Refine your search

Your search returned 80 results.

|
1.
Managed Code Rootkits : Hooking into Runtime Environments

by Metula, Erez.

Material type: Text Text; Format: electronic regular print Publisher: Saint Louis : Elsevier Science, 2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.A25 M487 2010.
2.
The domains of identity a framework for understanding identity systems in contemporary society Kaliya Young

by Young, Kaliya [author].

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: London Anthem Press 2020Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: BF697.5.S44.
3.
Algebra, Codes and Cryptology : First International Conference, A2C 2019 in Honor of Prof. Mamadou Sanghare, Dakar, Senegal, December 5-7, 2019, Proceedings.

by Gueye, Cheikh Thiecoumba | Persichetti, Edoardo | Cayrel, Pierre-Louis | Buchmann, Johannes.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Cham : Springer International Publishing AG, 2019Copyright date: ©2019Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76 .A444 2019.
4.
Pervasive Systems, Algorithms and Networks : 16th International Symposium, I-SPAN 2019, Naples, Italy, September 16-20, 2019, Proceedings.

by Esposito, Christian | Hong, Jiman | Choo, Kim-Kwang Raymond.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Cham : Springer International Publishing AG, 2019Copyright date: ©2019Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.76.A65 .P478 2019.
5.
Broadband Communications, Networks, and Systems : 10th EAI International Conference, Broadnets 2019, Xi'an, China, October 27-28, 2019, Proceedings.

by Li, Qingshan | Song, Shengli | Li, Rui | Xu, Yueshen | Xi, Wei | Gao, Honghao.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Cham : Springer International Publishing AG, 2019Copyright date: ©2019Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: TK5105.597 .B763 2019.
6.
Advances in Cryptology - ASIACRYPT 2018 : 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2-6, 2018, Proceedings, Part III.

by Peyrin, Thomas | Galbraith, Steven.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Cham : Springer International Publishing AG, 2018Copyright date: ©2018Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA75.5-76.95.
7.
Advances in Information and Computer Security : 13th International Workshop on Security, IWSEC 2018, Sendai, Japan, September 3-5, 2018, Proceedings.

by Inomata, Atsuo | Yasuda, Kan.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Cham : Springer International Publishing AG, 2018Copyright date: ©2018Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.A25 .A383 2018.
8.
Innovative solutions for access control management / Ahmad Kamran Malik, Adeel Anjum and Basit Raza, editors.

by Malik, Ahmad Kamran, 1973- [editor.] | Anjum, Adeel, 1982- [editor.] | Raza, Basit, 1976- [editor.] | IGI Global [publisher.].

Material type: Text Text; Format: available online remote; Literary form: Not fiction ; Audience: Specialized; Publisher: Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, PA 17033, USA) : IGI Global, [2016]Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.D314 I57 2016.
9.
Research and Development in Intelligent Systems XXXIII : Incorporating Applications and Innovations in Intelligent Systems XXIV

by Bramer, Max | Petridis, Miltos.

Material type: Text Text; Format: electronic available online remote Publisher: Cham : Springer International Publishing, 2016Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA75.5-76.95.
10.
Information Security and Privacy : 21st Australasian Conference, ACISP 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part I.

by Liu, Joseph K | Steinfeld, Ron.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Cham : Springer International Publishing AG, 2016Copyright date: ©2016Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.A25 .I546 2016.
11.
Information Security and Privacy : 21st Australasian Conference, ACISP 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part II.

by Liu, Joseph K | Steinfeld, Ron.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Cham : Springer International Publishing AG, 2016Copyright date: ©2016Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.A25 .L585 2016.
12.
Two-factor authentication / Mark Stanislav.

by Stanislav, Mark [author.].

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Ely, Cambridgeshire, United Kingdom : It Governance Publishing, 2015Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.
13.
The State of the Art in Intrusion Prevention and Detection.

by Pathan, Al-Sakib Khan.

Material type: Text Text; Format: electronic available online remote Publisher: Hoboken : Taylor and Francis, 2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.A25 S7354.
14.
Social Engineering Penetration Testing : Executing Social Engineering Pen Tests, Assessments and Defense

by Watson, Gavin | Mason, Andrew | Ackroyd, Richard.

Material type: Text Text; Format: electronic available online remote Publisher: Burlington : Elsevier Science, 2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.A25 .W38 2014.
15.
Integrated Security Systems Design : A Complete Reference for Building Enterprise-Wide Digital Security Systems

by Norman, Thomas L.

Edition: 2nd ed.Material type: Text Text; Format: electronic available online remote Publisher: Burlington : Elsevier Science, 2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: TK5105.59.
16.
Visual Cryptography for Image Processing and Security : Theory, Methods, and Applications

by Liu, Feng | Yan, Wei Qi.

Material type: Text Text; Format: electronic available online remote Publisher: Dordrecht : Springer, 2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9 .A25.
17.
Computers and Data Processing : International Edition

by Deitel, Harvey M | Deitel, Barbara.

Material type: Text Text; Format: electronic available online remote Publisher: Kent : Elsevier Science, 2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76 .D458 2014.
18.
Snort Intrusion Detection and Prevention Toolkit.

by Caswell, Brian | Beale, Jay | Baker, Andrew.

Material type: Text Text; Format: electronic available online remote Publisher: Burlington : Elsevier Science, 2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: TK5105.59.
19.
InfoSecurity 2008 Threat Analysis.

by Schiller, Craig | Fogie, Seth | DeRodeff, Colby | Gregg, Michael.

Material type: Text Text; Format: electronic available online remote Publisher: Burlington : Elsevier Science, 2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.D314 I565 2008.
20.
Managed Code Rootkits : Hooking into Runtime Environments.

by Metula, Erez.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Saint Louis : Elsevier Science, 2014Copyright date: ©2011Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.A25 -- M487 2010.