format: electronic available online remote Publisher: London : CRC Press, 2013Online access: Click here to view this ebook. Availability: No items available :
16.
The Basics of Digital Privacy : Simple Tools to Protect Your Personal Information and Your Identity Online

by Cherry, Denny.

Material type: Text Text; Format: electronic available online remote Publisher: Burlington : Elsevier Science, 2013Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9 .A25.
17.
Mastering Windows Server 2012 R2.

by Minasi, Mark | Greene, Kevin | Booth, Christian | Butler, Robert | McCabe, John | Panek, Robert | Rice, Michael | Roth, Stefan.

Material type: Text Text; Format: electronic available online remote Publisher: Hoboken : Wiley, 2013Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.76 .M384 2013.
18.
SystemC and SystemC-AMS in Practice : SystemC 2.3, 2.2 and SystemC-AMS 1.0

by Banerjee, Amal | Sur, Balmiki.

Material type: Text Text; Format: electronic available online remote Publisher: Dordrecht : Springer, 2013Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.
19.
Privacy solutions and security frameworks in information protection / Hamid R. Nemati, editor.

by Nemati, Hamid R, 1958- | IGI Global.

Material type: Text Text; Format: available online remote; Literary form: Not fiction ; Audience: Specialized; Publisher: Hershey, Pa. : IGI Global (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA), c2013Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: TK5105.59 .P758 2013.
20.
Mastering Microsoft Forefront UAG 2010 Customization.

by Ben-Ari, Erez | Amara, Rainier.

Material type: Text Text; Format: electronic available online remote Publisher: Birmingham : Packt Publishing, 2012Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: TK5105.59 .B384 2012.