Refine your search

Your search returned 636 results.

|
101.
Risk Centric Threat Modeling : Process for Attack Simulation and Threat Analysis

by UcedaVelez, Tony | Morana, Marco M.

Material type: Text Text; Format: electronic available online remote Publisher: Hoboken : Wiley, 2015Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: HF5548.37 .M67 2015.
102.
Securing SQL Server : Protecting Your Database from Attackers

by Cherry, Denny.

Edition: 3rd ed.Material type: Text Text; Format: electronic available online remote Publisher: Saint Louis : Elsevier Science, 2015Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.73.S67 C478 2015.
103.
Official (ISC)2® Guide to the ISSMP® CBK®, Second Edition.

by Corporate, (ISC)².

Edition: 2nd ed.Material type: Text Text; Format: electronic available online remote Publisher: Hoboken : Taylor and Francis, 2015Online access: Click here to view this ebook. Availability: No items available :
104.
Python Passive Network Mapping : P2NMAP

by Hosmer, Chet.

Material type: Text Text; Format: electronic available online remote Publisher: Rockland, MA : Elsevier Science, 2015Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.
105.
Risk Analysis and Security Countermeasure Selection, Second Edition.

by Norman, Thomas L. CPP/PSP/CSC.

Edition: 2nd ed.Material type: Text Text; Format: electronic available online remote Publisher: Hoboken : CRC Press, 2015Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: HV8290 .N67 2015.
106.
Network Attacks and Exploitation : A Framework

by Monte, Matthew.

Material type: Text Text; Format: electronic available online remote Publisher: Hoboken : Wiley, 2015Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: TK5105.59.
107.
Introduction to Network Security : Theory and Practice

by Wang, Jie | Kissel, Zachary A.

Edition: 2nd ed.Material type: Text Text; Format: electronic available online remote Publisher: Hoboken : Wiley, 2015Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: TK5105.59 .W356 2015.
108.
Cloud Storage Security : A Practical Guide

by Wheeler, Aaron | Winburn, Michael.

Material type: Text Text; Format: electronic available online remote Publisher: : Elsevier Science, 2015Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: TK5105.88813.
109.
The Network Security Test Lab : A Step-by-Step Guide

by Gregg, Michael.

Material type: Text Text; Format: electronic available online remote Publisher: Hoboken : Wiley, 2015Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.A25.
110.
Group Policy : Fundamentals, Security, and the Managed Desktop

by Moskowitz, Jeremy.

Edition: 3rd ed.Material type: Text Text; Format: electronic available online remote Publisher: Hoboken : Wiley, 2015Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.77.
111.
Dissecting the Hack : The V3rb0t3n Network

by Street, Jayson E.

Material type: Text Text; Format: electronic available online remote Publisher: : Elsevier Science, 2015Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: HV8079.C65 S856 2015.
112.
Security of Block Ciphers : From Algorithm Design to Hardware Implementation

by Sakiyama, Kazuo | Sasaki, Yu | Li, Yang.

Material type: Text Text; Format: electronic available online remote Publisher: Hoboken : Wiley, 2015Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9 .A25 S256 2015.
113.
Infosec Management Fundamentals.

by Dalziel, Henry.

Material type: Text Text; Format: electronic available online remote Publisher: : Elsevier Science, 2015Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.
114.
Computer security : principles and practice / William Stallings, Lawrie Brown, UNSW Canberra at the Australian Defence Force Academy.

by Stallings, William [author.] | Brown, Lawrie [author.].

Edition: Third edition.Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: Boston : Pearson, [2015]Availability: Items available for loan: University of Texas At Tyler (1). Location(s): Stacks - 3rd Floor Call number: QA76.9.A25 S685 2015.
115.
Understanding Network Hacks : Attack and Defense with Python

by Ballmann, Bastian.

Material type: Text Text; Format: electronic available online remote Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg, 2015Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA75.5-76.95.
116.
Secure and Resilient Software Development.

by Merkow, Mark S | Raghavan, Lakshmikanth.

Material type: Text Text; Format: electronic available online remote Publisher: London : CRC Press, 2015Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.76.D47 -- M466 2010eb.
117.
Industrial Network Security : Securing Critical Infrastructure Networks for Smart Grid, SCADA, and Other Industrial Control Systems

by Knapp, Eric D | Langill, Joel Thomas.

Edition: 2nd ed.Material type: Text Text; Format: electronic available online remote Publisher: Saint Louis : Elsevier Science, 2015Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.A25 -- .K537 2015eb.
118.
Security Intelligence : A Practitioner's Guide to Solving Enterprise Security Challenges

by Li, Qing | Clark, Gregory.

Material type: Text Text; Format: electronic available online remote Publisher: Somerset : Wiley, 2015Online access: Click here to view this ebook. Availability: No items available :
119.
Secure multiparty computation and secret sharing / Ronald Cramer, Ivan Bjerre Damgaard, Jesper Buus Nielsen.

by Cramer, Ronald, 1968- [author.] | Damgaard, Ivan, 1956- [author.] | Nielsen, Jesper Buus, 1973- [author.].

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: New York, NY : Cambridge University Press, 2015Copyright date: ©2015Availability: Items available for loan: University of Texas At Tyler (1). Location(s): Stacks - 3rd Floor Call number: TK5105.59 .C685 2015.
120.
Computer Forensics JumpStart.

by Solomon, Micah | Barrett, Diane | Broom, Neil.

Material type: Text Text; Format: electronic available online remote Publisher: Alameda : Wiley, 2015Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.A25 -- S6556 2005eb.