Refine your search

Your search returned 636 results.

|
121.
Security of Block Ciphers : From Algorithm Design to Hardware Implementation

by Sakiyama, Kazuo | Sasaki, Yu | Li, Yang.

Material type: Text Text; Format: electronic available online remote Publisher: Hoboken : Wiley, 2015Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.A25 -- .S255 2015eb.
122.
Network Attacks and Exploitation : A Framework

by Monte, Matthew.

Material type: Text Text; Format: electronic available online remote Publisher: Hoboken : Wiley, 2015Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: HD30.38 -- .M668 2015eb.
123.
Handbook of research on digital crime, cyberspace security, and information assurance / Maria Manuela Cruz-Cunha and Irene Maria Portela, editors.

by Cruz-Cunha, Maria Manuela, 1964- [editor.] | Portela, Irene Maria, 1965- [editor.] | IGI Global [publisher.].

Material type: Text Text; Format: available online remote; Literary form: Not fiction ; Audience: Specialized; Publisher: Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pa., 17033, USA) : IGI Global, [2015]Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: HV6773 .H375 2015.
124.
Handbook of research on emerging developments in data privacy / Manish Gupta, editor.

by Gupta, Manish, 1978- [editor.] | IGI Global [publisher.].

Material type: Text Text; Format: available online remote; Literary form: Not fiction ; Audience: Specialized; Publisher: Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pa., 17033, USA) : IGI Global, [2015]Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: HF5548.37 .H37 2015.
125.
New threats and countermeasures in digital crime and cyber terrorism / Maurice Dawson and Marwan Omar, editors.

by Dawson, Maurice, 1982- [editor.] | Omar, Marwan, 1982- [editor.] | IGI Global [publisher.].

Material type: Text Text; Format: available online remote; Literary form: Not fiction ; Audience: Specialized; Publisher: Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, PA 17033, USA) : IGI Global, [2015]Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: HV6773 .N4745 2015.
126.
Cybersecurity policies and strategies for cyberwarfare prevention / Jean-Loup Richet, editor.

by Richet, Jean-Loup, 1988- [editor.] | IGI Global [publisher.].

Material type: Text Text; Format: available online remote; Literary form: Not fiction ; Audience: Specialized; Publisher: Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pa., 17033, USA) : IGI Global, [2015]Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: HV6773.15.C97 C923 2015.
127.
You : Protecting Your Personal Data and Privacy Online

by Sumner, Stuart.

Material type: Text Text; Format: electronic available online remote Publisher: : Elsevier Science, 2015Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: HF5548.37 S866 2015.
128.
Bent Functions : Results and Applications to Cryptography

by Tokareva, Natalia.

Material type: Text Text; Format: electronic available online remote Publisher: : Elsevier Science, 2015Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.A25.
129.
Enterprise Security Architecture : A Business-Driven Approach

by Sherwood, Nicholas A | Sherwood, John.

Material type: Text Text; Format: electronic available online remote Publisher: London : CRC Press, 2015Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.A25 -- .S466 2005eb.
130.
Securing Cyber-Physical Systems.

by Pathan, Al-Sakib Khan.

Material type: Text Text; Format: electronic available online remote Publisher: Portland : CRC Press, 2015Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.A25 -- .S438 2016eb.
131.
RIoT Control : Understanding and Managing Risks and the Internet of Things

by Macaulay, Tyson | Brown, Greg | Schneck, Phyllis.

Material type: Text Text; Format: electronic available online remote Publisher: San Francisco : Elsevier Science, 2015Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.A25.M33 2017.
132.
Data protection and the cloud : are the risks too great? / Paul Ticher.

by Ticher, Paul [author.].

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Cambridgeshire, England : IT Governance Publishing, 2015Copyright date: ©2015Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: HF5548.37 .T534 2015.
133.
Web application security is a stack : how to CYA (Cover Your Apps) completely / Lori Mac Vittie.

by Vittie, Lori Mac [author.].

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Cambridgeshire, England : IT Governance Publishing, 2015Copyright date: ©2015Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: TK5105.59 .V588 2015.
134.
Information Security A Practical Guide : Bridging the gap between IT and management.

by Mooney, Tom.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Ely : IT Governance Ltd, 2015Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: K3264.C65.
135.
The security consultant's handbook / Richard Bingley.

by Bingley, Richard [author.].

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Ely, Cambridgeshire, United Kingdom : IT Governance Publishing, 2015Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: HV8290.
136.
Application security in the ISO27001 environment / Vinod Vasudevan, Anoop Mangla, Firosh Ummer, Sachin Shetty, Sangita Pakala, Siddharth Anbalahan.

by Vinod, Vasudevan [author.] | Mangla, Anoopt [author.] | Ummer, Firosh [author.] | Shetty, Sachin [author.] | Pakala, Sangita [author.] | Anbalahan, Siddharth [author.].

Edition: Second edition.Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Ely, Cambridgeshire, United Kingdom : IT Governance Publishing, 2015Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.A25.
137.
PCI DSS : a pocket guide / Alan Calder, Geraint Williams.

by Calder, Alan, 1957- [author.] | Williams, Geraint [author.].

Edition: Fourth edition.Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Ely, Cambridgeshire, United Kingdom : It Governance Publishing, 2015Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.A25 C35 2015.
138.
Computer Security in Financial Organizations.

by Essinger, J.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Kent : Elsevier Science, 2015Copyright date: ©1990Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: HG4515.5 -- .E875 1990.
139.
RIoT Control : Understanding and Managing Risks and the Internet of Things.

by Macaulay, Tyson | Brown, Greg | Schneck, Phyllis.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: San Francisco : Elsevier Science, 2015Copyright date: ©2015Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.A25.M33 2017.
140.
Penetration Tester's Open Source Toolkit.

by Faircloth, Jeremy.

Edition: 4th ed.Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Rockland, MA : Elsevier Science, 2015Copyright date: ©2015Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: TK5105.59.F357 2017.