Refine your search

Your search returned 636 results.

|
141.
Digital Privacy in the Marketplace : Perspectives on the Information Exchange.

by Milne, George.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: New York : Business Expert Press, 2015Copyright date: ©2015Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: TK5105.875.I57 -- M553 2015.
142.
Trusted Computing Platforms : TPM2. 0 in Context.

by Proudler, Graeme | Chen, Liqun | Dalton, Chris.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Cham : Springer, 2015Copyright date: ©2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.A25QA76.9.A25.
143.
CyberSecurity : Protecting Critical Infrastructures from Cyber Attack and Cyber Warfare.

by Johnson, Thomas A.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Oakville : Routledge, 2015Copyright date: ©2015Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.A25.C957 2015.
144.
Cyber Defense and Situational Awareness.

by Kott, Alexander | Erbacher, Robert F | Wang, Cliff.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Cham : Springer, 2015Copyright date: ©2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA75.5-76.95.
145.
Risk Analysis and Security Countermeasure Selection.

by Norman CPP/PSP/CSC, Thomas L.

Edition: 2nd ed.Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: London : Taylor & Francis Group, 2015Copyright date: ©2016Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: HV8290 .N67 2015.
146.
Securing Cyber-Physical Systems.

by Pathan, Al-Sakib Khan.

Edition: 1st ed.Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Portland : CRC Press LLC, 2015Copyright date: ©2016Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.A25 -- .S438 2016.
147.
Security Intelligence : A Practitioner's Guide to Solving Enterprise Security Challenges.

by Li, Qing | Clark, Gregory.

Edition: 1st ed.Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Somerset : John Wiley & Sons, Incorporated, 2015Copyright date: ©2015Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: TK5105.59.L52 2015.
148.
The Mobile Application Hacker's Handbook.

by Chell, Dominic | Erasmus, Tyrone | Colley, Shaun | Whitehouse, Ollie | Whitehouse, Ollie.

Edition: 1st ed.Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: New York : John Wiley & Sons, Incorporated, 2015Copyright date: ©2015Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.774.A53 .C384 2015.
149.
Network Attacks and Exploitation : A Framework.

by Monte, Matthew | Monte, Matthew.

Edition: 1st ed.Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Hoboken : John Wiley & Sons, Incorporated, 2015Copyright date: ©2015Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: HD30.38 -- .M668 2015.
150.
Applied Cryptography : Protocols, Algorithms and Source Code in C.

by Schneier, Bruce.

Edition: 20th ed.Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: New York : John Wiley & Sons, Incorporated, 2015Copyright date: ©1995Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.A25.S364 2015.
151.
Network Science and Cybersecurity.

by Pino, Robinson E.

Material type: Text Text; Format: electronic available online remote Publisher: Dordrecht : Springer, 2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9 .A25.
152.
Managing information security / edited by John R. Vacca.

by Vacca, John R.

Edition: 2nd ed.Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Amsterdam ; Waltham, MA : Syngress, 2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.A25.
153.
The State of the Art in Intrusion Prevention and Detection.

by Pathan, Al-Sakib Khan.

Material type: Text Text; Format: electronic available online remote Publisher: Hoboken : Taylor and Francis, 2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.A25 S7354.
154.
The basics of IT audit : purposes, processes, and practical information / Stephen D. Gantz.

by Gantz, Stephen D.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Waltham, MA : Syngress, 2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: T58.5 .G37 2013.
155.
Hacking with Kali : practical penetration testing techniques / James Broad, Andrew Bindner.

by Broad, James | Bindner, Andrew.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Waltham, MA : Elsevier Science, 2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.A25 .B384 2013.
156.
Malware forensic field guide for Linux systems : digital forensics field guides / Cameron H. Malin, Eoghan Casey, James M. Aquilina ; edited by Rob Maxwell.

by Malin, Cameron H [author.] | Aquilina, James M [author.] | Casey, Eoghan [author.] | Rose, Curtis W [editor of compilation.].

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Waltham, MA : Syngress, 2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.A25.
157.
Resource Optimization and Security for Cloud Services.

by Xiong , Kaiqi.

Material type: Text Text; Format: electronic available online remote Publisher: Hoboken : Wiley, 2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: TK5105.88813.
158.
The Browser Hacker's Handbook.

by Alcorn, Wade | Frichot, Christian | Orru, Michele.

Material type: Text Text; Format: electronic available online remote Publisher: Hoboken : Wiley, 2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.A25 .A384 2014.
159.
Building Dependable Distributed Systems.

by Zhao, Wenbing.

Material type: Text Text; Format: electronic available online remote Publisher: Hoboken : Wiley, 2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.A25.
160.
Internet Privacy Rights : Rights to Protect Autonomy

by Bernal, Paul.

Material type: Text Text; Format: electronic available online remote Publisher: Cambridge : Cambridge University Press, 2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: K3264.C65 B49 2014.